Hi there, I have an interesting BSOD. Running the latest stable TightVNC server (1.2.1) on two of my test boxes (Win2K Professional SP2, MagicGraph 256AV video card), I was able to reliably replicate a Win32K.sys BSOD on WinXP running on a Dell C600 (ATI Rage M3 chipset) and on a friend's Dell C600 laptop running Win2K SP2. Both of us are running the latest ATI HCL'd video drivers for the appropriate OS, along with DirectX 8.1.
The steps to repro the problem: 1. Install tightvnc server on Win2k Pro, preferably using the Win2k default MagicGraph 256AV drivers), running as a service. (Logged in as Administrator on the console, FWIW.) 2. Fire up WinVNC 3.3.3r3 or TightVNC viewer 1.2.1 and choose to scale the display 9/10, and try to connect to a TightVNC 1.2.1 server configured in (1) Immediate BSOD in win32k.sys. C:\My Documents\dl>dumpchk.exe c:\WINDOWS\MEMORY.DMP Loading dump file c:\WINDOWS\MEMORY.DMP ----- 32 bit Kernel Full Dump Analysis DUMP_HEADER32: MajorVersion 0000000f MinorVersion 00000a28 DirectoryTableBase 0d8e2000 PfnDataBase 80c4a000 PsLoadedModuleList 80545b28 PsActiveProcessHead 80547b58 MachineImageType 0000014c NumberProcessors 00000001 BugCheckCode 00000050 BugCheckParameter1 bd431002 BugCheckParameter2 00000000 BugCheckParameter3 bf8e2ade BugCheckParameter4 00000000 PaeEnabled 00000000 KdDebuggerDataBlock 80537d60 Physical Memory Description: Number of runs: 3 FileOffset Start Address Length 00001000 00001000 0009e000 0009f000 00100000 00eff000 00f9e000 01000000 0efdb000 Last Page: 0ff78000 0ffda000 KiProcessorBlock at 80544ac0 1 KiProcessorBlock entries: ffdff120 Windows XP Kernel Version 2600 UP Free x86 compatible Built by: 2600.xpclient.010817-1148 Kernel base = 0x804d0000 PsLoadedModuleList = 0x80545b28 Debug session time: Thu Nov 22 16:19:58 2001 System Uptime: 1 days 7:25:16 start end module name 804d0000 806b3f00 nt Checksum: 001EC8BB Timestamp: Sat Aug 18 13:39:59 2001 (3B7DE38F Unloaded modules: f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 15:24:03 2001 (3BFC7DE3) f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 13:23:11 2001 (3BFC618F) f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 13:11:38 2001 (3BFC5EDA) f3052000 f3079000 kmixer.sys Timestamp: Thu Nov 22 09:19:32 2001 (3BFC2874) f3a3d000 f3a64000 kmixer.sys Timestamp: Wed Nov 21 13:05:31 2001 (3BFB0BEB) fa01b000 fa01c000 drmkaud.sys Timestamp: Wed Nov 21 09:28:13 2001 (3BFAD8FD) f3b06000 f3b13000 DMusic.sys Timestamp: Wed Nov 21 09:28:13 2001 (3BFAD8FD) f3bc9000 f3bd7000 swmidi.sys Timestamp: Wed Nov 21 09:28:13 2001 (3BFAD8FD) f3a64000 f3a86000 aec.sys Timestamp: Wed Nov 21 09:28:13 2001 (3BFAD8FD) f9f82000 f9f84000 splitter.sys Timestamp: Wed Nov 21 09:28:12 2001 (3BFAD8FC) f9af2000 f9afc000 Imapi.SYS Timestamp: Wed Nov 21 08:54:57 2001 (3BFAD131) f9d4a000 f9d4f000 Cdaudio.SYS Timestamp: Wed Nov 21 08:54:57 2001 (3BFAD131) f9851000 f9854000 Sfloppy.SYS Timestamp: Wed Nov 21 08:54:57 2001 (3BFAD131) Finished dump check >From eventvwr: Event Type: Information Event Source: Save Dump Event Category: None Event ID: 1001 Date: 22/11/2001 Time: 16:22:25 User: N/A Computer: TINKYWINKY Description: The computer has rebooted from a bugcheck. The bugcheck was: 0x00000050 (0xbd431002, 0x00000000, 0xbf8e2ade, 0x00000000). A dump was saved in: C:\WINDOWS\MEMORY.DMP. For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp. I have a 256 MB dump from the above for anyone who wishes to have a go at diagnosing it. You will need the XP 2600 symbols (which are on the XP cdrom) to make a good go of it. Thanks, Andrew van der Stock, MCSE, Senior Security Architect, e-Secure Pty Ltd "Secure in a Networked World" Phone: (03) 9699 7088 Fax: (03) 9699 7066 Suite 302, 370 St Kilda Rd Mobile: 0412 532 963 Melbourne Victoria Australia Email: [EMAIL PROTECTED] ACN 068 798 194 http://www.e-secure.com.au --------------------------------------------------------------------- To unsubscribe, mail [EMAIL PROTECTED] with the line: 'unsubscribe vnc-list' in the message BODY See also: http://www.uk.research.att.com/vnc/intouch.html ---------------------------------------------------------------------