> If this one is true then this is the problematic code: > In unix/xc/programs/Xserver/os/auth.c function LoadAuthorization > ... > #if !defined(WIN32) && !defined(__UNIXOS2__) > buf = xalloc (strlen(authorization_file) + 5); > if (!buf) > return -1; > sprintf (buf, "cat %s", authorization_file); > f = Popen (buf, "r"); > xfree (buf); > #else > ... do you have a clue why it has to be this weird "pipe from cat" way instead of regular file reading? I just do not see any use case on 'why'?
> This is part of the X server code. I assume that the authorization_file > is the .xauth file, but I have not checked. my guess would be ~/.Xauthority ;-) > There are two possibilities here. Either Popen is buggy, or > the authorization file string contain crap data. A print statement > can reveal this. very very good point... I might have lots of crap there and since noone seems to experience the same problem on the same box using the same VNC server and I at the moment have 11 VNC servers running by different users. but 'xauth list' looks legit... I just removed now about 10 of obsolete entries, but I have no other good way to filter automatically filter from 177 of the others ;-) any of them can be legit -- we have 27 nodes in the cluster, I might have X session forwarded for a few of them now... I guess I will clean it out entirely on the next VNC crash whenever I know for sure that no sessions should be alive. another point is that my home is NFS-mounted -- ie served to this box from our file server. although the network seems to be quite stable eth0 Link encap:Ethernet HWaddr 00:50:45:00:C8:98 RX packets:496933738 errors:0 dropped:0 overruns:0 frame:0 TX packets:781997980 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 eth1 Link encap:Ethernet HWaddr 00:50:45:00:C8:98 RX packets:1300755177 errors:0 dropped:1 overruns:0 frame:0 TX packets:781850420 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 Server rpc stats: calls badcalls badauth badclnt xdrcall 2031424927 0 0 0 0 who knows... > However this may not be the true problem as you have reattached here. > Next time it would be good to know the backtrace. Maybe even check the > backtrace several times. yes -- and to don't close running vnc client -- may be it would be helpful somehow ;-) > Thanks for all your help. Unfortunatly I do not get this problem myself > so I need your help to solve this problem. at least 1 happy user of VNC! ;-) just teasing ;-) I am a heavy abuser of VNC, and actually a lucky person to hit the bugs others do not get. > Best regards, Cheers Yarik > // Ola > > -- > > Yaroslav Halchenko > > Research Assistant, Psychology Department, Rutgers-Newark > > Student Ph.D. @ CS Dept. NJIT > > Office: (973) 353-5440x263 | FWD: 82823 | Fax: (973) 353-1171 > > 101 Warren Str, Smith Hall, Rm 4-105, Newark NJ 07102 > > WWW: http://www.linkedin.com/in/yarik -- Yaroslav Halchenko Research Assistant, Psychology Department, Rutgers-Newark Student Ph.D. @ CS Dept. NJIT Office: (973) 353-5440x263 | FWD: 82823 | Fax: (973) 353-1171 101 Warren Str, Smith Hall, Rm 4-105, Newark NJ 07102 WWW: http://www.linkedin.com/in/yarik