I have been able to reproduce this on multiple NT 4 Servers, but not
consistently.  When trying to connect with Win2k or Linux clients (3.3.4), I
get the connection window and enter the password, but nothing happens and
the VNC server has crashed with a Dr. Watson error.  I can often reproduce
this by connecting with a Linux client after a Win2k client or vice-versa,
but repeatedly connecting with a single client does not cause it.  The error
I get is "Exception: access violation (0xc0000005), Address: 0x004087eb".
I've attached the stack trace log, I hope it helps.  I can find no mention
of this in the mailing list or bugs pages.

Brian J. Conway
System Administrator
Allegro MicroSystems, Inc.
Application exception occurred:
        App:  (pid=428)
        When: 10/8/2002 @ 11:23:20.62
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: SANTORINO
        User Name: SYSTEM
        Number of Processors: 2
        Processor Type: x86 Family 6 Model 5 Stepping 1
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 6
        Current Type: Multiprocessor Free
        Registered Organization: Fab Cam
        Registered Owner: Santorino

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  25 smss.exe
  33 csrss.exe
  39 winlogon.exe
  47 services.exe
  50 lsass.exe
  75 spoolss.exe
 130 defwatch.exe
 131 llssrv.exe
 148 rtvscan.exe
 164 NSCAGENT.exe
 173 LOCATOR.exe
 182 RpcSs.exe
 186 ups.exe
 208 esserver.exe
 216 pstores.exe
 222 MSTask.exe
 220 SENS.exe
 232 winmgmt.exe
 237 wins.exe
 242 NTLGDSCA.exe
 146 EXCLI32.exe
 126 nddeagnt.exe
  46 Explorer.exe
 294 loadwc.exe
 107 vptray.exe
 236 MSCHED.exe
 321 MSCHED.exe
 428 WinVNC.exe
 394 drwtsn32.exe
   0 _Total.exe

(00400000 - 00400000)
(77f60000 - 77fbe000) dll\ntdll.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78044000)
(776a0000 - 776a7000) dll\ws2help.dbg
(77c40000 - 77d7b000) dll\shell32.dbg
(71780000 - 7180a000) COMCTL32.dbg
(10000000 - 10000000)
(00230000 - 00230000)
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
(67c70000 - 67c70000)
(71300000 - 71306000) dll\msidle.dbg

State Dump for Thread Id 0x67

eax=77bf4030 ebx=0012feb4 ecx=77bf0000 edx=00000000 esi=0000006c edi=00000000
eip=77f67f07 esp=0012fdd4 ebp=0012fe3c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: ZwReadFile
        77f67efc b886000000       mov     eax,0x86
        77f67f01 8d542404         lea     edx,[esp+0x4]
ss:010ce7db=????????
        77f67f05 cd2e             int     2e
        77f67f07 c22400           ret     0x24
        77f67f0a 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012fe3c 77dd8a61 0000006c 001330b8 0000021a 0012fe6c ntdll!ZwReadFile
0012fe70 77dd84ad 0000006c 001330b8 0000021a 0012feb4
advapi32!RegisterServiceCtrlHandlerA
0012fed4 77dd82ca 0000006c 001330b8 0000021a 0042916d
advapi32!StartServiceCtrlDispatcherW
0012fef8 004181a5 0012ff0c 0042916d 001335c5 004339f8
advapi32!StartServiceCtrlDispatcherA

*----> Raw Stack Dump <----*
0012fdd4  ca d2 f0 77 6c 00 00 00 - 00 00 00 00 00 00 00 00  ...wl...........
0012fde4  00 00 00 00 10 fe 12 00 - b8 30 13 00 1a 02 00 00  .........0......
0012fdf4  00 00 00 00 00 00 00 00 - 00 00 00 00 b8 30 13 00  .............0..
0012fe04  b4 fe 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0012fe14  3c fe 12 00 84 fe 12 00 - 04 00 00 00 00 00 00 00  <...............
0012fe24  fc fd 12 00 00 00 00 00 - c4 fe 12 00 6c b9 f3 77  ............l..w
0012fe34  40 ca f3 77 ff ff ff ff - 70 fe 12 00 61 8a dd 77  @..w....p...a..w
0012fe44  6c 00 00 00 b8 30 13 00 - 1a 02 00 00 6c fe 12 00  l....0......l...
0012fe54  00 00 00 00 00 00 00 00 - 38 79 13 00 44 79 13 00  ........8y..Dy..
0012fe64  6c 00 00 00 84 fe 12 00 - 00 00 00 00 d4 fe 12 00  l...............
0012fe74  ad 84 dd 77 6c 00 00 00 - b8 30 13 00 1a 02 00 00  ...wl....0......
0012fe84  b4 fe 12 00 b8 30 13 00 - 00 00 00 00 1a 02 00 00  .....0..........
0012fe94  a7 01 00 00 b8 30 13 00 - 00 00 00 00 01 00 00 00  .....0..........
0012fea4  bc 30 13 00 00 00 00 00 - 01 00 00 00 f0 67 13 00  .0...........g..
0012feb4  00 00 00 00 00 00 00 00 - 88 fe 12 00 04 00 00 00  ................
0012fec4  b0 ff 12 00 64 11 de 77 - b8 e0 de 77 ff ff ff ff  ....d..w...w....
0012fed4  f8 fe 12 00 ca 82 dd 77 - 6c 00 00 00 b8 30 13 00  .......wl....0..
0012fee4  1a 02 00 00 6d 91 42 00 - c5 35 13 00 c5 35 13 00  ....m.B..5...5..
0012fef4  6c 00 00 00 00 00 00 00 - a5 81 41 00 0c ff 12 00  l.........A.....
0012ff04  6d 91 42 00 c5 35 13 00 - f8 39 43 00 10 82 41 00  m.B..5...9C...A.

State Dump for Thread Id 0x197

eax=00000001 ebx=00b80750 ecx=00000d01 edx=00000000 esi=77e71c02 edi=00e7fc78
eip=77e72397 esp=00e7fc24 ebp=00e7fc48 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: InvalidateRect
        77e7237e b89e110000       mov     eax,0x119e
        77e72383 8d542404         lea     edx,[esp+0x4]
ss:01e1e62b=????????
        77e72387 cd2e             int     2e
        77e72389 c20c00           ret     0xc
        77e7238c b885110000       mov     eax,0x1185
        77e72391 8d542404         lea     edx,[esp+0x4]
ss:01e1e62b=????????
        77e72395 cd2e             int     2e
        77e72397 c21400           ret     0x14

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00e7fc48 00419a05 00e7fc78 00000000 00000000 00000000 user32!InvalidateRect

*----> Raw Stack Dump <----*
00e7fc24  15 27 e7 77 78 fc e7 00 - 00 00 00 00 00 00 00 00  .'.wx...........
00e7fc34  00 00 00 00 44 fc e7 00 - d5 1e e7 77 02 1c e7 77  ....D......w...w
00e7fc44  02 1c e7 77 e5 26 e7 77 - 05 9a 41 00 78 fc e7 00  ...w.&.w..A.x...
00e7fc54  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fc64  b8 ff e7 00 10 0e a7 00 - 90 0d a7 00 50 07 b8 00  ............P...
00e7fc74  b8 fc e7 00 8a 02 47 00 - 02 04 00 00 00 00 00 00  ......G.........
00e7fc84  00 00 00 00 0d b5 31 78 - 92 01 00 00 2d 01 00 00  ......1x....-...
00e7fc94  c0 8f 42 00 10 91 42 00 - 94 fc e7 00 30 0d b8 00  ..B...B.....0...
00e7fca4  00 00 00 00 00 00 00 00 - 00 00 00 00 40 00 5e 01  ............@.^.
00e7fcb4  0c 17 00 00 01 00 00 00 - 69 23 80 b7 f5 e0 8c 5f  ........i#....._
00e7fcc4  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fcd4  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fce4  02 00 00 00 0a 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fcf4  00 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fd04  01 00 00 00 70 0d b8 00 - 10 10 b8 00 7f fe e7 00  ....p...........
00e7fd14  f0 0d b8 00 00 00 00 00 - 7f 0e a7 00 d0 0d b8 00  ................
00e7fd24  00 00 00 00 00 00 00 00 - 60 10 b8 00 00 00 00 00  ........`.......
00e7fd34  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fd44  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00e7fd54  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

State Dump for Thread Id 0x72

eax=004284ac ebx=7766b100 ecx=00b80410 edx=00000000 esi=00e82790 edi=0000008c
eip=77f682db esp=00fffa48 ebp=00fffa9c iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000293


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:01f9e44f=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00fffa9c 77661202 0000008c 00000098 00000002 00000004
ntdll!NtWaitForSingleObject
00ffff04 776bb416 00000098 00000000 00000000 00000000 msafd!<nosymbols>
00ffff3c 776bb3a1 00000098 00000000 00000000 00000000 ws2_32!WSAAccept
00ffffb8 77f04ef0 00a708c0 00e7f8bc 00e7f960 00a708c0 ws2_32!accept
00ffffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>

*----> Raw Stack Dump <----*
00fffa48  ce 89 66 77 8c 00 00 00 - 01 00 00 00 74 fa ff 00  ..fw........t...
00fffa58  ac 27 e8 00 94 27 e8 00 - 1a 00 00 00 b2 04 83 a0  .'...'..........
00fffa68  de 6e c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff  .n..............
00fffa78  ff ff ff 7f 00 00 00 00 - 1c 88 13 00 ad 1f 6a 77  ..............jw
00fffa88  d8 11 66 77 98 00 00 00 - 00 00 00 00 00 00 00 00  ..fw............
00fffa98  00 00 00 00 04 ff ff 00 - 02 12 66 77 8c 00 00 00  ..........fw....
00fffaa8  98 00 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00  ................
00fffab8  c8 4f 91 00 f8 3e 91 00 - 66 00 02 00 00 00 00 00  .O...>..f.......
00fffac8  00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00  ................
00fffad8  00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00  ................
00fffae8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffaf8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb08  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb18  01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb28  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb48  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb58  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb68  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00fffb78  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

State Dump for Thread Id 0xea

eax=00000640 ebx=00000640 ecx=00000028 edx=02978a60 esi=02979000 edi=02b59000
eip=004087eb esp=0244fdfc ebp=00b81078 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: <nosymbols>
        004087d0 89442410         mov     [esp+0x10],eax
ss:033ee803=????????
        004087d4 3bf1             cmp     esi,ecx
        004087d6 7333             jnb     0040880b
        004087d8 2bce             sub     ecx,esi
        004087da 894c2414         mov     [esp+0x14],ecx
ss:033ee803=????????
        004087de 8b4c241c         mov     ecx,[esp+0x1c]
ss:033ee803=????????
        004087e2 8bf8             mov     edi,eax
        004087e4 8bc1             mov     eax,ecx
        004087e6 8bf2             mov     esi,edx
        004087e8 c1e902           shr     ecx,0x2
FAULT ->004087eb f3a5            rep  movsd ds:02979000=????????
es:02b59000=00000000
        004087ed 8bc8             mov     ecx,eax
        004087ef 8b442410         mov     eax,[esp+0x10]
ss:033ee803=????????
        004087f3 83e103           and     ecx,0x3
        004087f6 03d3             add     edx,ebx
        004087f8 f3a4             rep     movsb         ds:02979000=??
es:02b59000=00
        004087fa 8b4c2414         mov     ecx,[esp+0x14]
ss:033ee803=????????
        004087fe 03c3             add     eax,ebx
        00408800 49               dec     ecx
        00408801 89442410         mov     [esp+0x10],eax
ss:033ee803=????????
        00408805 894c2414         mov     [esp+0x14],ecx
ss:033ee803=????????
        00408809 75d3             jnz     004087de

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00b81078 000ea60c 02b20020 000ea600 01001010 003f001f <nosymbols>

State Dump for Thread Id 0x6f

eax=00000000 ebx=00e7ff00 ecx=00000188 edx=00000000 esi=00e7ff2c edi=00000000
eip=77f682db esp=0254fde0 ebp=0254fe50 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:034ee7e7=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0254fe50 77f67586 00e7ff2c 00231027 00e7ff2c 0041696c
ntdll!NtWaitForSingleObject
00b804f0 00135ef0 ffffffff 00000000 00000000 00000000
ntdll!RtlEnterCriticalSection
_______________________________________________
VNC-List mailing list
[EMAIL PROTECTED]
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to