Starting XNView 1.80 Dr. Watson appears under Windows NT 4.0 SP6a.
Can someone tell me why?
Here the Log:
Microsoft (R) Windows NT (TM) Version 4.00 DrWtsn32
Copyright (C) 1985-1996 Microsoft Corp. Alle Rechte vorbehalten.
Anwendungsausnahme aufgetreten:
Anwendung: (pid=374)
Wann: 6/24/2005 @ 9:15:52.915
Ausnahmenummer: c0000005 (Zugriffsverletzung)
*----> Systeminformationen <----*
Computer-Name: XXXX
Benutzername: XXXX
Prozessoranzahl: 1
Prozessortyp: x86 Family 15 Model 2 Stepping 9
Windows NT-Version: 4.0
Aktuelles Build: 1381
Service Pack: 6
Aktueller Typ: Uniprocessor Free
Firma: XXXX
Besitzer: XXXX
*----> Task-Liste <----*
0 Idle.exe
2 System.exe
20 SMSS.exe
24 CSRSS.exe
34 WINLOGON.exe
40 SERVICES.exe
43 LSASS.exe
71 SPOOLSS.exe
86 ATASecSvc.exe
98 ntrtscan.exe
119 nddeagnt.exe
122 OfcPfwSvc.exe
128 rpcss.exe
131 TIMESERV.exe
135 tmlisten.exe
158 vsmon.exe
155 EXPLORER.exe
177 FP2EE9.exe
183 systray.exe
188 LOADWC.exe
192 soundman.exe
196 point32.exe
198 PROMon.exe
202 PccNTMon.exe
189 loadqm.exe
207 zlclient.exe
211 pdservice.exe
213 LeechGet.exe
214 AcroTray.exe
227 OUTLOOK.exe
232 snapsaver.exe
223 esserver.exe
249 NMSSvc.exe
259 PSTORES.exe
264 mstask.exe
260 sens.exe
319 NiAiServ.exe
333 MAPISP32.exe
372 firefox.exe
374 xnview.exe
356 DRWTSN32.exe
0 _Total.exe
(00400000 - 00400000)
(77f70000 - 77fd1000) dll\ntdll.dbg
(77f00000 - 77f63000) dll\kernel32.dbg
(52180000 - 5218b000) dll\version.dbg
(77c40000 - 77d7f000) dll\shell32.dbg
(78010000 - 78045000) dll\gdi32.dbg
(77e70000 - 77ec2000) dll\user32.dbg
(77dc0000 - 77dff000) dll\advapi32.dbg
(77e10000 - 77e67000) dll\rpcrt4.dbg
(71710000 - 71794000) dll\comctl32.dbg
(779b0000 - 779b8000) dll\lz32.dbg
(774a0000 - 774b7000) dll\avifil32.dbg
(00230000 - 00274000)
(00280000 - 002ab000) dll\winmm.dbg
(75d40000 - 75d5a000) dll\msacm32.dbg
(75af0000 - 75b12000) dll\msvfw32.dbg
(73060000 - 73078000) drv\winspool.dbg
(77d80000 - 77db3000) dll\comdlg32.dbg
(77b80000 - 77c31000) dll\ole32.dbg
(6bc00000 - 6bc0b000) ..\..\bin\i386\free\alcxnt.dll
(10000000 - 10000000)
Statusabbild für Thread-ID 0x171
eax=00000002 ebx=00000016 ecx=3fffffff edx=00000000 esi=fffffffa edi=00132f2a
eip=77fa1c8a esp=0012f2f8 ebp=0012f300 iopl=0 nv dn ei pl nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000607
Funktion: memmove
77fa1c71 83e203 and edx,0x3
77fa1c74 2bca sub ecx,edx
77fa1c76 8bc1 mov eax,ecx
77fa1c78 8bca mov ecx,edx
77fa1c7a f3a4 rep movsb ds:fffffffa=?? es:00132f2a=04
77fa1c7c 8bc8 mov ecx,eax
77fa1c7e 83e003 and eax,0x3
77fa1c81 83ee03 sub esi,0x3
77fa1c84 83ef03 sub edi,0x3
77fa1c87 c1e902 shr ecx,0x2
FEHLER ->77fa1c8a f3a5 rep movsd ds:fffffffa=???????? es:00132f2a=01000004
77fa1c8c ff2485201cfa77 ds:00000002=????????
jmp dword ptr [memmove+0xd0 (77fa1c20)+eax*4]
77fa1c93 90 nop
77fa1c94 f3a4 rep movsb ds:fffffffa=?? es:00132f2a=04
77fa1c96 fc cld
77fa1c97 8b4508 mov eax,[ebp+0x8] ss:0109dd06=????????
77fa1c9a 5e pop esi
77fa1c9b 5f pop edi
77fa1c9c c9 leave
77fa1c9d c3 ret
77fa1c9e cc int 3
77fa1c9f cc int 3
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
0012f300 77c41253 00132f30 00000000 fffffffe 0012f3a0 ntdll!memmove
0012f320 00421097 00000000 0014a1b8 00000000 78011000 shell32!Ordinal25
*----> Raw Stack Dump <----*
0012f2f8 30 2f 13 00 2e 2f 13 00 - 20 f3 12 00 53 12 c4 77 0/.../.. ...S..w
0012f308 30 2f 13 00 00 00 00 00 - fe ff ff ff a0 f3 12 00 0/..............
0012f318 c0 13 0b 01 c9 12 c4 77 - fc 05 02 00 97 10 42 00 .......w......B.
0012f328 00 00 00 00 b8 a1 14 00 - 00 00 00 00 00 10 01 78 ...............x
0012f338 fc 05 02 00 fc 05 02 00 - b8 a1 14 00 80 57 13 00 .............W..
0012f348 00 00 00 00 28 88 14 00 - cc f3 12 00 01 00 00 00 ....(...........
0012f358 00 00 00 30 33 01 00 00 - 8d 06 01 2e fc 05 02 00 ...03...........
0012f368 ed 6a 43 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .jC.............
0012f378 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f388 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0012f398 00 00 00 00 00 00 00 00 - fc 05 02 00 00 00 00 00 ................
0012f3a8 59 00 10 01 21 00 f0 00 - 26 24 01 78 8d 06 01 2e Y...!...&$.x....
0012f3b8 ec f3 12 00 a3 28 76 71 - 8d 06 01 2e b7 00 00 00 .....(vq........
0012f3c8 b3 00 00 00 01 00 00 00 - b7 00 00 00 f8 f3 12 00 ................
0012f3d8 77 27 76 71 8d 06 01 2e - 00 00 00 00 10 00 90 01 w'vq............
0012f3e8 5e 11 01 78 8d 06 01 2e - 10 00 90 01 b3 00 00 00 ^..x............
0012f3f8 78 d3 13 00 b7 00 00 00 - 00 00 01 00 4c f4 12 00 x...........L...
0012f408 83 2c 76 71 8d 06 01 2e - 10 00 90 01 00 00 00 00 .,vq............
0012f418 78 d3 13 00 01 00 00 00 - 60 91 14 00 00 00 00 00 x.......`.......
0012f428 78 d3 13 00 1c 00 00 00 - 10 00 90 01 04 00 00 00 x...............
Statusabbild für Thread-ID 0x118
eax=77e17bf2 ebx=00000000 ecx=00000000 edx=00000000 esi=0013da4c edi=001421d8
eip=77f78067 esp=013efdf0 ebp=013eff90 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000202
Funktion: ZwReplyWaitReceivePort
77f7805c b890000000 mov eax,0x90
77f78061 8d542404 lea edx,[esp+0x4] ss:0235e7f7=????????
77f78065 cd2e int 2e
77f78067 c21000 ret 0x10
77f7806a 8bc0 mov eax,eax
*----> Stack Back Trace <----*
FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name
013eff90 77e17f38 77e17b56 001421d8 013effec 00000000 ntdll!ZwReplyWaitReceivePort
00003a98 00000000 00000000 00000000 00000000 00000000 rpcrt4!I_RpcAllocate
XNView 1.80 crashes under WIN NT. Why?
Moderators: helmut, XnTriq, xnview
Confirmed
The problem of XnView 1.80 on Windows NT 4.0 is confirmed.
Pierre has made a fix and it will be tested on Monday. If there's anybody around with an NT 4 box who wants to test and verify the fix, please contact Pierre or me via personal mail.

Re: Confirmed
Yes, it's fixed in 1.80.1 available mondayhelmut wrote:The problem of XnView 1.80 on Windows NT 4.0 is confirmed.Pierre has made a fix and it will be tested on Monday. If there's anybody around with an NT 4 box who wants to test and verify the fix, please contact Pierre or me via personal mail.
Pierre.