Hi there,
I have an interesting BSOD. Running the latest stable TightVNC server
(1.2.1) on two of my test boxes (Win2K Professional SP2, MagicGraph
256AV video card), I was able to reliably replicate a Win32K.sys BSOD on
WinXP running on a Dell C600 (ATI Rage M3 chipset) and on a friend's
Dell C600 laptop running Win2K SP2. Both of us are running the latest
ATI HCL'd video drivers for the appropriate OS, along with DirectX 8.1.
The steps to repro the problem:
1. Install tightvnc server on Win2k Pro, preferably using the Win2k
default MagicGraph 256AV drivers), running as a service. (Logged in as
Administrator on the console, FWIW.)
2. Fire up WinVNC 3.3.3r3 or TightVNC viewer 1.2.1 and choose to scale
the display 9/10, and try to connect to a TightVNC 1.2.1 server
configured in (1)
Immediate BSOD in win32k.sys.
C:\My Documents\dl>dumpchk.exe c:\WINDOWS\MEMORY.DMP
Loading dump file c:\WINDOWS\MEMORY.DMP
----- 32 bit Kernel Full Dump Analysis
DUMP_HEADER32:
MajorVersion 0000000f
MinorVersion 00000a28
DirectoryTableBase 0d8e2000
PfnDataBase 80c4a000
PsLoadedModuleList 80545b28
PsActiveProcessHead 80547b58
MachineImageType 0000014c
NumberProcessors 00000001
BugCheckCode 00000050
BugCheckParameter1 bd431002
BugCheckParameter2 00000000
BugCheckParameter3 bf8e2ade
BugCheckParameter4 00000000
PaeEnabled 00000000
KdDebuggerDataBlock 80537d60
Physical Memory Description:
Number of runs: 3
FileOffset Start Address Length
00001000 00001000 0009e000
0009f000 00100000 00eff000
00f9e000 01000000 0efdb000
Last Page: 0ff78000 0ffda000
KiProcessorBlock at 80544ac0
1 KiProcessorBlock entries:
ffdff120
Windows XP Kernel Version 2600 UP Free x86 compatible
Built by: 2600.xpclient.010817-1148
Kernel base = 0x804d0000 PsLoadedModuleList = 0x80545b28
Debug session time: Thu Nov 22 16:19:58 2001
System Uptime: 1 days 7:25:16
start end module name
804d0000 806b3f00 nt Checksum: 001EC8BB Timestamp: Sat
Aug 18 13:39:59 2001 (3B7DE38F
Unloaded modules:
f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 15:24:03 2001
(3BFC7DE3)
f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 13:23:11 2001
(3BFC618F)
f2e4b000 f2e72000 kmixer.sys Timestamp: Thu Nov 22 13:11:38 2001
(3BFC5EDA)
f3052000 f3079000 kmixer.sys Timestamp: Thu Nov 22 09:19:32 2001
(3BFC2874)
f3a3d000 f3a64000 kmixer.sys Timestamp: Wed Nov 21 13:05:31 2001
(3BFB0BEB)
fa01b000 fa01c000 drmkaud.sys Timestamp: Wed Nov 21 09:28:13 2001
(3BFAD8FD)
f3b06000 f3b13000 DMusic.sys Timestamp: Wed Nov 21 09:28:13 2001
(3BFAD8FD)
f3bc9000 f3bd7000 swmidi.sys Timestamp: Wed Nov 21 09:28:13 2001
(3BFAD8FD)
f3a64000 f3a86000 aec.sys Timestamp: Wed Nov 21 09:28:13 2001
(3BFAD8FD)
f9f82000 f9f84000 splitter.sys Timestamp: Wed Nov 21 09:28:12 2001
(3BFAD8FC)
f9af2000 f9afc000 Imapi.SYS Timestamp: Wed Nov 21 08:54:57 2001
(3BFAD131)
f9d4a000 f9d4f000 Cdaudio.SYS Timestamp: Wed Nov 21 08:54:57 2001
(3BFAD131)
f9851000 f9854000 Sfloppy.SYS Timestamp: Wed Nov 21 08:54:57 2001
(3BFAD131)
Finished dump check
>From eventvwr:
Event Type: Information
Event Source: Save Dump
Event Category: None
Event ID: 1001
Date: 22/11/2001
Time: 16:22:25
User: N/A
Computer: TINKYWINKY
Description:
The computer has rebooted from a bugcheck. The bugcheck was: 0x00000050
(0xbd431002, 0x00000000, 0xbf8e2ade, 0x00000000). A dump was saved in:
C:\WINDOWS\MEMORY.DMP.
For more information, see Help and Support Center at
http://go.microsoft.com/fwlink/events.asp.
I have a 256 MB dump from the above for anyone who wishes to have a go
at diagnosing it. You will need the XP 2600 symbols (which are on the XP
cdrom) to make a good go of it.
Thanks,
Andrew van der Stock, MCSE, Senior Security Architect, e-Secure Pty Ltd
"Secure in a Networked World" Phone: (03) 9699 7088 Fax: (03) 9699
7066
Suite 302, 370 St Kilda Rd Mobile: 0412 532 963
Melbourne Victoria Australia Email: [EMAIL PROTECTED]
ACN 068 798 194 http://www.e-secure.com.au
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------