BSOD on multiple occasions... Error 0x0000007A and 0x000000F4

Page 3 of 7 FirstFirst 12345 ... LastLast

  1. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #21

    Upon restarting my computer I keep getting blue screen and the error is stop 0x000000C9 and dtsoftbus01
      My Computer


  2. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #22

    I was able to get into safe mode and disable verifier... I rebooted computer and was able to get back into windows... Sooo what should I do now? Lol
      My Computer


  3. Posts : 306
    Windows 7 Ultimate x64
       #23

    Now you should post the most recent verifier enabled dumps :)
      My Computer


  4. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #24

    Here are the new dump files as well as old ones..
      My Computer


  5. Posts : 306
    Windows 7 Ultimate x64
       #25

    Don't see the verified enabled dump(s) in that attachment, however, in the latest dump in that (25th at 9am) the dump shows ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.

    Run these tests:

    Hard drive scan usings SeaTools - SeaTools for Windows | Seagate - Both long and short tests
    Disk Check
    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7A, {fffff6fc4000ed08, ffffffffc0000185, b1d57860, fffff88001da1b50}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    GetPointerFromAddress: unable to read from fffff800030be278
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KERNEL_DATA_INPAGE_ERROR (7a)
    The requested page of kernel data could not be read in.  Typically caused by
    a bad block in the paging file or disk controller error. Also see
    KERNEL_STACK_INPAGE_ERROR.
    If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
    it means the disk subsystem has experienced a failure.
    If the error status is 0xC000009A, then it means the request failed because
    a filesystem failed to make forward progress.
    Arguments:
    Arg1: fffff6fc4000ed08, lock type that was held (value 1,2,3, or PTE address)
    Arg2: ffffffffc0000185, error status (normally i/o status code)
    Arg3: 00000000b1d57860, current process (virtual address for lock type 3, or PTE)
    Arg4: fffff88001da1b50, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
    
    Debugging Details:
    ------------------
    
    
    ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
    
    DISK_HARDWARE_ERROR: There was error with disk hardware
    
    BUGCHECK_STR:  0x7a_c0000185
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  fffff880042dd7d0 -- (.trap 0xfffff880042dd7d0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a00699f530 rbx=0000000000000000 rcx=0000000000000000
    rdx=00000000c002001b rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001da1b50 rsp=fffff880042dd968 rbp=0000000000000000
     r8=fffff8a012e2f630  r9=00000000000001a0 r10=fffff880009e9f60
    r11=00000000c002001b r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe cy
    msrpc!NdrpRaisePipeException:
    fffff880`01da1b50 0000            add     byte ptr [rax],al ds:a010:fffff8a0`0699f530=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002efcb52 to fffff80002e8bc40
    
    STACK_TEXT:  
    fffff880`042dd4f8 fffff800`02efcb52 : 00000000`0000007a fffff6fc`4000ed08 ffffffff`c0000185 00000000`b1d57860 : nt!KeBugCheckEx
    fffff880`042dd500 fffff800`02eb36cf : fffffa80`059c4240 fffff880`042dd630 fffff800`030c1500 fffffa80`052fbd98 : nt! ?? ::FNODOBFM::`string'+0x37bba
    fffff880`042dd5e0 fffff800`02e99f59 : 00000000`00000000 00000000`00000008 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x28b
    fffff880`042dd670 fffff800`02e89d6e : 00000000`00000008 fffff880`01da1b50 00000000`00000000 fffff8a0`0699f550 : nt!MmAccessFault+0x1399
    fffff880`042dd7d0 fffff880`01da1b50 : fffff880`01d9bcdb fffff8a0`0699f550 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    fffff880`042dd968 fffff880`01d9bcdb : fffff8a0`0699f550 00000000`00000000 00000000`00000000 fffff8a0`0699f5a0 : msrpc!NdrpRaisePipeException
    fffff880`042dd970 fffff880`01d69090 : 00000000`00000000 fffff800`02e6caba ffffffff`00000001 00000000`00000020 : msrpc!RpcAsyncInitializeHandle+0xa0db
    fffff880`042dd9d0 fffff880`01d8431e : fffff8a0`07a60d50 fffff8a0`0699f530 00000000`00000000 00000000`00000000 : msrpc!Ndr64pCompleteAsyncClientCall+0xc0
    fffff880`042dda50 fffff880`01d842e2 : fffff8a0`07a60d50 fffff880`01d8b4bc fffff8a0`12bfa010 00000000`00000000 : msrpc!Ndr64pCompleteAsyncCall+0x1e
    fffff880`042dda90 fffff880`01dbaf0d : fffff8a0`12bfa010 fffff8a0`12bfa010 00000000`c002001b fffff880`01d8b4bc : msrpc!RpcAsyncCompleteCall+0x42
    fffff880`042ddad0 fffff880`01d845b9 : fffff8a0`07a60d50 fffff8a0`12bfa010 fffff8a0`0fd19530 00000000`00000000 : msrpc!I_RpcCompleteAndFree+0x3d
    fffff880`042ddb10 fffff880`01dae300 : fffff8a0`12bfa010 fffff8a0`040493a0 fffff8a0`040493a0 00000000`00000000 : msrpc!LRPC_BASE_CCALL::IssueNotification+0x59
    fffff880`042ddb50 fffff880`01db8d49 : 00000000`00000010 00000000`00010246 fffff880`042ddba8 00000000`00000018 : msrpc!LRPC_FAST_CCALL::AbortCall+0x20
    fffff880`042ddb80 fffff880`01d9b0e9 : fffff8a0`05a6e000 00000000`00000000 fffff8a0`040493a0 00000000`00000001 : msrpc!LRPC_BASE_CCALL::HandleCancelMessage+0x79
    fffff880`042ddbb0 fffff880`01d846b3 : fffffa80`03e24660 00000000`00000000 00000000`00000080 fffffa80`03e24768 : msrpc!RpcAsyncInitializeHandle+0x949b
    fffff880`042ddca0 fffff800`03126fee : 00000000`083654ea fffff880`00000001 fffff880`042ddd70 fffffa80`052fb870 : msrpc!LrpcKernelBaseRoutine+0x47
    fffff880`042ddd00 fffff800`02e7d5e6 : fffff880`009e8180 fffffa80`052fb870 fffffa80`052fa950 fffff880`01e6a384 : nt!PspSystemThreadStartup+0x5a
    fffff880`042ddd40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !msrpc
        fffff88001da1000-fffff88001da100e  15 bytes - msrpc!NdrpSimpleTypeToExprValue+20
        [ 74 0a 83 f8 06 74 0b 83:3c 00 00 00 5c 00 57 00 ]
        fffff88001da1010-fffff88001da1014  5 bytes - msrpc!NdrpSimpleTypeToExprValue+30 (+0x10)
        [ eb 04 49 0f bf:77 00 73 00 5c ]
        fffff88001da1016-fffff88001da103c  39 bytes - msrpc!NdrpSimpleTypeToExprValue+36 (+0x06)
        [ c6 01 01 eb 40 41 0f b6:53 00 79 00 73 00 74 00 ]
        fffff88001da103e-fffff88001da104b  14 bytes - msrpc!NdrpSimpleTypeToExprValue+5e (+0x28)
        [ 02 c0 e8 6b 96 fe ff cc:6c 00 65 00 20 00 44 00 ]
        fffff88001da104e-fffff88001da1056  9 bytes - msrpc!NdrpSimpleTypeToExprValue+6e (+0x10)
        [ eb c6 49 8b 00 eb c1 41:65 00 73 00 5c 00 73 00 ]
        fffff88001da1058-fffff88001da10bc  101 bytes - msrpc!NdrpSimpleTypeToExprValue+78 (+0x0a)
        [ c6 01 00 48 89 41 08 48:6d 00 61 00 70 00 69 00 ]
        fffff88001da10c0-fffff88001da10cd  14 bytes - msrpc!NdrContextHandleMemorySize+50 (+0x68)
        [ 08 73 0f 48 8b 81 60 01:01 00 00 00 00 00 00 00 ]
        fffff88001da10d0-fffff88001da110f  64 bytes - msrpc!NdrContextHandleMemorySize+60 (+0x10)
        [ 00 00 8b 41 2c 48 83 c4:ff ff 01 00 00 00 00 00 ]
        fffff88001da1111-fffff88001da1122  18 bytes - msrpc!NdrXmitOrRepAsMemorySize+31 (+0x41)
        [ 03 c0 e8 98 95 fe ff cc:00 00 00 56 d6 00 00 64 ]
        fffff88001da1125-fffff88001da1137  19 bytes - msrpc!NdrXmitOrRepAsMemorySize+45 (+0x14)
        [ 03 c0 41 0f b6 00 4c 8d:a8 2c 13 40 dc 9a 12 00 ]
        fffff88001da113a-fffff88001da1144  11 bytes - msrpc!NdrXmitOrRepAsMemorySize+5a (+0x15)
        [ 01 74 31 42 0f b6 8c 08:00 00 65 d6 00 00 69 d6 ]
        fffff88001da1146-fffff88001da115a  21 bytes - msrpc!NdrXmitOrRepAsMemorySize+66 (+0x0c)
        [ 48 8b 43 08 48 8d 14 01:01 00 00 00 00 00 d0 57 ]
        fffff88001da115c-fffff88001da1160  5 bytes - msrpc!NdrXmitOrRepAsMemorySize+7c (+0x16)
        [ 42 0f b6 84 08:06 00 00 00 00 ]
        fffff88001da1162 - msrpc!NdrXmitOrRepAsMemorySize+82 (+0x06)
        [ af:00 ]
        fffff88001da1164-fffff88001da117a  23 bytes - msrpc!NdrXmitOrRepAsMemorySize+84 (+0x02)
        [ 00 48 03 c2 48 89 43 08:6a d6 00 00 6e d6 00 00 ]
        fffff88001da117c-fffff88001da119c  33 bytes - msrpc!NdrXmitOrRepAsMemorySize+9c (+0x18)
        [ 33 ff 48 89 7c 24 48 48:6f d6 00 00 7e d6 00 00 ]
        fffff88001da119e-fffff88001da11e0  67 bytes - msrpc!NdrXmitOrRepAsMemorySize+be (+0x22)
        [ 83 e0 3f 49 8b d0 48 8b:00 00 00 00 00 00 6a d6 ]
        fffff88001da11e2-fffff88001da1242  97 bytes - msrpc!NdrXmitOrRepAsMemorySize+102 (+0x44)
        [ 5c 5f 5e c3 90 90 55 48:2e 13 02 00 00 00 04 00 ]
        fffff88001da1244-fffff88001da1258  21 bytes - msrpc!NdrpRangeMemorySize+24 (+0x62)
        [ 00 4c 03 c0 48 f7 d0 4c:11 00 01 00 00 00 00 00 ]
        fffff88001da125b-fffff88001da1269  15 bytes - msrpc!NdrpRangeMemorySize+3b (+0x17)
        [ 49 03 c8 49 89 49 08 49:00 2d 00 00 00 00 00 00 ]
        fffff88001da126b-fffff88001da1280  22 bytes - msrpc!NdrpRangeMemorySize+4b (+0x10)
        [ 03 c0 e8 3e 94 fe ff cc:00 ff ff 00 00 00 00 00 ]
        fffff88001da1282-fffff88001da1296  21 bytes - msrpc!NdrpRangeMemorySize+62 (+0x17)
        [ 41 8b 49 2c 03 c8 f7 d0:00 00 00 00 00 00 1e d6 ]
        fffff88001da1299-fffff88001da12ec  84 bytes - msrpc!NdrpRangeMemorySize+79 (+0x17)
        [ 03 c1 eb 0d 41 8b 41 2c:00 00 00 94 3f 2e 13 5c ]
        fffff88001da12ee-fffff88001da1302  21 bytes - msrpc!NdrUDTSimpleTypeMemsize+1e (+0x55)
        [ 4d 03 c8 49 f7 d0 4d 23:01 00 00 00 00 00 28 a6 ]
        fffff88001da1304 - msrpc!NdrUDTSimpleTypeMemsize+34 (+0x16)
        [ af:11 ]
        fffff88001da1307-fffff88001da1329  35 bytes - msrpc!NdrUDTSimpleTypeMemsize+37 (+0x03)
        [ 49 03 c9 49 89 4a 08 49:00 00 00 00 00 8a d6 00 ]
        fffff88001da132b-fffff88001da133a  16 bytes - msrpc!NdrUDTSimpleTypeMemsize+5b (+0x24)
        [ 41 01 42 2c 41 8b 42 2c:00 97 d6 00 00 02 00 01 ]
        fffff88001da133c-fffff88001da1388  77 bytes - msrpc!NdrUDTSimpleTypeMemsize+6c (+0x11)
        [ 03 c0 e8 6d 93 fe ff cc:00 00 00 00 98 d6 00 00 ]
        fffff88001da138c-fffff88001da13a9  30 bytes - msrpc!NdrMarshallHandle+3c (+0x50)
        [ 0f ba e1 08 73 32 84 c9:a9 d6 00 00 ad d6 00 00 ]
        fffff88001da13ab-fffff88001da13b2  8 bytes - msrpc!NdrMarshallHandle+5b (+0x1f)
        [ 08 73 0f 49 8b 81 60 01:00 ff ff 01 00 00 00 00 ]
        fffff88001da13b4-fffff88001da13bb  8 bytes - msrpc!NdrMarshallHandle+64 (+0x09)
        [ 00 48 83 a0 e8 00 00 00:a8 fb 3f 02 30 2a 9b 12 ]
        fffff88001da13bd-fffff88001da13d3  23 bytes - msrpc!NdrMarshallHandle+6d (+0x09)
        [ 33 c0 48 83 c4 28 c3 41:00 00 00 00 00 00 00 2c ]
        fffff88001da13d5-fffff88001da13d7  3 bytes - msrpc!NdrMarshallHandle+85 (+0x18)
        [ cc b9 41:ff 01 00 ]
        fffff88001da13d9-fffff88001da140d  53 bytes - msrpc!NdrMarshallHandle+89 (+0x04)
        [ 02 c0 e8 d0 92 fe ff cc:00 00 00 00 00 00 00 84 ]
        fffff88001da140f-fffff88001da1485  119 bytes - msrpc!GenericHandleMgr+1f (+0x36)
        [ 41 8b f1 49 8b e8 4c 8b:ff 2b 00 00 00 00 00 00 ]
        fffff88001da1487-fffff88001da14f0  106 bytes - msrpc!GenericHandleMgr+97 (+0x78)
        [ 02 c0 e8 22 92 fe ff cc:00 c3 d6 00 00 f6 d6 00 ]
        fffff88001da14f2-fffff88001da150b  26 bytes - msrpc!GenericHandleMgr+102 (+0x6b)
        [ d3 48 8b f8 eb 06 48 8b:01 00 00 00 00 00 68 fd ]
        fffff88001da150d-fffff88001da154c  64 bytes - msrpc!GenericHandleMgr+11d (+0x1b)
        [ 02 c0 e8 9c 91 fe ff cc:00 00 00 c6 d6 00 00 de ]
        fffff88001da154f-fffff88001da1554  6 bytes - msrpc!NdrpEndComputeConformanceContext+f (+0x42)
        [ 75 11 48 8b 88 d8:00 00 00 00 00 01 ]
        fffff88001da1558-fffff88001da15aa  83 bytes - msrpc!NdrpEndComputeConformanceContext+18 (+0x09)
        [ 48 85 c9 74 05 e8 8e d1:00 00 00 00 e7 d6 00 00 ]
        fffff88001da15ac-fffff88001da1616  107 bytes - msrpc!NdrpEmbeddedPointerComputeConformanceSetup+3c (+0x54)
        [ 02 c0 e8 fd 90 fe ff cc:f5 d6 00 00 ff ff 01 00 ]
        fffff88001da1618-fffff88001da161b  4 bytes - msrpc!MINICOMPUTE_QUEUE_CONTEXT::DequeConfStruct+8 (+0x6c)
        [ 75 0b b9 43:00 00 00 00 ]
        fffff88001da161d-fffff88001da1650  52 bytes - msrpc!MINICOMPUTE_QUEUE_CONTEXT::DequeConfStruct+d (+0x05)
        [ 02 c0 e8 8c 90 fe ff cc:00 00 00 c4 45 2e 13 dc ]
        fffff88001da1652-fffff88001da1692  65 bytes - msrpc!NDR_USR_MRSHL_BUFSIZE_POINTER_QUEUE_ELEMENT::Dispatch+12 (+0x35)
        [ ff 90 90 90 90 90 90 90:01 00 00 00 00 00 e0 61 ]
        fffff88001da1694-fffff88001da16a2  15 bytes - msrpc!NdrNonConformantStringBufferSize+34 (+0x42)
        [ 00 00 3c 27 76 39 3c 28:1f d7 00 00 23 d7 00 00 ]
        fffff88001da16a4-fffff88001da1706  99 bytes - msrpc!NdrNonConformantStringBufferSize+44 (+0x10)
        [ 00 00 48 83 c9 ff 33 c0:f8 63 2a 13 e0 7f ae 12 ]
        fffff88001da1708-fffff88001da1718  17 bytes - msrpc!NdrNonConformantStringBufferSize+a8 (+0x64)
        [ 02 c0 e8 a1 8f fe ff cc:1f d7 00 00 29 d7 00 00 ]
        fffff88001da171a-fffff88001da172e  21 bytes - msrpc!NdrNonConformantStringBufferSize+ba (+0x12)
        [ 48 8b 6c 24 38 89 46 28:00 00 dc 46 2e 13 00 00 ]
        fffff88001da1730-fffff88001da1801  210 bytes - msrpc!NdrNonConformantStringBufferSize+d0 (+0x16)
        [ 02 c0 e8 79 8f fe ff cc:0a d7 00 00 29 d7 00 00 ]
        fffff88001da1804-fffff88001da180c  9 bytes - msrpc!NdrpUserMemoryValidate+14 (+0xd4)
        [ 00 0a 73 20 48 8b 81 60:42 d7 00 00 08 00 01 00 ]
    WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
    3905 errors : !msrpc (fffff88001da1000-fffff88001da1fff)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  LARGE_4096
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE_4096
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE_4096
    
    Followup: memory_corruption
      My Computer


  6. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #26

    Wierd that the other dumps did not show... i just checked C:/Windows/Minidumps and i have dump files from 5:13PM 6:54PM and 07:38PM today... i just checked the zip file i attached... they are in there... there is 022512-23899-01.dmp (7:38PM), 022512-64381-01.dmp (6:54PM) and 022512-58063-01.dmp (5:13PM)...
      My Computer


  7. Posts : 306
    Windows 7 Ultimate x64
       #27

    Ah, yes! My apologies my friend, I see them now :)

    Driver Verifier blames dtsoftbus01.sys (Daemon Tools, aka a LEGENDARY causer of BSODs in Windows 7) in all three verified dumps. Please uninstall Daemon Tools and report back! :)

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C9, {23e, fffff88002001300, fffff9802b8f2ee0, 0}
    
    Unable to load image \SystemRoot\system32\DRIVERS\GEARAspiWDM.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for GEARAspiWDM.sys
    *** ERROR: Module load completed but symbols could not be loaded for GEARAspiWDM.sys
    *** WARNING: Unable to verify timestamp for dtsoftbus01.sys
    *** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
    Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1300 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
    The IO manager has caught a misbehaving driver.
    Arguments:
    Arg1: 000000000000023e, A driver has marked an IRP pending but didn't return STATUS_PENDING.
    Arg2: fffff88002001300, The address in the driver's code where the error was detected.
    Arg3: fffff9802b8f2ee0, IRP address.
    Arg4: 0000000000000000, Status code.
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0xc9_23e
    
    DRIVER_VERIFIER_IO_VIOLATION_TYPE:  23e
    
    FAULTING_IP: 
    dtsoftbus01+1300
    fffff880`02001300 4053            push    rbx
    
    FOLLOWUP_IP: 
    dtsoftbus01+1300
    fffff880`02001300 4053            push    rbx
    
    IRP_ADDRESS:  fffff9802b8f2ee0
    
    DEVICE_OBJECT: fffffa8004ea2c70
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff800033653dc to fffff80002edbc40
    
    STACK_TEXT:  
    fffff880`03bc06f8 fffff800`033653dc : 00000000`000000c9 00000000`0000023e fffff880`02001300 fffff980`2b8f2ee0 : nt!KeBugCheckEx
    fffff880`03bc0700 fffff800`0336f47a : fffff800`033639f0 fffff880`02001300 fffff980`2b8f2ee0 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
    fffff880`03bc0740 fffff800`0337034e : 00000000`0000023e 00000000`00000000 fffff980`2b8f2ee0 00000000`ffffffff : nt!ViErrorFinishReport+0xda
    fffff880`03bc0790 fffff800`0337b71f : fffffa80`051bdf70 fffffa80`044fcad0 fffffa80`044fcb88 fffff880`0200507c : nt!VfErrorReport6+0x6e
    fffff880`03bc0860 fffff800`0337bb63 : fffffa80`044fcad0 00000000`00000002 fffffa80`04ea2c70 fffff880`020013d0 : nt!IovpCallDriver2+0x13f
    fffff880`03bc08c0 fffff800`03381c2e : fffff980`2b8f2ee0 fffff980`2b8f2ee0 00000000`00000002 fffffa80`04ea2c70 : nt!VfAfterCallDriver+0x353
    fffff880`03bc0910 fffff880`00e580c2 : fffff880`00ed17c0 fffffa80`051b6020 00000000`00000025 fffffa80`044fcad0 : nt!IovCallDriver+0x57e
    fffff880`03bc0970 fffff880`00e6d59f : fffffa80`051e4020 00000000`00000000 fffff880`00000000 fffff880`0228d5d5 : Wdf01000!FxIoTarget::SubmitSync+0x24a
    fffff880`03bc0a20 fffff880`022a1e95 : fffffa80`00000020 fffffa80`051e4020 fffffa80`051b6020 00000000`00000001 : Wdf01000!imp_WdfRequestSend+0x24b
    fffff880`03bc0a70 fffff880`022a22f4 : 00000000`00000000 00000000`00000024 00000000`00000001 fffff880`03bc0c30 : cdrom!DeviceSendRequestSynchronously+0xc9
    fffff880`03bc0ad0 fffff880`022a0f04 : 0000057f`fae4baa8 fffff880`03bc0c30 fffffa80`051cd7b0 00000000`00000024 : cdrom!DeviceSendSrbSynchronously+0x3ec
    fffff880`03bc0c00 fffff880`0229f825 : fffffa80`00000002 fffffa80`051b48c0 fffff880`022973b8 0000057f`fae4baa8 : cdrom!DeviceCacheDeviceInquiryData+0xbc
    fffff880`03bc0cd0 fffff880`00ec29d4 : 00000000`00000000 fffff880`00000010 00000000`0000000c fffff880`00ecb620 : cdrom!DeviceEvtSelfManagedIoInit+0x105
    fffff880`03bc0d10 fffff880`00ec294e : fffffa80`051b3c10 00000000`0000000c fffff880`00ecb620 fffff880`00ecb600 : Wdf01000!FxSelfManagedIoMachine::Init+0x34
    fffff880`03bc0d40 fffff880`00eb6b9b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00ecb620 : Wdf01000!FxSelfManagedIoMachine::ProcessEvent+0x14a
    fffff880`03bc0db0 fffff880`00eb66eb : 00000000`00000312 00000000`00000000 fffff880`00ecb600 fffff6fc`c015c650 : Wdf01000!FxPkgPnp::PowerD0StartingStartSelfManagedIo+0x2f
    fffff880`03bc0de0 fffff880`00eb638e : fffffa80`051b5b60 00000000`00000040 fffff880`00ecb3e0 00000000`00000040 : Wdf01000!FxPkgPnp::PowerEnterNewState+0x1db
    fffff880`03bc0f10 fffff880`00eb606c : 00000000`00000000 00000000`00000040 00000000`00000501 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::PowerProcessEventInner+0x13e
    fffff880`03bc0f80 fffff880`00ec3b5e : 00000000`00000000 00000000`00000501 00000000`00000000 00000000`00000501 : Wdf01000!FxPkgPnp::PowerProcessEvent+0x1d4
    fffff880`03bc1010 fffff880`00ec3abb : 00000000`00000501 00000000`00000000 00000000`00000500 fffff800`033805ec : Wdf01000!FxPkgPnp::NotPowerPolOwnerStarting+0xe
    fffff880`03bc1040 fffff880`00ebf950 : fffffa80`051b5b60 00000000`00000001 00000000`00000000 fffff880`00ec7ff0 : Wdf01000!FxPkgPnp::NotPowerPolicyOwnerEnterNewState+0x1c7
    fffff880`03bc10c0 fffff880`00ebf372 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`051b8e00 : Wdf01000!FxPkgPnp::PowerPolicyProcessEventInner+0x3f8
    fffff880`03bc1130 fffff880`00ebba45 : 00000000`00000000 fffffa80`051b8e00 00000000`00000108 00000000`00000000 : Wdf01000!FxPkgPnp::PowerPolicyProcessEvent+0x1e2
    fffff880`03bc11c0 fffff880`00ebb841 : 00000000`00000101 00000000`00000108 00000000`00000108 05300000`42480860 : Wdf01000!FxPkgPnp::PnpEventHardwareAvailable+0x111
    fffff880`03bc1200 fffff880`00ebb4fe : fffffa80`051b5b60 fffff880`03bc1330 00000000`00000004 fffff880`00eca390 : Wdf01000!FxPkgPnp::PnpEnterNewState+0x1a5
    fffff880`03bc1270 fffff880`00ebb201 : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::PnpProcessEventInner+0x122
    fffff880`03bc12e0 fffff880`00eb2d9c : 00000000`00000000 fffffa80`051b5b60 00000000`00000002 00000000`00000000 : Wdf01000!FxPkgPnp::PnpProcessEvent+0x1b1
    fffff880`03bc1370 fffff880`00eb1dd6 : fffffa80`042cbaa0 00000000`00000002 00000000`00000000 fffffa80`051b5b60 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x20
    fffff880`03bc13a0 fffff880`00e81245 : fffff980`2b8d0d80 fffff980`2b8d0d80 fffffa80`051b56d0 00000000`00000000 : Wdf01000!FxPkgPnp::Dispatch+0x1b2
    fffff880`03bc1410 fffff880`00e8114b : fffff880`03bc14f8 fffff980`2b8d0d80 00000000`00000002 fffffa80`051b56d0 : Wdf01000!FxDevice::Dispatch+0xa9
    fffff880`03bc1440 fffff800`03381c16 : fffff980`2b8d0d80 00000000`00000002 fffffa80`051b56d0 fffff800`0337d37e : Wdf01000!FxDevice::DispatchWithLock+0x93
    fffff880`03bc1480 fffff800`0338452a : fffff980`2b8d0ee0 fffffa80`051b56d0 fffffa80`051b77d0 fffffa80`04e64840 : nt!IovCallDriver+0x566
    fffff880`03bc14e0 fffff800`03381c16 : fffff980`2b8d0d80 00000000`00000002 fffffa80`051b77d0 fffffa80`044fca00 : nt!ViFilterDispatchPnp+0x13a
    fffff880`03bc1510 fffff880`0770e202 : fffffa80`051b77d0 00000000`00000000 fffffa80`051b8190 fffffa80`044fca00 : nt!IovCallDriver+0x566
    fffff880`03bc1570 fffffa80`051b77d0 : 00000000`00000000 fffffa80`051b8190 fffffa80`044fca00 fffff980`2b8d0fb8 : GEARAspiWDM+0x7202
    fffff880`03bc1578 00000000`00000000 : fffffa80`051b8190 fffffa80`044fca00 fffff980`2b8d0fb8 fffffa80`0427f2b8 : 0xfffffa80`051b77d0
    
    
    STACK_COMMAND:  .bugcheck ; kb
    
    SYMBOL_NAME:  dtsoftbus01+1300
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: dtsoftbus01
    
    IMAGE_NAME:  dtsoftbus01.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e9c1bae
    
    FAILURE_BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1300
    
    BUCKET_ID:  X64_0xc9_23e_VRF_dtsoftbus01+1300
    
    Followup: MachineOwner
    Last edited by ePeen; 26 Feb 2012 at 00:39.
      My Computer


  8. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #28

    Daemon Tools is uninstalled... should i enable verifier.exe again? or should i run those hard drive tests first?
      My Computer


  9. Posts : 306
    Windows 7 Ultimate x64
       #29

    According to Driver Verifier, you still have the Daemon Tools driver (dtsoftbus01,sys), so ensure that it was uninstalled properly. Also, yes, go ahead and run those hard drive tests.
      My Computer


  10. Posts : 32
    Windows 7 Home Premium 64-Bit
    Thread Starter
       #30

    Here are my hard drive test results. Im going to download the Dos version and see if i can repair it... i failed some test...

    --------------- SeaTools for Windows v1.2.0.6 ---------------
    2/25/2012 9:21:04 PM
    Model: HM320II
    Serial Number: S1YRJ9GSC15280
    Firmware Revision: 2AC101C4
    Short Generic - Started 2/25/2012 9:21:04 PM
    Short Generic - Pass 2/25/2012 9:23:11 PM
    SMART - Pass 2/25/2012 9:24:01 PM
    Short DST - Started 2/25/2012 9:24:12 PM
    Short DST - FAIL 2/25/2012 9:24:28 PM
    SeaTools Test Code: 6C9AC2A4
    Identify - Started 2/25/2012 9:25:10 PM
    Long Generic - Started 2/25/2012 9:25:21 PM
    Long Generic - FAIL 2/25/2012 9:37:57 PM
    SeaTools Test Code: 6C9AC2A4
      My Computer


 
Page 3 of 7 FirstFirst 12345 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:31.
Find Us