[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference jamin::pathworks32

Title:Digital PATHWORKS 32
Moderator:SPELNK::curless
Created:Fri Nov 01 1996
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:337
Total number of notes:1612

157.0. "Excursion blows up with DECnet" by OTOOA::BELLONI () Tue Mar 11 1997 16:15

    
    This is what happens when I try to run Excursion with DECnet. Works
    fine with TCP/IP. Got both PAthworks DECnet stack and excursion from
    lattest PATHworks32 kit for NT.
    
    Any ideas?
    
    Thanks,
    
    
    Les
    
    
    
    
    Application exception occurred:
            App:  (pid=105)
            When: 3/10/1997 @ 16:7:18.443
            Exception number: c0000005 (access violation)
    
    *----> System Information <----*
            Computer Name: NTS649
            User Name: ojensen
            Number of Processors: 1
            Processor Type: x86 Family 5 Model 2 Stepping 12
            Windows Version: 4.0
            Current Build: 1381
            Current Type: Uniprocessor Free
           
    
    *----> Task List <----*
       0 Idle.exe
       2 System.exe
      21 smss.exe
      26 csrss.exe
      35 WINLOGON.exe
      41 services.exe
      44 lsass.exe
      71 SPOOLSS.exe
      94 LLSSRV.exe
     112 PNLSRV32.exe
     124 PWLOGSVC.exe
     126 PNLT32.exe
     130 PWPRINT.exe
      77 nddeagnt.exe
     145 rcmdsvc.exe
     148 LOCATOR.exe
     157 RPCSS.exe
      45 atsvc.exe
     159 TAPISRV.exe
     171 RASMAN.exe
     200 EXPLORER.exe
     189 inetinfo.exe
     209 FINDFAST.exe
     211 MSOFFICE.exe
     202 RASSRV.exe
     101 rasmon.exe
     180 NTVDM.exe
      64 WINWORD.exe
     100 exchng32.exe
      78 mapisp32.exe
     239 logwin.exe
     105 wxserver.exe
     271 drwtsn32.exe
       0 _Total.exe
    
    (00400000 - 00400000) 
    (77f60000 - 77fbc000) dll\ntdll.dbg
    (76040000 - 7613d000) dll\mfc42.dbg
    (779f0000 - 77a36000) dll\msvcrt.dbg
    (77f00000 - 77f5c000) dll\kernel32.dbg
    (77ed0000 - 77efb000) dll\gdi32.dbg
    (77e70000 - 77ec3000) dll\user32.dbg
    (77dc0000 - 77dff000) dll\advapi32.dbg
    (77e20000 - 77e6f000) dll\rpcrt4.dbg
    (10000000 - 10000000) 
    (00240000 - 00240000) 
    (00250000 - 00250000) 
    (77d80000 - 77db2000) dll\comdlg32.dbg
    (77c40000 - 77d7c000) dll\shell32.dbg
    (77bf0000 - 77c3f000) dll\comctl32.dbg
    (77fd0000 - 77ffa000) dll\winmm.dbg
    (5f000000 - 5f011000) 
    (00e10000 - 00e10000) 
    (776d0000 - 776d8000) dll\wsock32.dbg
    (776b0000 - 776c1000) dll\ws2_32.dbg
    (776a0000 - 776a6000) dll\ws2help.dbg
    (00e30000 - 00e30000) 
    (77a90000 - 77a9b000) dll\version.dbg
    (779c0000 - 779c8000) dll\lz32.dbg
    (00e40000 - 00e47000) .\WinRel/PWEL32.dll
    (00e60000 - 00e60000) 
    (00e80000 - 00e80000) 
    (00e90000 - 00e90000) 
    (01be0000 - 01be0000) 
    (74ff0000 - 74ffc000) dll\rnr20.dbg
    (77660000 - 7766e000) dll\msafd.dbg
    (77690000 - 77699000) dll\wshtcpip.dbg
    (75360000 - 75367000) dll\rasadhlp.dbg
    
    State Dump for Thread Id 0xa9
    
    eax=0000b37e ebx=0051aed0 ecx=00000002 edx=00000002 esi=00000000
    edi=0051aee2
    eip=779f85ed esp=0012fcf4 ebp=0012fcfc iopl=0         nv up ei pl nz ac
    po nc
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000            
    efl=00000216
    
    
    function: rmtmp
            779f85d9 c9               leave
            779f85da c3               ret
            779f85db 83f90c           cmp     ecx,0xc
            779f85de 7620             jbe     rmtmp+0x27c9 (779f8600)
            779f85e0 8bd7             mov     edx,edi
            779f85e2 f7da             neg     edx
            779f85e4 83e203           and     edx,0x3
            779f85e7 2bca             sub     ecx,edx
            779f85e9 8bc1             mov     eax,ecx
            779f85eb 8bca             mov     ecx,edx
    FAULT ->779f85ed f3a4             rep     movsb         ds:00000000=??
    es:0051aee2=00
            779f85ef 8bc8             mov     ecx,eax
            779f85f1 83e003           and     eax,0x3
            779f85f4 c1e902           shr     ecx,0x2
            779f85f7 f3a5            rep  movsd ds:00000000=????????
    es:0051aee2=00000000
            779f85f9 ff2485a0859f77                                 
    ds:0000b37e=????????
                                      jmp     dword ptr [rmtmp+0x2769
    (779f85a0)+eax*4]
            779f8600 f3a4             rep     movsb         ds:00000000=??
    es:0051aee2=00
            779f8602 8b4508           mov     eax,[ebp+0x8]         
    ss:0115e702=????????
            779f8605 5e               pop     esi
            779f8606 5f               pop     edi
            779f8607 c9               leave
            779f8608 c3               ret
    
    *----> Stack Back Trace <----*
    
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    0012fcfc 004697dd 0051aee2 00000000 0000b380 ffffffff msvcrt!rmtmp 
    
    *----> Raw Stack Dump <----*
    0012fcf4  54 fd 12 00 e0 ae 51 00 - 70 b3 be 01 dd 97 46 00 
    T.....Q.p.....F.
    0012fd04  e2 ae 51 00 00 00 00 00 - 80 b3 00 00 ff ff ff ff 
    ..Q.............
    0012fd14  90 fd 12 00 94 fd 12 00 - 01 00 00 00 bd ae 51 00 
    ..............Q.
    0012fd24  00 00 00 00 09 00 00 00 - b0 ae 51 00 ae 91 46 00 
    ..........Q...F.
    0012fd34  01 00 00 00 15 00 00 00 - 90 ae 51 00 58 fd 12 00 
    ..........Q.X...
    0012fd44  54 fd 12 00 cd fd 12 00 - b8 fd 12 00 bf 2a 4b 00 
    T............*K.
    0012fd54  e0 ae 51 00 04 00 00 00 - 53 8f 46 00 14 00 00 00 
    ..Q.....S.F.....
    0012fd64  b8 fd 12 00 94 fd 12 00 - 90 fd 12 00 c0 ff 12 00 
    ................
    0012fd74  02 00 00 00 00 00 00 00 - 02 00 00 00 90 fd 12 00 
    ................
    0012fd84  70 ac 51 00 40 fe 12 00 - 92 43 9f 77 90 ae 51 00 
    [email protected].
    0012fd94  15 00 00 00 00 00 14 00 - 00 00 00 00 06 00 51 48 
    ..............QH
    0012fda4  4f 54 36 34 39 00 89 16 - 40 02 40 43 00 00 00 00 
    OT649...@.@C....
    0012fdb4  00 00 00 00 44 45 43 4e - 45 54 20 61 63 73 72 76  ....DECNET
    acsrv
    0012fdc4  33 20 6a 65 6e 73 65 6e - 00 00 00 00 00 00 00 00  3
    jensen........
    0012fdd4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
    ................
    0012fde4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
    ................
    0012fdf4  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
    ................
    0012fe04  00 00 00 00 8a 16 be 01 - 48 b3 be 01 2b 3d 24 00 
    ........H...+=$.
    0012fe14  70 ac 51 00 40 fe 12 00 - e6 7e 46 00 c0 ff 12 00 
    p.Q.@....~F.....
    0012fe24  01 00 00 00 04 00 00 00 - 02 00 00 00 64 65 63 6e 
    ............decn
    
    State Dump for Thread Id 0xad
    
    eax=00e91800 ebx=001449e0 ecx=00140bb0 edx=00000000 esi=7ffdf000
    edi=00000000
    eip=77f6822b esp=013aff14 ebp=013aff68 iopl=0         nv up ei pl nz ac
    pe cy
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000            
    efl=00000213
    
    
    function: ZwWaitForMultipleObjects
            77f68220 b8c4000000       mov     eax,0xc4
            77f68225 8d542404         lea     edx,[esp+0x4]         
    ss:023de91b=????????
            77f68229 cd2e             int     2e
            77f6822b c21400           ret     0x14
            77f6822e 8bc0             mov     eax,eax
    
    *----> Stack Back Trace <----*
    
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    013aff68 77f1c5c9 00000020 00144d68 00000000 ffffffff
    ntdll!ZwWaitForMultipleObjects 
    013aff84 00e91827 00000020 00144d68 00000000 ffffffff
    kernel32!WaitForMultipleObjects 
    
    *----> Raw Stack Dump <----*
    013aff14  b9 c6 f1 77 20 00 00 00 - e0 49 14 00 01 00 00 00  ...w
    ....I......
    013aff24  00 00 00 00 00 00 00 00 - 1c cc f9 77 f8 eb fd 7f 
    ...........w....
    013aff34  48 4d 14 00 00 00 00 00 - 14 00 a1 0c 00 00 00 00 
    HM..............
    013aff44  0a 40 00 00 00 00 00 00 - 40 24 35 50 ce 82 11 80 
    .@......@$5P....
    013aff54  04 2f b5 fe e0 2e b5 fe - f0 2d b5 fe 00 00 00 00 
    ./.......-......
    013aff64  01 00 00 00 84 ff 3a 01 - c9 c5 f1 77 20 00 00 00 
    ......:....w ...
    013aff74  68 4d 14 00 00 00 00 00 - ff ff ff ff 00 00 00 00 
    hM..............
    013aff84  b8 ff 3a 01 27 18 e9 00 - 20 00 00 00 68 4d 14 00  ..:.'...
    ...hM..
    013aff94  00 00 00 00 ff ff ff ff - 1c cc f9 77 f8 eb fd 7f 
    ...........w....
    013affa4  48 4d 14 00 1e 00 00 00 - 88 53 14 00 1e 00 00 00 
    HM.......S......
    013affb4  48 4d 14 00 ec ff 3a 01 - 32 4f f0 77 48 4d 14 00 
    HM....:.2O.wHM..
    013affc4  1c cc f9 77 f8 eb fd 7f - 48 4d 14 00 f8 eb fd 7f 
    ...w....HM......
    013affd4  c4 ff 3a 01 18 4c e6 77 - ff ff ff ff 5c ae f3 77 
    ..:..L.w....\..w
    013affe4  d0 c1 f3 77 00 00 00 00 - 00 00 00 00 00 00 00 00 
    ...w............
    013afff4  00 18 e9 00 48 4d 14 00 - 00 00 00 00 b0 00 00 00 
    ....HM..........
    013b0004  00 01 00 00 ff ee ff ee - 02 10 00 00 00 00 00 00 
    ................
    013b0014  00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00 00  .........
    ......
    013b0024  00 20 00 00 b7 01 00 00 - ff ef fd 7f 05 00 48 05  .
    ............H.
    013b0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 
    ................
    013b0044  d8 04 3b 01 0f 00 00 00 - f8 ff ff ff 50 00 3b 01 
    ..;.........P.;.
    
    State Dump for Thread Id 0xd4
    
    eax=77661cbd ebx=00000000 ecx=77f84d8c edx=00000000 esi=00000000
    edi=77f68230
    eip=77f6823b esp=020fff44 ebp=020fff98 iopl=0         nv up ei ng nz ac
    pe cy
    cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000            
    efl=00000293
    
    
    function: ZwWaitForSingleObject
            77f68230 b8c5000000       mov     eax,0xc5
            77f68235 8d542404         lea     edx,[esp+0x4]         
    ss:0312e94b=????????
            77f68239 cd2e             int     2e
            77f6823b c20c00           ret     0xc
            77f6823e 8bc0             mov     eax,eax
    
    *----> Stack Back Trace <----*
    
    FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
    020fff98 77661ce9 00000130 ffffffff 00000003 00000004
    ntdll!ZwWaitForSingleObject 
    020fffec 00000000 00000000 00000000 00000000 00000000 msafd!<nosymbols> 
    00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols> 
T.RTitleUserPersonal
Name
DateLines
157.1PEACHS::GHEFFGot a head with wingsTue Mar 11 1997 17:236
No idea.

What're you doing when it happens?  Does anything run?  Does it fail on
startup?

#Gary
157.2More info on problemOTOOA::BELLONIWed Mar 12 1997 14:5014
    Load DECnet portion of PATHWorks. All OK. Load Excursion software next.
    Loads OK. Go and start Excursion server. Boom, Dr. Watson with as
    stated error messages and the Excursion server aborts. 
    
    The same has been reported from a number of our clients who are pulling
    their hair out over this. 
    
    Trying to uninstall pathworks is a chore, as the uninstall is not clean
    and leaves all sorts of stuff behind, especially registry modifications
    which prevent a re-install.
    
    Thanks,
    
    Les
157.3JAMIN::OSMANEric Osman, dtn 226-7122Thu Apr 17 1997 15:426
    
    In .0 you say you can use excursion with tcp o.k.  That implies you
    can start the excursion server.  In .2 you say it blows up as soon as
    you start it.  Which is true ?
    
    /Eric