I can confirm problem with periodic crash and reboot 2008 R2 server when use freerdp 0.8.2 Reboots rare, probably one per 20-100 hours with 24x7 use, most likely at high load (over 90% memory in use)
-- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [c:\windows\Minidump\110111-15312-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available WARNING: Inaccessible path: 'c:\windows\i386' Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: c:\windows\i386 Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: Server, suite: TerminalServer Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`0161f000 PsLoadedModuleList = 0xfffff800`01864670 Debug session time: Tue Nov 1 11:38:36.417 2011 (UTC + 4:00) System Uptime: 4 days 2:37:52.964 Loading Kernel Symbols ............................................................... .......................................................... Loading User Symbols Loading unloaded module list ........................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffffa8045a84248, 1, fffff88004239f54, 0} Could not read faulting driver name Probably caused by : RDPWD.SYS ( RDPWD!memcpy+64 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffffa8045a84248, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff88004239f54, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800018ce100 fffffa8045a84248 FAULTING_IP: RDPWD!memcpy+64 fffff880`04239f54 488901 mov qword ptr [rcx],rax MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8801f479aa0 -- (.trap 0xfffff8801f479aa0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=01000000000003ee rbx=0000000000000000 rcx=fffffa8045a84248 rdx=000000000050710b rsi=0000000000000000 rdi=0000000000000000 rip=fffff88004239f54 rsp=fffff8801f479c38 rbp=0000000000000001 r8=000000000000001e r9=0000000000000003 r10=fffff8a027c861e8 r11=fffffa8045a84248 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po cy RDPWD!memcpy+0x64: fffff880`04239f54 488901 mov qword ptr [rcx],rax ds:9bf4:fffffa80`45a84248=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800016479fc to fffff8000169bc40 STACK_TEXT: fffff880`1f479938 fffff800`016479fc : 00000000`00000050 fffffa80`45a84248 00000000`00000001 fffff880`1f479aa0 : nt!KeBugCheckEx fffff880`1f479940 fffff800`01699d6e : 00000000`00000001 fffffa80`45a84248 fffffa80`45f8b300 fffff8a0`0c9ef270 : nt! ?? ::FNODOBFM::`string'+0x4611f fffff880`1f479aa0 fffff880`04239f54 : fffff880`0421f7cf fffff880`1f479d60 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e fffff880`1f479c38 fffff880`0421f7cf : fffff880`1f479d60 00000000`00000000 00000000`00000000 fffffa80`43bacc68 : RDPWD!memcpy+0x64 fffff880`1f479c40 fffff880`042379fc : fffff8a0`151c29b0 00000000`00000022 00000000`00000019 00000000`00000002 : RDPWD!SM_MCSSendDataCallback+0x303 fffff880`1f479c80 fffff880`04236354 : fffff880`1f479dc0 fffff8a0`27c861e8 00000000`00000000 fffffa80`45f8b340 : RDPWD!HandleAllSendDataPDUs+0x188 fffff880`1f479d30 fffff880`04235f64 : 00000000`00000031 fffffa80`45f8b345 00000006`0000001f fffff880`04204079 : RDPWD!RecognizeMCSFrame+0x28 fffff880`1f479d70 fffff880`01bf11f8 : fffff8a0`27cae000 fffffa80`45662930 fffffa80`45658720 fffff880`04202e00 : RDPWD!MCSIcaRawInputWorker+0x3d4 fffff880`1f479e10 fffff880`042028d0 : 00000000`00000000 fffff880`1f479f30 fffff880`1f479f28 fffff800`0167c4db : termdd!IcaRawInput+0x50 fffff880`1f479e40 fffff880`04201d85 : 00000000`00000001 fffffa80`45c1f738 00000000`00000000 00000000`00000000 : tssecsrv!CRawInputDM::PassDataToServer+0x2c fffff880`1f479e70 fffff880`042017c2 : fffffa80`41379528 fffffa80`00000000 00000000`00000031 fffff800`00000000 : tssecsrv!CFilter::FilterIncomingData+0xc9 fffff880`1f479f10 fffff880`01bf11f8 : fffff880`009c6180 fffffa80`453fc6f0 00000000`00000000 00000000`00000000 : tssecsrv!ScrRawInput+0x82 fffff880`1f479f80 fffff880`043f14c5 : fffffa80`41379510 fffffa80`45f8b108 00000000`00000000 fffffa80`41379510 : termdd!IcaRawInput+0x50 fffff880`1f479fb0 fffff880`01bf1f3e : fffffa80`45f8b0d0 fffffa80`406e44c0 fffffa80`457100d0 fffffa80`2155a870 : tdtcp!TdInputThread+0x465 fffff880`1f47a830 fffff880`01bf0ae3 : fffffa80`4424c310 fffffa80`2155a870 fffffa80`137eff80 fffffa80`457100d0 : termdd!IcaDriverThread+0x5a fffff880`1f47a860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : termdd!IcaDeviceControlStack+0x827 STACK_COMMAND: kb FOLLOWUP_IP: RDPWD!memcpy+64 fffff880`04239f54 488901 mov qword ptr [rcx],rax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: RDPWD!memcpy+64 FOLLOWUP_NAME: MachineOwner MODULE_NAME: RDPWD IMAGE_NAME: RDPWD.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7ab45 FAILURE_BUCKET_ID: X64_0x50_RDPWD!memcpy+64 BUCKET_ID: X64_0x50_RDPWD!memcpy+64 Followup: MachineOwner --------- ------------------------------------------------------------------------------ RSA® Conference 2012 Save $700 by Nov 18 Register now! http://p.sf.net/sfu/rsa-sfdev2dev1 _______________________________________________ Freerdp-devel mailing list Freerdp-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freerdp-devel