I have been able to reproduce this on multiple NT 4 Servers, but not
consistently. When trying to connect with Win2k or Linux clients (3.3.4), I
get the connection window and enter the password, but nothing happens and
the VNC server has crashed with a Dr. Watson error. I can often reproduce
this by connecting with a Linux client after a Win2k client or vice-versa,
but repeatedly connecting with a single client does not cause it. The error
I get is "Exception: access violation (0xc0000005), Address: 0x004087eb".
I've attached the stack trace log, I hope it helps. I can find no mention
of this in the mailing list or bugs pages.
Brian J. Conway
System Administrator
Allegro MicroSystems, Inc.
Application exception occurred:
App: (pid=428)
When: 10/8/2002 @ 11:23:20.62
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: SANTORINO
User Name: SYSTEM
Number of Processors: 2
Processor Type: x86 Family 6 Model 5 Stepping 1
Windows Version: 4.0
Current Build: 1381
Service Pack: 6
Current Type: Multiprocessor Free
Registered Organization: Fab Cam
Registered Owner: Santorino
*----> Task List <----*
0 Idle.exe
2 System.exe
25 smss.exe
33 csrss.exe
39 winlogon.exe
47 services.exe
50 lsass.exe
75 spoolss.exe
130 defwatch.exe
131 llssrv.exe
148 rtvscan.exe
164 NSCAGENT.exe
173 LOCATOR.exe
182 RpcSs.exe
186 ups.exe
208 esserver.exe
216 pstores.exe
222 MSTask.exe
220 SENS.exe
232 winmgmt.exe
237 wins.exe
242 NTLGDSCA.exe
146 EXCLI32.exe
126 nddeagnt.exe
46 Explorer.exe
294 loadwc.exe
107 vptray.exe
236 MSCHED.exe
321 MSCHED.exe
428 WinVNC.exe
394 drwtsn32.exe
0 _Total.exe
(00400000 - 00400000)
(77f60000 - 77fbe000) dll\ntdll.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78044000)
(776a0000 - 776a7000) dll\ws2help.dbg
(77c40000 - 77d7b000) dll\shell32.dbg
(71780000 - 7180a000) COMCTL32.dbg
(10000000 - 10000000)
(00230000 - 00230000)
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(67c70000 - 67c70000)
(71300000 - 71306000) dll\msidle.dbg
State Dump for Thread Id 0x67
eax=77bf4030 ebx=0012feb4 ecx=77bf0000 edx=00000000 esi=0000006c edi=00000000
eip=77f67f07 esp=0012fdd4 ebp=0012fe3c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: ZwReadFile
77f67efc b886000000 mov eax,0x86
77f67f01 8d542404 lea edx,[esp+0x4]
ss:010ce7db=????????
77f67f05 cd2e int 2e
77f67f07 c22400 ret 0x24
77f67f0a 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012fe3c 77dd8a61 0000006c 001330b8 0000021a 0012fe6c ntdll!ZwReadFile
0012fe70 77dd84ad 0000006c 001330b8 0000021a 0012feb4
advapi32!RegisterServiceCtrlHandlerA
0012fed4 77dd82ca 0000006c 001330b8 0000021a 0042916d
advapi32!StartServiceCtrlDispatcherW
0012fef8 004181a5 0012ff0c 0042916d 001335c5 004339f8
advapi32!StartServiceCtrlDispatcherA
*----> Raw Stack Dump <----*
0012fdd4 ca d2 f0 77 6c 00 00 00 - 00 00 00 00 00 00 00 00 ...wl...........
0012fde4 00 00 00 00 10 fe 12 00 - b8 30 13 00 1a 02 00 00 .........0......
0012fdf4 00 00 00 00 00 00 00 00 - 00 00 00 00 b8 30 13 00 .............0..
0012fe04 b4 fe 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012fe14 3c fe 12 00 84 fe 12 00 - 04 00 00 00 00 00 00 00 <...............
0012fe24 fc fd 12 00 00 00 00 00 - c4 fe 12 00 6c b9 f3 77 ............l..w
0012fe34 40 ca f3 77 ff ff ff ff - 70 fe 12 00 61 8a dd 77 @..w....p...a..w
0012fe44 6c 00 00 00 b8 30 13 00 - 1a 02 00 00 6c fe 12 00 l....0......l...
0012fe54 00 00 00 00 00 00 00 00 - 38 79 13 00 44 79 13 00 ........8y..Dy..
0012fe64 6c 00 00 00 84 fe 12 00 - 00 00 00 00 d4 fe 12 00 l...............
0012fe74 ad 84 dd 77 6c 00 00 00 - b8 30 13 00 1a 02 00 00 ...wl....0......
0012fe84 b4 fe 12 00 b8 30 13 00 - 00 00 00 00 1a 02 00 00 .....0..........
0012fe94 a7 01 00 00 b8 30 13 00 - 00 00 00 00 01 00 00 00 .....0..........
0012fea4 bc 30 13 00 00 00 00 00 - 01 00 00 00 f0 67 13 00 .0...........g..
0012feb4 00 00 00 00 00 00 00 00 - 88 fe 12 00 04 00 00 00 ................
0012fec4 b0 ff 12 00 64 11 de 77 - b8 e0 de 77 ff ff ff ff ....d..w...w....
0012fed4 f8 fe 12 00 ca 82 dd 77 - 6c 00 00 00 b8 30 13 00 .......wl....0..
0012fee4 1a 02 00 00 6d 91 42 00 - c5 35 13 00 c5 35 13 00 ....m.B..5...5..
0012fef4 6c 00 00 00 00 00 00 00 - a5 81 41 00 0c ff 12 00 l.........A.....
0012ff04 6d 91 42 00 c5 35 13 00 - f8 39 43 00 10 82 41 00 m.B..5...9C...A.
State Dump for Thread Id 0x197
eax=00000001 ebx=00b80750 ecx=00000d01 edx=00000000 esi=77e71c02 edi=00e7fc78
eip=77e72397 esp=00e7fc24 ebp=00e7fc48 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246
function: InvalidateRect
77e7237e b89e110000 mov eax,0x119e
77e72383 8d542404 lea edx,[esp+0x4]
ss:01e1e62b=????????
77e72387 cd2e int 2e
77e72389 c20c00 ret 0xc
77e7238c b885110000 mov eax,0x1185
77e72391 8d542404 lea edx,[esp+0x4]
ss:01e1e62b=????????
77e72395 cd2e int 2e
77e72397 c21400 ret 0x14
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00e7fc48 00419a05 00e7fc78 00000000 00000000 00000000 user32!InvalidateRect
*----> Raw Stack Dump <----*
00e7fc24 15 27 e7 77 78 fc e7 00 - 00 00 00 00 00 00 00 00 .'.wx...........
00e7fc34 00 00 00 00 44 fc e7 00 - d5 1e e7 77 02 1c e7 77 ....D......w...w
00e7fc44 02 1c e7 77 e5 26 e7 77 - 05 9a 41 00 78 fc e7 00 ...w.&.w..A.x...
00e7fc54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fc64 b8 ff e7 00 10 0e a7 00 - 90 0d a7 00 50 07 b8 00 ............P...
00e7fc74 b8 fc e7 00 8a 02 47 00 - 02 04 00 00 00 00 00 00 ......G.........
00e7fc84 00 00 00 00 0d b5 31 78 - 92 01 00 00 2d 01 00 00 ......1x....-...
00e7fc94 c0 8f 42 00 10 91 42 00 - 94 fc e7 00 30 0d b8 00 ..B...B.....0...
00e7fca4 00 00 00 00 00 00 00 00 - 00 00 00 00 40 00 5e 01 ............@.^.
00e7fcb4 0c 17 00 00 01 00 00 00 - 69 23 80 b7 f5 e0 8c 5f ........i#....._
00e7fcc4 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fcd4 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fce4 02 00 00 00 0a 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fcf4 00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fd04 01 00 00 00 70 0d b8 00 - 10 10 b8 00 7f fe e7 00 ....p...........
00e7fd14 f0 0d b8 00 00 00 00 00 - 7f 0e a7 00 d0 0d b8 00 ................
00e7fd24 00 00 00 00 00 00 00 00 - 60 10 b8 00 00 00 00 00 ........`.......
00e7fd34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fd44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00e7fd54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0x72
eax=004284ac ebx=7766b100 ecx=00b80410 edx=00000000 esi=00e82790 edi=0000008c
eip=77f682db esp=00fffa48 ebp=00fffa9c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000293
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:01f9e44f=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00fffa9c 77661202 0000008c 00000098 00000002 00000004
ntdll!NtWaitForSingleObject
00ffff04 776bb416 00000098 00000000 00000000 00000000 msafd!<nosymbols>
00ffff3c 776bb3a1 00000098 00000000 00000000 00000000 ws2_32!WSAAccept
00ffffb8 77f04ef0 00a708c0 00e7f8bc 00e7f960 00a708c0 ws2_32!accept
00ffffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>
*----> Raw Stack Dump <----*
00fffa48 ce 89 66 77 8c 00 00 00 - 01 00 00 00 74 fa ff 00 ..fw........t...
00fffa58 ac 27 e8 00 94 27 e8 00 - 1a 00 00 00 b2 04 83 a0 .'...'..........
00fffa68 de 6e c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff .n..............
00fffa78 ff ff ff 7f 00 00 00 00 - 1c 88 13 00 ad 1f 6a 77 ..............jw
00fffa88 d8 11 66 77 98 00 00 00 - 00 00 00 00 00 00 00 00 ..fw............
00fffa98 00 00 00 00 04 ff ff 00 - 02 12 66 77 8c 00 00 00 ..........fw....
00fffaa8 98 00 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
00fffab8 c8 4f 91 00 f8 3e 91 00 - 66 00 02 00 00 00 00 00 .O...>..f.......
00fffac8 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
00fffad8 00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
00fffae8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffaf8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb08 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb18 01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb38 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb48 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb58 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb68 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb78 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
State Dump for Thread Id 0xea
eax=00000640 ebx=00000640 ecx=00000028 edx=02978a60 esi=02979000 edi=02b59000
eip=004087eb esp=0244fdfc ebp=00b81078 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: <nosymbols>
004087d0 89442410 mov [esp+0x10],eax
ss:033ee803=????????
004087d4 3bf1 cmp esi,ecx
004087d6 7333 jnb 0040880b
004087d8 2bce sub ecx,esi
004087da 894c2414 mov [esp+0x14],ecx
ss:033ee803=????????
004087de 8b4c241c mov ecx,[esp+0x1c]
ss:033ee803=????????
004087e2 8bf8 mov edi,eax
004087e4 8bc1 mov eax,ecx
004087e6 8bf2 mov esi,edx
004087e8 c1e902 shr ecx,0x2
FAULT ->004087eb f3a5 rep movsd ds:02979000=????????
es:02b59000=00000000
004087ed 8bc8 mov ecx,eax
004087ef 8b442410 mov eax,[esp+0x10]
ss:033ee803=????????
004087f3 83e103 and ecx,0x3
004087f6 03d3 add edx,ebx
004087f8 f3a4 rep movsb ds:02979000=??
es:02b59000=00
004087fa 8b4c2414 mov ecx,[esp+0x14]
ss:033ee803=????????
004087fe 03c3 add eax,ebx
00408800 49 dec ecx
00408801 89442410 mov [esp+0x10],eax
ss:033ee803=????????
00408805 894c2414 mov [esp+0x14],ecx
ss:033ee803=????????
00408809 75d3 jnz 004087de
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
00b81078 000ea60c 02b20020 000ea600 01001010 003f001f <nosymbols>
State Dump for Thread Id 0x6f
eax=00000000 ebx=00e7ff00 ecx=00000188 edx=00000000 esi=00e7ff2c edi=00000000
eip=77f682db esp=0254fde0 ebp=0254fe50 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000206
function: NtWaitForSingleObject
77f682d0 b8c5000000 mov eax,0xc5
77f682d5 8d542404 lea edx,[esp+0x4]
ss:034ee7e7=????????
77f682d9 cd2e int 2e
77f682db c20c00 ret 0xc
77f682de 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0254fe50 77f67586 00e7ff2c 00231027 00e7ff2c 0041696c
ntdll!NtWaitForSingleObject
00b804f0 00135ef0 ffffffff 00000000 00000000 00000000
ntdll!RtlEnterCriticalSection
_______________________________________________
VNC-List mailing list
[EMAIL PROTECTED]
http://www.realvnc.com/mailman/listinfo/vnc-list