Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD on multiple occasions... Error 0x0000007A and 0x000000F4


25 Feb 2012   #21

Windows 7 Home Premium 64-Bit
 
 

Upon restarting my computer I keep getting blue screen and the error is stop 0x000000C9 and dtsoftbus01


My System SpecsSystem Spec
.

25 Feb 2012   #22

Windows 7 Home Premium 64-Bit
 
 

I was able to get into safe mode and disable verifier... I rebooted computer and was able to get back into windows... Sooo what should I do now? Lol
My System SpecsSystem Spec
25 Feb 2012   #23

Windows 7 Ultimate x64
 
 

Now you should post the most recent verifier enabled dumps
My System SpecsSystem Spec
.


25 Feb 2012   #24

Windows 7 Home Premium 64-Bit
 
 

Here are the new dump files as well as old ones..
My System SpecsSystem Spec
25 Feb 2012   #25

Windows 7 Ultimate x64
 
 

Don't see the verified enabled dump(s) in that attachment, however, in the latest dump in that (25th at 9am) the dump shows ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.

Run these tests:

Quote:
Hard drive scan usings SeaTools - SeaTools for Windows | Seagate - Both long and short tests
Disk Check
Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7A, {fffff6fc4000ed08, ffffffffc0000185, b1d57860, fffff88001da1b50}

*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
GetPointerFromAddress: unable to read from fffff800030be278
Probably caused by : memory_corruption

Followup: memory_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in.  Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fc4000ed08, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000185, error status (normally i/o status code)
Arg3: 00000000b1d57860, current process (virtual address for lock type 3, or PTE)
Arg4: fffff88001da1b50, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.

DISK_HARDWARE_ERROR: There was error with disk hardware

BUGCHECK_STR:  0x7a_c0000185

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880042dd7d0 -- (.trap 0xfffff880042dd7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00699f530 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000c002001b rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001da1b50 rsp=fffff880042dd968 rbp=0000000000000000
 r8=fffff8a012e2f630  r9=00000000000001a0 r10=fffff880009e9f60
r11=00000000c002001b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
msrpc!NdrpRaisePipeException:
fffff880`01da1b50 0000            add     byte ptr [rax],al ds:a010:fffff8a0`0699f530=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002efcb52 to fffff80002e8bc40

STACK_TEXT:  
fffff880`042dd4f8 fffff800`02efcb52 : 00000000`0000007a fffff6fc`4000ed08 ffffffff`c0000185 00000000`b1d57860 : nt!KeBugCheckEx
fffff880`042dd500 fffff800`02eb36cf : fffffa80`059c4240 fffff880`042dd630 fffff800`030c1500 fffffa80`052fbd98 : nt! ?? ::FNODOBFM::`string'+0x37bba
fffff880`042dd5e0 fffff800`02e99f59 : 00000000`00000000 00000000`00000008 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x28b
fffff880`042dd670 fffff800`02e89d6e : 00000000`00000008 fffff880`01da1b50 00000000`00000000 fffff8a0`0699f550 : nt!MmAccessFault+0x1399
fffff880`042dd7d0 fffff880`01da1b50 : fffff880`01d9bcdb fffff8a0`0699f550 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`042dd968 fffff880`01d9bcdb : fffff8a0`0699f550 00000000`00000000 00000000`00000000 fffff8a0`0699f5a0 : msrpc!NdrpRaisePipeException
fffff880`042dd970 fffff880`01d69090 : 00000000`00000000 fffff800`02e6caba ffffffff`00000001 00000000`00000020 : msrpc!RpcAsyncInitializeHandle+0xa0db
fffff880`042dd9d0 fffff880`01d8431e : fffff8a0`07a60d50 fffff8a0`0699f530 00000000`00000000 00000000`00000000 : msrpc!Ndr64pCompleteAsyncClientCall+0xc0
fffff880`042dda50 fffff880`01d842e2 : fffff8a0`07a60d50 fffff880`01d8b4bc fffff8a0`12bfa010 00000000`00000000 : msrpc!Ndr64pCompleteAsyncCall+0x1e
fffff880`042dda90 fffff880`01dbaf0d : fffff8a0`12bfa010 fffff8a0`12bfa010 00000000`c002001b fffff880`01d8b4bc : msrpc!RpcAsyncCompleteCall+0x42
fffff880`042ddad0 fffff880`01d845b9 : fffff8a0`07a60d50 fffff8a0`12bfa010 fffff8a0`0fd19530 00000000`00000000 : msrpc!I_RpcCompleteAndFree+0x3d
fffff880`042ddb10 fffff880`01dae300 : fffff8a0`12bfa010 fffff8a0`040493a0 fffff8a0`040493a0 00000000`00000000 : msrpc!LRPC_BASE_CCALL::IssueNotification+0x59
fffff880`042ddb50 fffff880`01db8d49 : 00000000`00000010 00000000`00010246 fffff880`042ddba8 00000000`00000018 : msrpc!LRPC_FAST_CCALL::AbortCall+0x20
fffff880`042ddb80 fffff880`01d9b0e9 : fffff8a0`05a6e000 00000000`00000000 fffff8a0`040493a0 00000000`00000001 : msrpc!LRPC_BASE_CCALL::HandleCancelMessage+0x79
fffff880`042ddbb0 fffff880`01d846b3 : fffffa80`03e24660 00000000`00000000 00000000`00000080 fffffa80`03e24768 : msrpc!RpcAsyncInitializeHandle+0x949b
fffff880`042ddca0 fffff800`03126fee : 00000000`083654ea fffff880`00000001 fffff880`042ddd70 fffffa80`052fb870 : msrpc!LrpcKernelBaseRoutine+0x47
fffff880`042ddd00 fffff800`02e7d5e6 : fffff880`009e8180 fffffa80`052fb870 fffffa80`052fa950 fffff880`01e6a384 : nt!PspSystemThreadStartup+0x5a
fffff880`042ddd40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
    fffff88001da1000-fffff88001da100e  15 bytes - msrpc!NdrpSimpleTypeToExprValue+20
    [ 74 0a 83 f8 06 74 0b 83:3c 00 00 00 5c 00 57 00 ]
    fffff88001da1010-fffff88001da1014  5 bytes - msrpc!NdrpSimpleTypeToExprValue+30 (+0x10)
    [ eb 04 49 0f bf:77 00 73 00 5c ]
    fffff88001da1016-fffff88001da103c  39 bytes - msrpc!NdrpSimpleTypeToExprValue+36 (+0x06)
    [ c6 01 01 eb 40 41 0f b6:53 00 79 00 73 00 74 00 ]
    fffff88001da103e-fffff88001da104b  14 bytes - msrpc!NdrpSimpleTypeToExprValue+5e (+0x28)
    [ 02 c0 e8 6b 96 fe ff cc:6c 00 65 00 20 00 44 00 ]
    fffff88001da104e-fffff88001da1056  9 bytes - msrpc!NdrpSimpleTypeToExprValue+6e (+0x10)
    [ eb c6 49 8b 00 eb c1 41:65 00 73 00 5c 00 73 00 ]
    fffff88001da1058-fffff88001da10bc  101 bytes - msrpc!NdrpSimpleTypeToExprValue+78 (+0x0a)
    [ c6 01 00 48 89 41 08 48:6d 00 61 00 70 00 69 00 ]
    fffff88001da10c0-fffff88001da10cd  14 bytes - msrpc!NdrContextHandleMemorySize+50 (+0x68)
    [ 08 73 0f 48 8b 81 60 01:01 00 00 00 00 00 00 00 ]
    fffff88001da10d0-fffff88001da110f  64 bytes - msrpc!NdrContextHandleMemorySize+60 (+0x10)
    [ 00 00 8b 41 2c 48 83 c4:ff ff 01 00 00 00 00 00 ]
    fffff88001da1111-fffff88001da1122  18 bytes - msrpc!NdrXmitOrRepAsMemorySize+31 (+0x41)
    [ 03 c0 e8 98 95 fe ff cc:00 00 00 56 d6 00 00 64 ]
    fffff88001da1125-fffff88001da1137  19 bytes - msrpc!NdrXmitOrRepAsMemorySize+45 (+0x14)
    [ 03 c0 41 0f b6 00 4c 8d:a8 2c 13 40 dc 9a 12 00 ]
    fffff88001da113a-fffff88001da1144  11 bytes - msrpc!NdrXmitOrRepAsMemorySize+5a (+0x15)
    [ 01 74 31 42 0f b6 8c 08:00 00 65 d6 00 00 69 d6 ]
    fffff88001da1146-fffff88001da115a  21 bytes - msrpc!NdrXmitOrRepAsMemorySize+66 (+0x0c)
    [ 48 8b 43 08 48 8d 14 01:01 00 00 00 00 00 d0 57 ]
    fffff88001da115c-fffff88001da1160  5 bytes - msrpc!NdrXmitOrRepAsMemorySize+7c (+0x16)
    [ 42 0f b6 84 08:06 00 00 00 00 ]
    fffff88001da1162 - msrpc!NdrXmitOrRepAsMemorySize+82 (+0x06)
    [ af:00 ]
    fffff88001da1164-fffff88001da117a  23 bytes - msrpc!NdrXmitOrRepAsMemorySize+84 (+0x02)
    [ 00 48 03 c2 48 89 43 08:6a d6 00 00 6e d6 00 00 ]
    fffff88001da117c-fffff88001da119c  33 bytes - msrpc!NdrXmitOrRepAsMemorySize+9c (+0x18)
    [ 33 ff 48 89 7c 24 48 48:6f d6 00 00 7e d6 00 00 ]
    fffff88001da119e-fffff88001da11e0  67 bytes - msrpc!NdrXmitOrRepAsMemorySize+be (+0x22)
    [ 83 e0 3f 49 8b d0 48 8b:00 00 00 00 00 00 6a d6 ]
    fffff88001da11e2-fffff88001da1242  97 bytes - msrpc!NdrXmitOrRepAsMemorySize+102 (+0x44)
    [ 5c 5f 5e c3 90 90 55 48:2e 13 02 00 00 00 04 00 ]
    fffff88001da1244-fffff88001da1258  21 bytes - msrpc!NdrpRangeMemorySize+24 (+0x62)
    [ 00 4c 03 c0 48 f7 d0 4c:11 00 01 00 00 00 00 00 ]
    fffff88001da125b-fffff88001da1269  15 bytes - msrpc!NdrpRangeMemorySize+3b (+0x17)
    [ 49 03 c8 49 89 49 08 49:00 2d 00 00 00 00 00 00 ]
    fffff88001da126b-fffff88001da1280  22 bytes - msrpc!NdrpRangeMemorySize+4b (+0x10)
    [ 03 c0 e8 3e 94 fe ff cc:00 ff ff 00 00 00 00 00 ]
    fffff88001da1282-fffff88001da1296  21 bytes - msrpc!NdrpRangeMemorySize+62 (+0x17)
    [ 41 8b 49 2c 03 c8 f7 d0:00 00 00 00 00 00 1e d6 ]
    fffff88001da1299-fffff88001da12ec  84 bytes - msrpc!NdrpRangeMemorySize+79 (+0x17)
    [ 03 c1 eb 0d 41 8b 41 2c:00 00 00 94 3f 2e 13 5c ]
    fffff88001da12ee-fffff88001da1302  21 bytes - msrpc!NdrUDTSimpleTypeMemsize+1e (+0x55)
    [ 4d 03 c8 49 f7 d0 4d 23:01 00 00 00 00 00 28 a6 ]
    fffff88001da1304 - msrpc!NdrUDTSimpleTypeMemsize+34 (+0x16)
    [ af:11 ]
    fffff88001da1307-fffff88001da1329  35 bytes - msrpc!NdrUDTSimpleTypeMemsize+37 (+0x03)
    [ 49 03 c9 49 89 4a 08 49:00 00 00 00 00 8a d6 00 ]
    fffff88001da132b-fffff88001da133a  16 bytes - msrpc!NdrUDTSimpleTypeMemsize+5b (+0x24)
    [ 41 01 42 2c 41 8b 42 2c:00 97 d6 00 00 02 00 01 ]
    fffff88001da133c-fffff88001da1388  77 bytes - msrpc!NdrUDTSimpleTypeMemsize+6c (+0x11)
    [ 03 c0 e8 6d 93 fe ff cc:00 00 00 00 98 d6 00 00 ]
    fffff88001da138c-fffff88001da13a9  30 bytes - msrpc!NdrMarshallHandle+3c (+0x50)
    [ 0f ba e1 08 73 32 84 c9:a9 d6 00 00 ad d6 00 00 ]
    fffff88001da13ab-fffff88001da13b2  8 bytes - msrpc!NdrMarshallHandle+5b (+0x1f)
    [ 08 73 0f 49 8b 81 60 01:00 ff ff 01 00 00 00 00 ]
    fffff88001da13b4-fffff88001da13bb  8 bytes - msrpc!NdrMarshallHandle+64 (+0x09)
    [ 00 48 83 a0 e8 00 00 00:a8 fb 3f 02 30 2a 9b 12 ]
    fffff88001da13bd-fffff88001da13d3  23 bytes - msrpc!NdrMarshallHandle+6d (+0x09)
    [ 33 c0 48 83 c4 28 c3 41:00 00 00 00 00 00 00 2c ]
    fffff88001da13d5-fffff88001da13d7  3 bytes - msrpc!NdrMarshallHandle+85 (+0x18)
    [ cc b9 41:ff 01 00 ]
    fffff88001da13d9-fffff88001da140d  53 bytes - msrpc!NdrMarshallHandle+89 (+0x04)
    [ 02 c0 e8 d0 92 fe ff cc:00 00 00 00 00 00 00 84 ]
    fffff88001da140f-fffff88001da1485  119 bytes - msrpc!GenericHandleMgr+1f (+0x36)
    [ 41 8b f1 49 8b e8 4c 8b:ff 2b 00 00 00 00 00 00 ]
    fffff88001da1487-fffff88001da14f0  106 bytes - msrpc!GenericHandleMgr+97 (+0x78)
    [ 02 c0 e8 22 92 fe ff cc:00 c3 d6 00 00 f6 d6 00 ]
    fffff88001da14f2-fffff88001da150b  26 bytes - msrpc!GenericHandleMgr+102 (+0x6b)
    [ d3 48 8b f8 eb 06 48 8b:01 00 00 00 00 00 68 fd ]
    fffff88001da150d-fffff88001da154c  64 bytes - msrpc!GenericHandleMgr+11d (+0x1b)
    [ 02 c0 e8 9c 91 fe ff cc:00 00 00 c6 d6 00 00 de ]
    fffff88001da154f-fffff88001da1554  6 bytes - msrpc!NdrpEndComputeConformanceContext+f (+0x42)
    [ 75 11 48 8b 88 d8:00 00 00 00 00 01 ]
    fffff88001da1558-fffff88001da15aa  83 bytes - msrpc!NdrpEndComputeConformanceContext+18 (+0x09)
    [ 48 85 c9 74 05 e8 8e d1:00 00 00 00 e7 d6 00 00 ]
    fffff88001da15ac-fffff88001da1616  107 bytes - msrpc!NdrpEmbeddedPointerComputeConformanceSetup+3c (+0x54)
    [ 02 c0 e8 fd 90 fe ff cc:f5 d6 00 00 ff ff 01 00 ]
    fffff88001da1618-fffff88001da161b  4 bytes - msrpc!MINICOMPUTE_QUEUE_CONTEXT::DequeConfStruct+8 (+0x6c)
    [ 75 0b b9 43:00 00 00 00 ]
    fffff88001da161d-fffff88001da1650  52 bytes - msrpc!MINICOMPUTE_QUEUE_CONTEXT::DequeConfStruct+d (+0x05)
    [ 02 c0 e8 8c 90 fe ff cc:00 00 00 c4 45 2e 13 dc ]
    fffff88001da1652-fffff88001da1692  65 bytes - msrpc!NDR_USR_MRSHL_BUFSIZE_POINTER_QUEUE_ELEMENT::Dispatch+12 (+0x35)
    [ ff 90 90 90 90 90 90 90:01 00 00 00 00 00 e0 61 ]
    fffff88001da1694-fffff88001da16a2  15 bytes - msrpc!NdrNonConformantStringBufferSize+34 (+0x42)
    [ 00 00 3c 27 76 39 3c 28:1f d7 00 00 23 d7 00 00 ]
    fffff88001da16a4-fffff88001da1706  99 bytes - msrpc!NdrNonConformantStringBufferSize+44 (+0x10)
    [ 00 00 48 83 c9 ff 33 c0:f8 63 2a 13 e0 7f ae 12 ]
    fffff88001da1708-fffff88001da1718  17 bytes - msrpc!NdrNonConformantStringBufferSize+a8 (+0x64)
    [ 02 c0 e8 a1 8f fe ff cc:1f d7 00 00 29 d7 00 00 ]
    fffff88001da171a-fffff88001da172e  21 bytes - msrpc!NdrNonConformantStringBufferSize+ba (+0x12)
    [ 48 8b 6c 24 38 89 46 28:00 00 dc 46 2e 13 00 00 ]
    fffff88001da1730-fffff88001da1801  210 bytes - msrpc!NdrNonConformantStringBufferSize+d0 (+0x16)
    [ 02 c0 e8 79 8f fe ff cc:0a d7 00 00 29 d7 00 00 ]
    fffff88001da1804-fffff88001da180c  9 bytes - msrpc!NdrpUserMemoryValidate+14 (+0xd4)
    [ 00 0a 73 20 48 8b 81 60:42 d7 00 00 08 00 01 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
3905 errors : !msrpc (fffff88001da1000-fffff88001da1fff)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE_4096

FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE_4096

BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE_4096

Followup: memory_corruption
My System SpecsSystem Spec
25 Feb 2012   #26

Windows 7 Home Premium 64-Bit
 
 

Wierd that the other dumps did not show... i just checked C:/Windows/Minidumps and i have dump files from 5:13PM 6:54PM and 07:38PM today... i just checked the zip file i attached... they are in there... there is 022512-23899-01.dmp (7:38PM), 022512-64381-01.dmp (6:54PM) and 022512-58063-01.dmp (5:13PM)...
My System SpecsSystem Spec
26 Feb 2012   #27

Windows 7 Ultimate x64
 
 

Ah, yes! My apologies my friend, I see them now

Driver Verifier blames dtsoftbus01.sys (Daemon Tools, aka a LEGENDARY causer of BSODs in Windows 7) in all three verified dumps. Please uninstall Daemon Tools and report back!

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C9, {23e, fffff88002001300, fffff9802b8f2ee0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\GEARAspiWDM.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for GEARAspiWDM.sys
*** ERROR: Module load completed but symbols could not be loaded for GEARAspiWDM.sys
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1300 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000023e, A driver has marked an IRP pending but didn't return STATUS_PENDING.
Arg2: fffff88002001300, The address in the driver's code where the error was detected.
Arg3: fffff9802b8f2ee0, IRP address.
Arg4: 0000000000000000, Status code.

Debugging Details:
------------------


BUGCHECK_STR:  0xc9_23e

DRIVER_VERIFIER_IO_VIOLATION_TYPE:  23e

FAULTING_IP: 
dtsoftbus01+1300
fffff880`02001300 4053            push    rbx

FOLLOWUP_IP: 
dtsoftbus01+1300
fffff880`02001300 4053            push    rbx

IRP_ADDRESS:  fffff9802b8f2ee0

DEVICE_OBJECT: fffffa8004ea2c70

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff800033653dc to fffff80002edbc40

STACK_TEXT:  
fffff880`03bc06f8 fffff800`033653dc : 00000000`000000c9 00000000`0000023e fffff880`02001300 fffff980`2b8f2ee0 : nt!KeBugCheckEx
fffff880`03bc0700 fffff800`0336f47a : fffff800`033639f0 fffff880`02001300 fffff980`2b8f2ee0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`03bc0740 fffff800`0337034e : 00000000`0000023e 00000000`00000000 fffff980`2b8f2ee0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`03bc0790 fffff800`0337b71f : fffffa80`051bdf70 fffffa80`044fcad0 fffffa80`044fcb88 fffff880`0200507c : nt!VfErrorReport6+0x6e
fffff880`03bc0860 fffff800`0337bb63 : fffffa80`044fcad0 00000000`00000002 fffffa80`04ea2c70 fffff880`020013d0 : nt!IovpCallDriver2+0x13f
fffff880`03bc08c0 fffff800`03381c2e : fffff980`2b8f2ee0 fffff980`2b8f2ee0 00000000`00000002 fffffa80`04ea2c70 : nt!VfAfterCallDriver+0x353
fffff880`03bc0910 fffff880`00e580c2 : fffff880`00ed17c0 fffffa80`051b6020 00000000`00000025 fffffa80`044fcad0 : nt!IovCallDriver+0x57e
fffff880`03bc0970 fffff880`00e6d59f : fffffa80`051e4020 00000000`00000000 fffff880`00000000 fffff880`0228d5d5 : Wdf01000!FxIoTarget::SubmitSync+0x24a
fffff880`03bc0a20 fffff880`022a1e95 : fffffa80`00000020 fffffa80`051e4020 fffffa80`051b6020 00000000`00000001 : Wdf01000!imp_WdfRequestSend+0x24b
fffff880`03bc0a70 fffff880`022a22f4 : 00000000`00000000 00000000`00000024 00000000`00000001 fffff880`03bc0c30 : cdrom!DeviceSendRequestSynchronously+0xc9
fffff880`03bc0ad0 fffff880`022a0f04 : 0000057f`fae4baa8 fffff880`03bc0c30 fffffa80`051cd7b0 00000000`00000024 : cdrom!DeviceSendSrbSynchronously+0x3ec
fffff880`03bc0c00 fffff880`0229f825 : fffffa80`00000002 fffffa80`051b48c0 fffff880`022973b8 0000057f`fae4baa8 : cdrom!DeviceCacheDeviceInquiryData+0xbc
fffff880`03bc0cd0 fffff880`00ec29d4 : 00000000`00000000 fffff880`00000010 00000000`0000000c fffff880`00ecb620 : cdrom!DeviceEvtSelfManagedIoInit+0x105
fffff880`03bc0d10 fffff880`00ec294e : fffffa80`051b3c10 00000000`0000000c fffff880`00ecb620 fffff880`00ecb600 : Wdf01000!FxSelfManagedIoMachine::Init+0x34
fffff880`03bc0d40 fffff880`00eb6b9b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00ecb620 : Wdf01000!FxSelfManagedIoMachine::ProcessEvent+0x14a
fffff880`03bc0db0 fffff880`00eb66eb : 00000000`00000312 00000000`00000000 fffff880`00ecb600 fffff6fc`c015c650 : Wdf01000!FxPkgPnp::PowerD0StartingStartSelfManagedIo+0x2f
fffff880`03bc0de0 fffff880`00eb638e : fffffa80`051b5b60 00000000`00000040 fffff880`00ecb3e0 00000000`00000040 : Wdf01000!FxPkgPnp::PowerEnterNewState+0x1db
fffff880`03bc0f10 fffff880`00eb606c : 00000000`00000000 00000000`00000040 00000000`00000501 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::PowerProcessEventInner+0x13e
fffff880`03bc0f80 fffff880`00ec3b5e : 00000000`00000000 00000000`00000501 00000000`00000000 00000000`00000501 : Wdf01000!FxPkgPnp::PowerProcessEvent+0x1d4
fffff880`03bc1010 fffff880`00ec3abb : 00000000`00000501 00000000`00000000 00000000`00000500 fffff800`033805ec : Wdf01000!FxPkgPnp::NotPowerPolOwnerStarting+0xe
fffff880`03bc1040 fffff880`00ebf950 : fffffa80`051b5b60 00000000`00000001 00000000`00000000 fffff880`00ec7ff0 : Wdf01000!FxPkgPnp::NotPowerPolicyOwnerEnterNewState+0x1c7
fffff880`03bc10c0 fffff880`00ebf372 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`051b8e00 : Wdf01000!FxPkgPnp::PowerPolicyProcessEventInner+0x3f8
fffff880`03bc1130 fffff880`00ebba45 : 00000000`00000000 fffffa80`051b8e00 00000000`00000108 00000000`00000000 : Wdf01000!FxPkgPnp::PowerPolicyProcessEvent+0x1e2
fffff880`03bc11c0 fffff880`00ebb841 : 00000000`00000101 00000000`00000108 00000000`00000108 05300000`42480860 : Wdf01000!FxPkgPnp::PnpEventHardwareAvailable+0x111
fffff880`03bc1200 fffff880`00ebb4fe : fffffa80`051b5b60 fffff880`03bc1330 00000000`00000004 fffff880`00eca390 : Wdf01000!FxPkgPnp::PnpEnterNewState+0x1a5
fffff880`03bc1270 fffff880`00ebb201 : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::PnpProcessEventInner+0x122
fffff880`03bc12e0 fffff880`00eb2d9c : 00000000`00000000 fffffa80`051b5b60 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp::PnpProcessEvent+0x1b1
fffff880`03bc1370 fffff880`00eb1dd6 : fffffa80`042cbaa0 00000000`00000002 00000000`00000000 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x20
fffff880`03bc13a0 fffff880`00e81245 : fffff980`2b8d0d80 fffff980`2b8d0d80 fffffa80`051b56d0 00000000`00000000 : Wdf01000!FxPkgPnp::Dispatch+0x1b2
fffff880`03bc1410 fffff880`00e8114b : fffff880`03bc14f8 fffff980`2b8d0d80 00000000`00000002 fffffa80`051b56d0 : Wdf01000!FxDevice::Dispatch+0xa9
fffff880`03bc1440 fffff800`03381c16 : fffff980`2b8d0d80 00000000`00000002 fffffa80`051b56d0 fffff800`0337d37e : Wdf01000!FxDevice::DispatchWithLock+0x93
fffff880`03bc1480 fffff800`0338452a : fffff980`2b8d0ee0 fffffa80`051b56d0 fffffa80`051b77d0 fffffa80`04e64840 : nt!IovCallDriver+0x566
fffff880`03bc14e0 fffff800`03381c16 : fffff980`2b8d0d80 00000000`00000002 fffffa80`051b77d0 fffffa80`044fca00 : nt!ViFilterDispatchPnp+0x13a
fffff880`03bc1510 fffff880`0770e202 : fffffa80`051b77d0 00000000`00000000 fffffa80`051b8190 fffffa80`044fca00 : nt!IovCallDriver+0x566
fffff880`03bc1570 fffffa80`051b77d0 : 00000000`00000000 fffffa80`051b8190 fffffa80`044fca00 fffff980`2b8d0fb8 : GEARAspiWDM+0x7202
fffff880`03bc1578 00000000`00000000 : fffffa80`051b8190 fffffa80`044fca00 fffff980`2b8d0fb8 fffffa80`0427f2b8 : 0xfffffa80`051b77d0


STACK_COMMAND:  .bugcheck ; kb

SYMBOL_NAME:  dtsoftbus01+1300

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dtsoftbus01

IMAGE_NAME:  dtsoftbus01.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4e9c1bae

FAILURE_BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1300

BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1300

Followup: MachineOwner
My System SpecsSystem Spec
26 Feb 2012   #28

Windows 7 Home Premium 64-Bit
 
 

Daemon Tools is uninstalled... should i enable verifier.exe again? or should i run those hard drive tests first?
My System SpecsSystem Spec
26 Feb 2012   #29

Windows 7 Ultimate x64
 
 

According to Driver Verifier, you still have the Daemon Tools driver (dtsoftbus01,sys), so ensure that it was uninstalled properly. Also, yes, go ahead and run those hard drive tests.
My System SpecsSystem Spec
26 Feb 2012   #30

Windows 7 Home Premium 64-Bit
 
 

Here are my hard drive test results. Im going to download the Dos version and see if i can repair it... i failed some test...

--------------- SeaTools for Windows v1.2.0.6 ---------------
2/25/2012 9:21:04 PM
Model: HM320II
Serial Number: S1YRJ9GSC15280
Firmware Revision: 2AC101C4
Short Generic - Started 2/25/2012 9:21:04 PM
Short Generic - Pass 2/25/2012 9:23:11 PM
SMART - Pass 2/25/2012 9:24:01 PM
Short DST - Started 2/25/2012 9:24:12 PM
Short DST - FAIL 2/25/2012 9:24:28 PM
SeaTools Test Code: 6C9AC2A4
Identify - Started 2/25/2012 9:25:10 PM
Long Generic - Started 2/25/2012 9:25:21 PM
Long Generic - FAIL 2/25/2012 9:37:57 PM
SeaTools Test Code: 6C9AC2A4
My System SpecsSystem Spec
Reply

 BSOD on multiple occasions... Error 0x0000007A and 0x000000F4




Thread Tools



Similar help and support threads for2: BSOD on multiple occasions... Error 0x0000007A and 0x000000F4
Thread Forum
Solved BSOD after every boot up, errors 0x000000f4 and 0x0000007a BSOD Help and Support
BSOD Randomly and Under Load, Errors 0x000000F4 and 0x0000007a BSOD Help and Support
Random multiple BSOD, error 0x000000f4 BSOD Help and Support
Solved BSOD playing Shank... on multiple occasions; error 0x0D1 BSOD Help and Support
BSOD multiple firefox tabs error Stop 0x0000007A BSOD Help and Support
BSOD, Kernel_Data_Inpage_Error, 0x000000F4 and 0x0000007A BSOD Help and Support
BSOD 0x0000007a Sometimes 0x000000F4 BSOD Help and Support

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 05:02 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33