rx.exe C0000005 access violation problem

raymondkwong

New Member
Hi,

We use W2000 terminal server running Progress 9.1D Patch 06. Our users always experienced sudden log off from Progress application and in the Dr Watson Log file of W2000 server, we found the following error.

Any clue?

========================================================

Application exception occurred:
App: Y:/vobs_prgs/nt/dlcbld/bin/rx.exe (pid=5968)
When: 20/8/2003 @ 08:56:39.452
Exception number: c0000005 (access violation)

State Dump for Thread Id 0xd34
eax=001c7bf0 ebx=0012f738 ecx=00000004 edx=00000058 esi=0394d000 edi=001c7c38
eip=77e3ec0f esp=0012f6f8 ebp=0012f714 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: CreateDialogParamA
77e3ebec ff35443ae677 push dword ptr [77e63a44] ds:77e63a44=00130000
77e3ebf2 ff158413e177 call dword ptr [77e11384] ds:77e11384=77fc8c80
77e3ebf8 85c0 test eax,eax
77e3ebfa 8945fc mov [ebp+0xfc],eax ss:0094cce6=????????
77e3ebfd 0f8494000000 je CreateDialogParamA+0x1f0 (77e3ec97)
77e3ec03 8bce mov ecx,esi
77e3ec05 8b7514 mov esi,[ebp+0x14] ss:0094cce6=????????
77e3ec08 8bd1 mov edx,ecx
77e3ec0a 8bf8 mov edi,eax
77e3ec0c c1e902 shr ecx,0x2
FAULT ->77e3ec0f f3a5 rep movsd ds:0394d000=???????? es:001c7c38=00000000
77e3ec11 50 push eax
77e3ec12 6a01 push 0x1
77e3ec14 6a01 push 0x1
77e3ec16 8bca mov ecx,edx
77e3ec18 ff7508 push dword ptr [ebp+0x8] ss:0094cce6=????????
77e3ec1b 83e103 and ecx,0x3
77e3ec1e f3a4 rep movsb ds:0394d000=?? es:001c7c38=00
77e3ec20 ff75f0 push dword ptr [ebp+0xf0] ss:0094cce6=????????
77e3ec23 ff154811e177 call dword ptr [77e11148] ds:77e11148=77f45cd2
77e3ec29 ff75fc push dword ptr [ebp+0xfc] ss:0094cce6=????????
77e3ec2c 894314 mov [ebx+0x14],eax ds:0094cd0a=????????
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012F714 77E3EDDA 0000002C 00000001 00000008 0394CFB8 user32!CreateDialogParamA
0012F78C 100DDF1D 10000000 00000016 00000016 00000101 user32!CreateIcon
0012F814 100DD7B9 10000000 04534A80 03934190 00000022 prow32!ConvertDIBtoICON
0012F9A4 100DC46C 10000000 03934190 0012F9F4 03934190 prow32!wwReadResourceFile
0012FB60 100F9048 00E5085C 00000022 0012FB9C 00000000 prow32!wwLoadGDIObject
0012FBC4 101E464D 03C40078 00000126 00E5083C 00E5084C prow32!wwQueryWindowAttr
0012FC00 1025F9F9 03CD4634 00000126 00E5083C 00E5084C prow32!umWinGetAttr
0012FC1C 101EC4A0 03CD4634 00000126 00E5083C 00E5084C prow32!umClassGetAttr
0012FC98 101F28FC 03CD4634 00000126 00E5083C 00E5084C prow32!umSuperGetAttr
0012FCB8 1002A6A8 03CD4634 00000126 00E5083C 00E5084C prow32!ioGetAttribute
0012FCE0 10013421 0000009D 00E5083C 00000000 03D75698 prow32!fmEWDAX
0012FD68 101BA4CE 03D75694 03D75694 1016EB97 00E5083C prow32!fmeval
0012FD80 1019C6F8 03D66568 03D66568 01E86BA4 00000000 prow32!rnexpstmt
0012FDD4 10188BCB FFFFFFFF 0012FE64 101F3CF8 00000004 prow32!rnexec_entry
0012FDE0 101F3CF8 00000004 00000004 0011F118 00133D02 prow32!rninterpret
0012FE64 1010B5B9 00000000 00000000 00000000 0012FEA0 prow32!umeDispatchEvent
0012FEC0 102F966A 00E74034 0012FED8 1001A483 00000002 prow32!wwRunDispatcher
0012FECC 1001A483 00000002 0012FF08 100063E5 0036F8D4 prow32!iodispatch
0012FED8 100063E5 0036F8D4 00000000 00000000 00000000 prow32!rnrq
0012FF08 1004C6EB 00000010 003626F8 00000084 0012FF24 prow32!drmain
0012FF1C 00401008 0012FFC0 00401148 00400000 00000000 prow32!ProStartup
0012FF24 00401148 00400000 00000000 00133D02 00000003 rx!WinMain
0012FFC0 77EA847C 0011F118 00130000 7FFDF000 C0000005 rx!WinMainCRTStartup
0012FFF0 00000000 00401014 00000000 000000C8 00000100 kernel32!ProcessIdToSessionId
*----> Raw Stack Dump <----*
0012f6f8 8c f7 12 00 16 00 00 00 - 00 00 00 00 16 00 00 00 ................
0012f708 01 00 00 00 89 00 55 00 - f0 7b 1c 00 8c f7 12 00 ......U..{......
0012f718 da ed e3 77 2c 00 00 00 - 01 00 00 00 08 00 00 00 ...w,...........
0012f728 b8 cf 94 03 50 03 8f 03 - 18 f1 11 00 02 3d 13 00 ....P........=..
0012f738 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f748 0b 00 0b 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f758 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f768 00 00 00 00 16 00 00 00 - 16 00 00 00 00 00 00 00 ................
0012f778 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f788 00 00 00 00 14 f8 12 00 - 1d df 0d 10 00 00 00 10 ................
0012f798 16 00 00 00 16 00 00 00 - 01 01 00 00 08 01 00 00 ................
0012f7a8 b8 cf 94 03 50 03 8f 03 - 01 00 00 00 0f 00 85 01 ....P...........
0012f7b8 0f 00 85 01 83 01 05 e0 - 64 1a 9c 00 50 03 8f 03 ........d...P...
0012f7c8 68 4b 53 04 68 00 12 00 - 80 4a 53 04 b8 cf 94 03 hKS.h....JS.....
0012f7d8 40 00 ed 77 5d 00 01 01 - e4 01 ff ff 10 f8 12 00 @..w]...........
0012f7e8 99 01 05 0a 67 01 01 44 - 3c 00 53 04 10 01 00 00 ....g..D<.S.....
0012f7f8 6f 01 01 16 16 00 00 00 - 16 00 00 00 6c 1a 9c 00 o...........l...
0012f808 a5 01 05 b9 90 01 05 c9 - e8 4a 53 04 a4 f9 12 00 .........JS.....
0012f818 b9 d7 0d 10 00 00 00 10 - 80 4a 53 04 90 41 93 03 .........JS..A..
0012f828 22 00 00 00 18 f1 11 00 - 02 3d 13 00 00 00 00 00 "........=......
State Dump for Thread Id 0xd44
eax=778321fe ebx=00000004 ecx=ffffffff edx=00000000 esi=77f88e58 edi=00000004
eip=77f88e63 esp=01c8fd24 ebp=01c8fd70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246

function: NtWaitForMultipleObjects
77f88e58 b8e9000000 mov eax,0xe9
77f88e5d 8d542404 lea edx,[esp+0x4] ss:024ad2f7=????????
77f88e61 cd2e int 2e
77f88e63 c21400 ret 0x14
77f88e66 8bff mov edi,edi
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
01C8FD70 77EA9C13 01C8FD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects
01C8FFB4 77E8B2D8 00000005 00000000 000B000A 00161978 kernel32!WaitForMultipleObjects
01C8FFEC 00000000 778321FE 00161978 00000000 000000C8 kernel32!lstrcmpiW
*----> Raw Stack Dump <----*
01c8fd24 00 9d ea 77 04 00 00 00 - 48 fd c8 01 01 00 00 00 ...w....H.......
01c8fd34 00 00 00 00 00 00 00 00 - 01 00 00 00 78 19 16 00 ............x...
01c8fd44 01 00 00 00 40 01 00 00 - 44 01 00 00 58 01 00 00 ....@...D...X...
01c8fd54 a0 01 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
01c8fd64 00 8d 88 88 30 a0 e1 88 - 04 00 00 00 b4 ff c8 01 ....0...........
01c8fd74 13 9c ea 77 48 fd c8 01 - 01 00 00 00 00 00 00 00 ...wH...........
01c8fd84 00 00 00 00 00 00 00 00 - b2 22 83 77 04 00 00 00 .........".w....
01c8fd94 b0 fe c8 01 00 00 00 00 - ff ff ff ff 78 19 16 00 ............x...
01c8fda4 0a 00 0b 00 00 00 00 00 - 27 22 49 80 01 00 00 00 ........'"I.....
01c8fdb4 60 0b 55 b4 00 00 00 00 - 01 00 00 00 38 00 00 00 `.U.........8...
01c8fdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#...........
01c8fdd4 78 19 16 00 50 00 00 00 - ff ff ff ff fe 21 83 77 x...P........!.w
01c8fde4 db c3 f8 77 50 b6 e8 77 - 1b 00 00 00 00 02 00 00 ...wP..w........
01c8fdf4 fc ff c8 01 23 00 00 00 - 00 00 00 00 92 ab ce 87 ....#...........
01c8fe04 18 a0 e1 88 48 de 4f 88 - 30 a0 e1 88 d0 72 09 89 ....H.O.0....r..
01c8fe14 3c 0b 55 b4 01 00 00 00 - 91 c5 46 80 48 0b 55 b4 <.U.......F.H.U.
01c8fe24 01 00 00 00 91 c5 46 80 - 57 3a 0c 00 28 a8 31 8a ......F.W:..(.1.
01c8fe34 00 07 00 00 d4 cd 44 80 - 57 3a 0c 00 28 a8 31 8a ......D.W:..(.1.
01c8fe44 57 3a 0c 00 28 a8 31 8a - 01 d2 fd 7f e4 f4 df ff W:..(.1.........
01c8fe54 02 00 00 00 1e c3 42 80 - 01 00 00 00 a4 0b 55 b4 ......B.......U.
State Dump for Thread Id 0xef8
eax=77d32778 ebx=80020000 ecx=001a56c0 edx=00000000 esi=0014b410 edi=0014b450
eip=77f88a97 esp=044dfe28 ebp=044dff74 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202

function: ZwReplyWaitReceivePortEx
77f88a8c b8ac000000 mov eax,0xac
77f88a91 8d542404 lea edx,[esp+0x4] ss:04cfd3fb=????????
77f88a95 cd2e int 2e
77f88a97 c21400 ret 0x14
77f88a9a 8bff mov edi,edi
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
044DFF74 77D56D5E 77D39A00 0014B410 00000000 00000000 ntdll!ZwReplyWaitReceivePortEx
044DFFA8 77D41C6D 001E6340 044DFFEC 77E8B2D8 0015D8D8 rpcrt4!TowerConstruct
044DFFB4 77E8B2D8 0015D8D8 00000000 00000000 0015D8D8 rpcrt4!I_RpcServerInqTransportType
044DFFEC 00000000 77D41C55 0015D8D8 00000000 00000000 kernel32!lstrcmpiW
*----> Raw Stack Dump <----*
044dfe28 94 74 d5 77 50 02 00 00 - 54 ff 4d 04 00 00 00 00 .t.wP...T.M.....
044dfe38 20 e1 96 03 00 00 00 00 - 68 3c 14 00 40 63 1e 00 .......h<..@c..
044dfe48 d8 d8 15 00 00 43 74 88 - e0 5e f8 ff ff ff ff ff .....Ct..^......
044dfe58 00 00 00 00 60 5b 96 88 - d0 d8 ea b8 08 2b d5 87 ....`[.......+..
044dfe68 02 20 00 00 18 0b c6 b4 - 3d 00 00 00 ff ff ff ff . ......=.......
044dfe78 80 04 46 80 f0 1c 40 80 - ff ff ff ff 01 00 00 00 ..F...@.........
044dfe88 b6 f5 42 80 48 2b d5 87 - b4 0b c6 b4 a8 0b c6 b4 ..B.H+..........
044dfe98 ac 0b c6 b4 cf f6 42 80 - 28 20 e5 88 08 2b d5 87 ......B.( ...+..
044dfea8 bc 0c c6 b4 3c 35 42 80 - 06 02 00 00 9e f8 42 80 ....<5B.......B.
044dfeb8 ff ff ff ff dd 51 06 80 - c4 0b c6 b4 64 49 06 80 .....Q......dI..
044dfec8 02 53 06 80 e1 00 00 00 - 00 00 00 00 d0 0b c6 b4 .S..............
044dfed8 00 00 00 00 32 00 00 00 - 58 d9 97 b8 28 ba 59 88 ....2...X...(.Y.
044dfee8 10 a2 89 88 e0 f9 1f a0 - 00 02 00 00 34 0c c6 b4 ............4...
044dfef8 65 d9 97 b8 00 00 00 00 - 00 00 00 00 00 00 00 00 e...............
044dff08 9b d2 ea b8 ff ff ff ff - 81 eb 46 80 00 00 00 00 ..........F.....
044dff18 a0 09 8a 88 00 20 09 89 - 00 30 09 89 00 00 00 00 ..... ...0......
044dff28 4f 4c 06 80 08 00 00 00 - e0 e2 78 88 a0 09 8a 88 OL........x.....
044dff38 00 00 00 00 0c 0a 8a 88 - a0 09 8a 88 30 0b 8a 88 ............0...
044dff48 c7 bf 42 80 a0 09 8a 88 - 00 0b 8a 88 00 00 02 80 ..B.............
044dff58 00 a2 2f 4d ff ff ff ff - 50 fe 4d 04 00 00 02 80 ../M....P.M.....
 
Back
Top