Jump to content
Welcome to our new Citrix community!
  • 0

Bugcheck cd.dll causing Citrix Worker Server to Reboot 7.15.4000.653


Nick Christou1709161216

Question

Hi Guys,

 

Currently seeing an issue in our envrionment where we have Citrix servers reboot randomly during the day. Upon reviewing the Event Viewer logs I see one particular error that stands out. 

 

"The computer has rebooted from a bugcheck.  The bugcheck was: 0x0000003b (0x00000000c0000005, 0x0000000000000000, 0xffffd00030c0f0a0, 0x0000000000000000). A dump was saved in: C:\Windows\Minidump\081619-13765-01.dmp. Report Id: 081619-13765-01."

 

Upon reviewing the dmp dump it looks to be an issue with the cd.dll. 

 

My question is has anyone had similar issue to this and can assist further as to a resolution. 

Microsoft (R) Windows Debugger Version 10.0.18362.1 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\081619-13765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
Product: Server, suite: TerminalServer DataCenter
Built by: 9600.19304.amd64fre.winblue_ltsb_escrow.190305-1818
Machine Name:
Kernel base = 0xfffff800`25472000 PsLoadedModuleList = 0xfffff800`25737570
Debug session time: Fri Aug 16 15:12:53.415 2019 (UTC + 10:00)
System Uptime: 0 days 11:55:53.347
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
Arg3: ffffd00030c0f0a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

GetUlongPtrFromAddress: unable to read from fffff800257c1308

KEY_VALUES_STRING: 1

    Key  : Dump.Attributes.InsufficientDumpfileSize
    Value: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.19304.amd64fre.winblue_ltsb_escrow.190305-1818

SYSTEM_MANUFACTURER:  VMware, Inc.

VIRTUAL_MACHINE:  VMware

SYSTEM_PRODUCT_NAME:  VMware Virtual Platform

SYSTEM_VERSION:  None

BIOS_VENDOR:  Phoenix Technologies LTD

BIOS_VERSION:  6.00

BIOS_DATE:  09/17/2015

BASEBOARD_MANUFACTURER:  Intel Corporation

BASEBOARD_PRODUCT:  440BX Desktop Reference Platform

BASEBOARD_VERSION:  None

DUMP_FILE_ATTRIBUTES: 0xc
  Insufficient Dumpfile Size
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: 0

BUGCHECK_P3: ffffd00030c0f0a0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP: 
+0
00000000`00000000 ??              ???

CONTEXT:  ffffd00030c0f0a0 -- (.cxr 0xffffd00030c0f0a0)
rax=0000000000000000 rbx=000000001712060d rcx=fffff901413e0ca8
rdx=0000000080000442 rsi=fffff901413e0ca8 rdi=0000000080000442
rip=0000000000000000 rsp=ffffd00030c0fac8 rbp=0000000080000442
 r8=000000001712060d  r9=0000010700000690 r10=fffff960009c6aa0
r11=ffffd00030c0fa40 r12=fffff960000d2130 r13=0000004739f40158
r14=fffff90140124010 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
00000000`00000000 ??              ???
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: c80

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 25

CPU_STEPPING: 1

CPU_MICROCODE: 6,25,1,0 (F,M,S,R)  SIG: 37'00000000 (cache) 37'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT_SERVER

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  NCHRISTOU

ANALYSIS_SESSION_TIME:  08-16-2019 15:57:55.0724

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff960009bcda3 to 0000000000000000

IP_IN_FREE_BLOCK: 0

STACK_TEXT:  
ffffd000`30c0fac8 fffff960`009bcda3 : 00000000`1712060d 00000000`80000442 fffff901`41698ce0 fffff960`000d67c4 : 0x0
ffffd000`30c0fad0 fffff960`00382060 : fffff901`41698ce0 00000000`1712060d 0000060d`1712060d 00000107`00000690 : cdd!RmtAssociateSharedSurface+0x5f
ffffd000`30c0fb20 fffff960`001e91b4 : 00000000`1712060d fffff901`41698ce0 00000000`80000442 ffffd000`30c0fc40 : win32k!MulAssociateSharedSurface+0x24
ffffd000`30c0fb50 fffff960`001e8f4b : 00000000`c000000d ffffd000`30c0fcc0 fffff960`001e8d08 00000000`0000c56e : win32k!GreSetRedirectionSurfaceSignaling+0x110
ffffd000`30c0fbc0 fffff800`255c21a3 : 00000047`36eaed40 fffff960`001e8d08 00000047`00000001 ffffe001`34c44f60 : win32k!NtGdiHLSurfSetInformation+0x243
ffffd000`30c0fc40 00007ffe`b1ca26fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000047`36eaed18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`b1ca26fa


THREAD_SHA1_HASH_MOD_FUNC:  66876c6c61cf019948c02db837e55e06a7b9c16e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  638089b4a3349eea541d3e5459e0aa5d7d69ae32

THREAD_SHA1_HASH_MOD:  851fa269944785f2572caa6232a251ecd53e037a

FOLLOWUP_IP: 
cdd!RmtAssociateSharedSurface+5f
fffff960`009bcda3 488d4c2420      lea     rcx,[rsp+20h]

FAULT_INSTR_CODE:  244c8d48

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  cdd!RmtAssociateSharedSurface+5f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: cdd

IMAGE_NAME:  cdd.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  54506444

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd00030c0f0a0 ; kb

BUCKET_ID_FUNC_OFFSET:  5f

FAILURE_BUCKET_ID:  0x3B_c0000005_cdd!RmtAssociateSharedSurface

BUCKET_ID:  0x3B_c0000005_cdd!RmtAssociateSharedSurface

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_cdd!RmtAssociateSharedSurface

TARGET_TIME:  2019-08-16T05:12:53.000Z

OSBUILD:  9600

OSSERVICEPACK:  19304

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  144

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 Server TerminalServer DataCenter

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-03-06 15:42:45

BUILDDATESTAMP_STR:  190305-1818

BUILDLAB_STR:  winblue_ltsb_escrow

BUILDOSVER_STR:  6.3.9600.19304.amd64fre.winblue_ltsb_escrow.190305-1818

ANALYSIS_SESSION_ELAPSED_TIME:  aa8

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_cdd!rmtassociatesharedsurface

FAILURE_ID_HASH:  {6efd787e-36bd-bcb2-11b0-3516b1a18ab9}

Followup:     MachineOwner
 

Thanks

 

 

 

 

Link to comment

2 answers to this question

Recommended Posts

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...