I’m having occasional BSOD with SRTSP.SYS on Vista. I can send you a minidump if you get back to me. Here is the stack:
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but …
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8e55484a, The address that the exception occurred at
Arg3: 9a735998, Trap Frame
Arg4: 00000000
Debugging Details:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at “0x%08lx” referenced memory at “0x%08lx”. The memory could not be “%s”.
FAULTING_IP:
SRTSP+184a
8e55484a 668b10 mov dx,word ptr [eax]
TRAP_FRAME: 9a735998 – (.trap ffffffff9a735998)
ErrCode = 00000000
eax=00000008 ebx=00000000 ecx=9a735a3c edx=00000000 esi=9a735af8 edi=9b7fc8e8
eip=8e55484a esp=9a735a0c ebp=9a735a0c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
SRTSP+0x184a:
8e55484a 668b10 mov dx,word ptr [eax] ds:0023:00000008=???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x8E
PROCESS_NAME: bangfs.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8e57305a to 8e55484a
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
9a735a0c 8e57305a 00000008 84c32520 af92a1f8 SRTSP+0x184a
9a735a8c 8e5723b5 9a735af8 af92a1f8 8e5683da SRTSP+0x2005a
9a735ad8 81b60843 84e1c298 9a735af8 9a735b18 SRTSP+0x1f3b5
9a735b34 81b62f10 9a735b7c ac770fb8 9a735b7c fltmgr!FltpPerformPreCallbacks+0x2e5
9a735b48 81b637eb 9a735b7c 00000000 865d8c30 fltmgr!FltpPassThroughInternal+0x32
9a735b64 81b63c07 9a735b7c 865d8c30 84bad708 fltmgr!FltpPassThrough+0x199
9a735b94 81ece681 865d8c30 ac770f00 86e50ea8 fltmgr!FltpDispatch+0xb1
9a735bb8 81c27e86 81b63c35 ac770f00 865d8c30 nt!IovCallDriver+0x252
9a735bcc 81b63c35 86e50ea8 84795b48 ac770f00 nt!IofCallDriver+0x1b
9a735bf8 81ece681 86e50ea8 ac770f00 ac770f00 fltmgr!FltpDispatch+0xdf
9a735c1c 81c27e86 81d94e9e ac770f10 86e50ea8 nt!IovCallDriver+0x252
9a735c30 81d94e9e 848afd90 841eebf0 00000001 nt!IofCallDriver+0x1b
9a735c74 81df3337 848afd90 84d26ea0 00100100 nt!IopCloseFile+0x386
9a735cc4 81df1728 848afd90 001eebf0 00100100 nt!ObpDecrementHandleCount+0x14c
9a735d14 81df17ca ab2c0918 909df0e0 848afd90 nt!ObpCloseHandleTableEntry+0x23a
9a735d44 81df18bc 848afd90 84ce9c01 84ce9c01 nt!ObpCloseHandle+0x73
9a735d58 81c8c96a 00000070 0159ff1c 77d70f34 nt!NtClose+0x20
9a735d58 77d70f34 00000070 0159ff1c 77d70f34 nt!KiFastCallEntry+0x12a
0159ff1c 00000000 00000000 00000000 00000000 0x77d70f34
STACK_COMMAND: kb
FOLLOWUP_IP:
SRTSP+184a
8e55484a 668b10 mov dx,word ptr [eax]
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SRTSP
IMAGE_NAME: SRTSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 455ea17b
SYMBOL_NAME: SRTSP+184a
FAILURE_BUCKET_ID: 0x8E_VRF_SRTSP+184a
BUCKET_ID: 0x8E_VRF_SRTSP+184a
Followup: MachineOwner