VNC 3.3.5 server crashes on NT4 server

Neel, Steve SNeel@sandc.com
Mon Nov 25 16:48:00 2002


I am seeing this exact same problem with multiple servers here too!

Steven Neel
Web Software Developer
S&C Electric Company
Phone: 773-338-1000 (Ext. 2688)
Fax: 773-338-5102
http://www.sandc.com?refid=sneel


-----Original Message-----
From: Barber, Neil [mailto:Neil.Barber@glovia.com] 
Sent: Monday, November 25, 2002 5:29 AM
To: 'vnc-list@realvnc.com'
Cc: Marshall, Peter
Subject: VNC 3.3.5 server crashes on NT4 server


I have installed the latest VNC distribution on a Windows NT4 server (SP6)
but although it works okay, I cannot guarantee that it'll stay up for any
period of time.
 
Randomly, when I attempt to connect from a Windows 2000 machine using either
the VNC Viewer, or the Java Viewer, I get the authentication dialogue but
when I enter the (correct) password everything just hangs. 
 
If I run the Java Viewer from the command-line, the hang occurs after the
client init phase but before the desktop name is displayed.
 
The VNC server is installed as a service on the NT server with local
administrator rights, using the default settings except for the password - I
have attached the output from Dr. Watson.
 
Any help would be much appreciated ...
 
 
Neil Barber
Technical Consultant
Glovia International LLC
 
>>>>
 
Microsoft (R) Windows NT (TM) Version 4.00 DrWtsn32
Copyright (C) 1985-1996 Microsoft Corp. All rights reserved.
 
 
 
Application exception occurred:
        App:  (pid=382)
        When: 11/25/2002 @ 9:18:56.744
        Exception number: c0000005 (access violation)
 
*----> System Information <----*
        Computer Name: METEOR
        User Name: SYSTEM
        Number of Processors: 2
        Processor Type: x86 Family 6 Model 8 Stepping 3
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 6
        Current Type: Multiprocessor Free
        Registered Organization: Glovia International
        Registered Owner: Glovia International
 
*----> Task List <----*
   0 Idle.exe
   2 System.exe
  26 smss.exe
  34 csrss.exe
  40 winlogon.exe
  46 services.exe
  49 lsass.exe
  73 spoolss.exe
  91 RpcSs.exe
  48 msdtc.exe
 117 ntservice.exe
 121 defwatch.exe
 124 dns.exe
 128 pds.exe
 144 llssrv.exe
 148 rtvscan.exe
 163 FWU_AG~1.exe
 170 PRO32SRV.exe
 174 pstores.exe
 177 MSTask.exe
 190 snmp.exe
 206 SRVCTRL.exe
 217 jk_nt_service.e.exe
 226 java.exe
 239 inetinfo.exe
 382 vncserver.exe
 391 drwtsn32.exe
   0 _Total.exe
 
(00400000 - 00400000) 
(77f60000 - 77fbe000) dll\ntdll.dbg
(77f00000 - 77f5f000) dll\kernel32.dbg
(77e70000 - 77ec5000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c4000) dll\ws2_32.dbg
(78000000 - 78044000) 
(776a0000 - 776a7000) dll\ws2help.dbg
(77c40000 - 77d7b000) dll\shell32.dbg
(716f0000 - 7177a000) COMCTL32.dbg
(77b20000 - 77bd1000) dll\ole32.dbg
(10000000 - 10000000) 
(00230000 - 00230000) 
(77bf0000 - 77bf7000) dll\rpcltc1.dbg
(77660000 - 7766f000) dll\msafd.dbg
(77690000 - 77699000) dll\wshtcpip.dbg
(74ff0000 - 74ffe000) dll\rnr20.dbg
 
State Dump for Thread Id 0x17d
 
eax=00000408 ebx=0012feb4 ecx=00130010 edx=00000000 esi=00000074
edi=00000000
eip=77f67f07 esp=0012fdd4 ebp=0012fe3c iopl=0         nv up ei pl zr na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000246
 
 
function: ZwReadFile
        77f67efc b886000000       mov     eax,0x86
        77f67f01 8d542404         lea     edx,[esp+0x4]
ss:011de7db=????????
        77f67f05 cd2e             int     2e
        77f67f07 c22400           ret     0x24
        77f67f0a 8bc0             mov     eax,eax
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 0012fe3c
77dd8a61 00000074 00133030 0000021a 0012fe6c ntdll!ZwReadFile 
0012fe70 77dd84ad 00000074 00133030 0000021a 0012feb4
advapi32!RegisterServiceCtrlHandlerA 
0012fed4 77dd82ca 00000074 00133030 0000021a 0042ae81
advapi32!StartServiceCtrlDispatcherW 
0012fef8 0041a845 0012ff0c 0042ae81 0013382c 0043561c
advapi32!StartServiceCtrlDispatcherA 
 
*----> Raw Stack Dump <----*
0012fdd4  ca d2 f0 77 74 00 00 00 - 00 00 00 00 00 00 00 00 ...wt...........
0012fde4  00 00 00 00 10 fe 12 00 - 30 30 13 00 1a 02 00 00 ........00......
0012fdf4  00 00 00 00 00 00 00 00 - 00 00 00 00 30 30 13 00 ............00..
0012fe04  b4 fe 12 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012fe14  3c fe 12 00 84 fe 12 00 - 04 00 00 00 00 00 00 00 <...............
0012fe24  fc fd 12 00 00 00 00 00 - c4 fe 12 00 6c b9 f3 77 ............l..w
0012fe34  40 ca f3 77 ff ff ff ff - 70 fe 12 00 61 8a dd 77 @..w....p...a..w
0012fe44  74 00 00 00 30 30 13 00 - 1a 02 00 00 6c fe 12 00 t...00......l...
0012fe54  00 00 00 00 00 00 00 00 - 00 00 00 00 0c 81 13 00 ................
0012fe64  74 00 00 00 84 fe 12 00 - 00 00 00 00 d4 fe 12 00 t...............
0012fe74  ad 84 dd 77 74 00 00 00 - 30 30 13 00 1a 02 00 00 ...wt...00......
0012fe84  b4 fe 12 00 30 30 13 00 - 00 00 00 00 1a 02 00 00 ....00..........
0012fe94  5a 01 00 00 00 00 00 00 - 00 00 00 00 01 00 00 00 Z...............
0012fea4  34 30 13 00 00 00 00 00 - 01 00 00 00 e8 39 13 00 40...........9..
0012feb4  00 00 00 00 00 00 00 00 - 88 fe 12 00 04 00 00 00 ................
0012fec4  b0 ff 12 00 64 11 de 77 - b8 e0 de 77 ff ff ff ff ....d..w...w....
0012fed4  f8 fe 12 00 ca 82 dd 77 - 74 00 00 00 30 30 13 00 .......wt...00..
0012fee4  1a 02 00 00 81 ae 42 00 - 2c 38 13 00 2c 38 13 00 ......B.,8..,8..
0012fef4  74 00 00 00 00 00 00 00 - 45 a8 41 00 0c ff 12 00 t.......E.A.....
0012ff04  81 ae 42 00 2c 38 13 00 - 1c 56 43 00 b0 a8 41 00 ..B.,8...VC...A.
 
State Dump for Thread Id 0x110
 
eax=00000001 ebx=00b82e00 ecx=00000000 edx=00000000 esi=00e7ff2c
edi=00000000
eip=77f682db esp=00e7fa70 ebp=00e7fae0 iopl=0         nv up ei pl nz na pe
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000202
 
 
function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:01f2e477=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 00e7fae0
77f67586 00e7ff2c 00231027 00e7ff2c 004180d1 ntdll!NtWaitForSingleObject 
00e7fc80 00000000 0ec3fc54 000000bf 00000000 0042acd4
ntdll!RtlEnterCriticalSection 
00000001 00000000 00000000 00000000 00000000 00000000 !<nosymbols> 
 
*----> Raw Stack Dump <----*
00e7fa70  61 ce f6 77 f4 00 00 00 - 00 00 00 00 00 00 00 00 a..w............
00e7fa80  2c ff e7 00 94 fc e7 00 - 10 2e b8 00 68 9a 4b 00 ,...........h.K.
00e7fa90  00 00 00 00 00 00 00 00 - b8 fa e7 00 9c 11 e7 77 ...............w
00e7faa0  68 9a 4b 00 eb ff ff ff - 01 00 00 00 46 00 04 00 h.K.........F...
00e7fab0  78 fc e7 00 01 00 00 00 - f4 fa e7 00 be 1b e7 77 x..............w
00e7fac0  68 9a 4b 00 eb ff ff ff - 01 00 00 00 46 00 04 00 h.K.........F...
00e7fad0  c4 46 e7 77 46 00 04 00 - 54 00 00 00 00 00 00 00 .F.wF...T.......
00e7fae0  80 fc e7 00 86 75 f6 77 - 2c ff e7 00 27 10 23 00 .....u.w,...'.#.
00e7faf0  2c ff e7 00 d1 80 41 00 - 46 00 04 00 13 01 00 00 ,.....A.F.......
00e7fb00  fd 4f 41 00 68 9a 4b 00 - 78 fc e7 00 01 00 00 00 .OA.h.K.x.......
00e7fb10  46 00 04 00 80 57 4c 00 - 00 64 6d 69 6e 69 73 74 F....WL..dminist
00e7fb20  72 61 74 6f 72 00 00 10 - 2f 01 06 00 00 00 00 00 rator.../.......
00e7fb30  01 00 00 00 04 fc e7 00 - 00 00 00 00 78 fc e7 00 ............x...
00e7fb40  66 01 00 00 10 2e b8 00 - 02 17 00 10 a9 00 1b 00 f...............
00e7fb50  00 00 00 00 01 00 00 00 - c0 fb e7 00 78 fb e7 00 ............x...
00e7fb60  63 78 e7 77 d0 98 4b 00 - 1c 00 00 00 00 00 00 00 cx.w..K.........
00e7fb70  66 01 00 00 00 00 00 00 - 9c fb e7 00 b5 4b e1 77 f............K.w
00e7fb80  44 00 04 00 1c 00 00 00 - 00 00 00 00 66 01 00 00 D...........f...
00e7fb90  78 fc e7 00 66 01 00 00 - 10 2e b8 00 b8 fb e7 00 x...f...........
00e7fba0  28 d0 b2 77 44 00 04 00 - 1c 00 00 00 00 00 00 00 (..wD...........
 
State Dump for Thread Id 0x175
 
eax=0042a4bc ebx=7766b100 ecx=00b82c80 edx=00000000 esi=00e82790
edi=00000088
eip=77f682db esp=00fffa48 ebp=00fffa9c iopl=0         nv up ei ng nz ac pe
cy
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000293
 
 
function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:020ae44f=????????
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 00fffa9c
77661202 00000088 00000098 00000002 00000004 ntdll!NtWaitForSingleObject 
00ffff04 776bb416 00000098 00000000 00000000 00000000 msafd!<nosymbols> 
00ffff3c 776bb3a1 00000098 00000000 00000000 00000000 ws2_32!WSAAccept 
00ffffb8 77f04ef0 00a70d10 00e7f8bc 00e7f960 00a70d10 ws2_32!accept 
00ffffec 00000000 00000000 00000000 00000000 00000000 kernel32!lstrcmpiW 
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols> 
 
*----> Raw Stack Dump <----*
00fffa48  ce 89 66 77 88 00 00 00 - 01 00 00 00 74 fa ff 00 ..fw........t...
00fffa58  ac 27 e8 00 94 27 e8 00 - 1a 00 00 00 a6 47 27 ac .'...'.......G'.
00fffa68  63 94 c2 01 ff ff ff ff - ff ff ff 7f ff ff ff ff c...............
00fffa78  ff ff ff 7f 00 00 00 00 - 30 90 13 00 ad 1f 6a 77 ........0.....jw
00fffa88  d8 11 66 77 98 00 00 00 - 00 00 00 00 00 00 00 00 ..fw............
00fffa98  00 00 00 00 04 ff ff 00 - 02 12 66 77 88 00 00 00 ..........fw....
00fffaa8  98 00 00 00 02 00 00 00 - 04 00 00 00 00 00 00 00 ................
00fffab8  98 39 91 00 b8 37 91 00 - 66 00 02 00 00 00 00 00 .9...7..f.......
00fffac8  00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
00fffad8  00 00 00 00 00 00 00 00 - 00 00 00 00 e9 03 00 00 ................
00fffae8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffaf8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb08  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb18  01 00 00 00 06 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb28  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb38  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb48  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb58  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb68  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00fffb78  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
 
State Dump for Thread Id 0x183
 
eax=77e17bb7 ebx=00000000 ecx=00130000 edx=00000000 esi=0013fc18
edi=0013e5a8
eip=77f67fa7 esp=0225fdf0 ebp=0225ff90 iopl=0         nv up ei pl nz na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000206
 
 
function: ZwReplyWaitReceivePort
        77f67f9c b890000000       mov     eax,0x90
        77f67fa1 8d542404         lea     edx,[esp+0x4]
ss:0330e7f7=????????
        77f67fa5 cd2e             int     2e
        77f67fa7 c21000           ret     0x10
        77f67faa 8bc0             mov     eax,eax
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 0225ff90
77e17efd 77e17b1b 0013e5a8 0225ffec 00000000 ntdll!ZwReplyWaitReceivePort 
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!I_RpcAllocate 
 
State Dump for Thread Id 0x18e
 
eax=00001000 ebx=00001000 ecx=00000008 edx=03544020 esi=03545000
edi=03b65000
eip=0040887b esp=02ddfdf8 ebp=00b82c98 iopl=0         nv up ei pl nz na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000206
 
 
function: <nosymbols>
        00408860 89442410         mov     [esp+0x10],eax
ss:03e8e7ff=00000000
        00408864 3bf1             cmp     esi,ecx
        00408866 7333             jnb     0040889b
        00408868 2bce             sub     ecx,esi
        0040886a 894c2414         mov     [esp+0x14],ecx
ss:03e8e7ff=00000000
        0040886e 8b4c241c         mov     ecx,[esp+0x1c]
ss:03e8e7ff=00000000
        00408872 8bf8             mov     edi,eax
        00408874 8bc1             mov     eax,ecx
        00408876 8bf2             mov     esi,edx
        00408878 c1e902           shr     ecx,0x2
FAULT ->0040887b f3a5            rep  movsd ds:03545000=????????
es:03b65000=00000000
        0040887d 8bc8             mov     ecx,eax
        0040887f 8b442410         mov     eax,[esp+0x10]
ss:03e8e7ff=00000000
        00408883 83e103           and     ecx,0x3
        00408886 03d3             add     edx,ebx
        00408888 f3a4             rep     movsb         ds:03545000=??
es:03b65000=00
        0040888a 8b4c2414         mov     ecx,[esp+0x14]
ss:03e8e7ff=00000000
        0040888e 03c3             add     eax,ebx
        00408890 49               dec     ecx
        00408891 89442410         mov     [esp+0x10],eax
ss:03e8e7ff=00000000
        00408895 894c2414         mov     [esp+0x14],ecx
ss:03e8e7ff=00000000
        00408899 75d3             jnz     0040886e
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 00b82c98
0030000c 03b00020 00300000 01002020 00ff00ff <nosymbols> 
 
State Dump for Thread Id 0x15a
 
eax=00000000 ebx=00e7ff00 ecx=00000008 edx=00000000 esi=00e7ff2c
edi=00000000
eip=77f682db esp=02edfde0 ebp=02edfe50 iopl=0         nv up ei pl nz na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000 efl=00000206
 
 
function: NtWaitForSingleObject
        77f682d0 b8c5000000       mov     eax,0xc5
        77f682d5 8d542404         lea     edx,[esp+0x4]
ss:03f8e7e7=00000000
        77f682d9 cd2e             int     2e
        77f682db c20c00           ret     0xc
        77f682de 8bc0             mov     eax,eax
 
*----> Stack Back Trace <----*
 
FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name 02edfe50
77f67586 00e7ff2c 00231027 00e7ff2c 00418f8c ntdll!NtWaitForSingleObject 
00b823c0 00136b18 ffffffff 00000000 00000000 00000000
ntdll!RtlEnterCriticalSection 
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com http://www.realvnc.com/mailman/listinfo/vnc-list