Quantcast
Channel: Remote Desktop Services (Terminal Services) Forumu
Viewing all articles
Browse latest Browse all 27533

Server 2019 RDS server randomly crashing

$
0
0

Below is the crash dump and analysis.  I only found one thing online that seemed to involve the same probable cause.  I believe the solution from what I did find online was to delete the fntcache.dat file and any fontcache folders in the users appdata/local.  Hoping someone can help confirm this or point me in the right direction.  This is a brand new RDS server.  Thanks.


Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\040819-63843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 17763 MP (24 procs) Free x64
Product: Server, suite: TerminalServer <20000>
Built by: 17763.1.amd64fre.rs5_release.180914-1434
Machine Name:
Kernel base = 0xfffff803`20cb2000 PsLoadedModuleList = 0xfffff803`210cd790
Debug session time: Mon Apr  8 09:10:50.734 2019 (UTC - 4:00)
System Uptime: 0 days 0:20:07.773
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, ffffbe50db2bbc99, fffffe003f13f230, 0}
Probably caused by : win32kfull.sys ( win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad )
Followup:     MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffffbe50db2bbc99, Address of the instruction which caused the bugcheck
Arg3: fffffe003f13f230, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------

KEY_VALUES_STRING: 1

STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434
SYSTEM_MANUFACTURER:  VMware, Inc.
VIRTUAL_MACHINE:  VMware
SYSTEM_PRODUCT_NAME:  VMware Virtual Platform
SYSTEM_VERSION:  None
BIOS_VENDOR:  Phoenix Technologies LTD
BIOS_VERSION:  6.00
BIOS_DATE:  07/28/2017
BASEBOARD_MANUFACTURER:  Intel Corporation
BASEBOARD_PRODUCT:  440BX Desktop Reference Platform
BASEBOARD_VERSION:  None
DUMP_TYPE:  2
BUGCHECK_P1: c0000005
BUGCHECK_P2: ffffbe50db2bbc99
BUGCHECK_P3: fffffe003f13f230
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101          movups  xmmword ptr [rcx],xmm0
CONTEXT:  fffffe003f13f230 -- (.cxr 0xfffffe003f13f230)
rax=ffffbe1c40925ab0 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000008 rsi=fffffe003f13fd10 rdi=fffffe003f13fd00
rip=ffffbe50db2bbc99 rsp=fffffe003f13fc20 rbp=0000000000000001
 r8=00000000ffffffff  r9=ffffbe1c42ddc03a r10=00000000ffffffff
r11=fffffe003f13f9d0 r12=0000000000000000 r13=0000000000000001
r14=ffffbe1c40925ab0 r15=0000000000000001
iopl=0         nv up ei pl nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010213
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad:
ffffbe50`db2bbc99 0f1101          movups  xmmword ptr [rcx],xmm0 ds:002b:00000000`00000000=????????????????????????????????
Resetting default scope
CPU_COUNT: 18
CPU_MHZ: 82f
CPU_VENDOR:  GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 55
CPU_STEPPING: 4
CPU_MICROCODE: 6,55,4,0 (F,M,S,R)  SIG: 2000050'00000000 (cache) 2000050'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXPNP: 1 (!blackboxpnp)

CUSTOMER_CRASH_COUNT:  1
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT_SERVER
BUGCHECK_STR:  0x3B
PROCESS_NAME:  PrintIsolationHost.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  TSFW
ANALYSIS_SESSION_TIME:  04-08-2019 14:38:09.0994
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
LAST_CONTROL_TRANSFER:  from ffffbe50db27c37e to ffffbe50db2bbc99
STACK_TEXT: 
fffffe00`3f13fc20 ffffbe50`db27c37e : ffffbe1c`42ddc910 ffffbe50`db0623f1 ffffbe1c`42ddc910 ffffbe50`db403dad : win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+0xad
fffffe00`3f13fce0 ffffbe50`db29bfe2 : 00000000`00000000 ffffbe1c`42ddc910 fffffe00`3f13fec0 fffffe00`3f13fd74 : win32kfull!FONTOBJ_cGetGlyphs+0x2e
fffffe00`3f13fd40 fffff803`20e76885 : ffffbe1c`40925ab0 ffffbe50`00000001 ffffbe1c`42ddc910 fffffe00`3f13fd74 : win32kfull!NtGdiFONTOBJ_cGetGlyphs+0x122
fffffe00`3f13fdd0 00007ffb`568b62e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000011`3cffbd68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`568b62e4

THREAD_SHA1_HASH_MOD_FUNC:  a9532d501db653ddf4115621b75b0545b76a4bbb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  46798b393430d99ef49f58ebf009fb18a67143d6
THREAD_SHA1_HASH_MOD:  4b0b617a0dfdccf32d810bf06e973af5ab544eda
FOLLOWUP_IP:
win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
ffffbe50`db2bbc99 0f1101          movups  xmmword ptr [rcx],xmm0
FAULT_INSTR_CODE:  4801110f
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside+ad
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME:  win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP:  4161d1d6
IMAGE_VERSION:  10.0.17763.404
STACK_COMMAND:  .cxr 0xfffffe003f13f230 ; kb
BUCKET_ID_FUNC_OFFSET:  ad
FAILURE_BUCKET_ID:  0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
BUCKET_ID:  0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
PRIMARY_PROBLEM_CLASS:  0x3B_win32kfull!RFONTOBJ::bInsertGlyphbitsLookaside
TARGET_TIME:  2019-04-08T13:10:50.000Z
OSBUILD:  17763
OSSERVICEPACK:  404
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  131088
PRODUCT_TYPE:  3
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 Server TerminalServer
OS_LOCALE: 
USER_LCID:  0
OSBUILD_TIMESTAMP:  2022-05-13 05:29:43
BUILDDATESTAMP_STR:  180914-1434
BUILDLAB_STR:  rs5_release
BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434
ANALYSIS_SESSION_ELAPSED_TIME:  1a3d
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:0x3b_win32kfull!rfontobj::binsertglyphbitslookaside
FAILURE_ID_HASH:  {ce603602-155f-03d7-d64e-0b9170fa0d25}
Followup:     MachineOwner
---------


Viewing all articles
Browse latest Browse all 27533

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>