Sign in with
Sign up | Sign in
Your question

Asus p7p55 lx bsod need help reading dmp files

Last response: in Motherboards
Share
May 3, 2010 6:27:29 PM

I keep getting blue screens when I start my computer up. I was wondering if anyone can read what my dmp files say is the problem. another problem is how can I get you guys to see my dmp files I know where they are at just do not know how to get them on here.

Also system spec
4 gigs g skill ddr3 memory 1333
into core i3 530 at 2.93
evga gts 250
asus p7p55 lx
roswill 630 watt psu
windows 7 ultimate 64 bit

Here is the first dmp file



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\050310-24601-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Mon May 3 09:07:05.345 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:09.796
Loading Kernel Symbols
...............................................................
......................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1097, 1080109, fffff8a000446ef0}

GetPointerFromAddress: unable to read from fffff80002ac10e0
Probably caused by : ntkrnlmp.exe ( nt!CmpDereferenceNameControlBlockWithLock+d6 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000001080109, Memory contents of the pool block
Arg4: fffff8a000446ef0, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS: fffff8a000446ef0

FREED_POOL_TAG: CMNb

BUGCHECK_STR: 0xc2_7_CMNb

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff800029bc60e to fffff80002889600

STACK_TEXT:
fffff880`031a1ae8 fffff800`029bc60e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`01080109 : nt!KeBugCheckEx
fffff880`031a1af0 fffff800`02b7e7da : 00000000`82020de9 fffff8a0`00000000 fffff8a0`624e4d43 00000000`00000001 : nt!ExFreePool+0xccb
fffff880`031a1ba0 fffff800`02b7e6a4 : fffff8a0`004444a8 00000000`00000001 fffff8a0`00023420 ffffffff`ffffffff : nt!CmpDereferenceNameControlBlockWithLock+0xd6
fffff880`031a1bd0 fffff800`02b7cfc0 : 00000000`00000000 00000000`00000001 00000000`6c414d43 00000000`00000001 : nt!CmpCleanUpKcbCacheWithLock+0x34
fffff880`031a1c00 fffff800`02b7d1cb : 00000000`00000000 00000000`00000001 fffff8a0`00023420 fffff800`02b7cddf : nt!CmpDereferenceKeyControlBlockWithLock+0x150
fffff880`031a1c30 fffff800`02b7d590 : 00000000`00000000 00000000`00000001 fffff8a0`00023420 fffffa80`0370a040 : nt!CmpDereferenceKeyControlBlock+0x11f
fffff880`031a1c80 fffff800`02896861 : fffff800`02b7d4a8 fffff800`02a2e5f8 fffffa80`0370a040 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0xe8
fffff880`031a1cb0 fffff800`02b2ea86 : 41480000`00000004 fffffa80`0370a040 00000000`00000080 fffffa80`0366b9e0 : nt!ExpWorkerThread+0x111
fffff880`031a1d40 fffff800`02867b06 : fffff880`02fd3180 fffffa80`0370a040 fffff880`02fddfc0 ff3fc45f`276d1c86 : nt!PspSystemThreadStartup+0x5a
fffff880`031a1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!CmpDereferenceNameControlBlockWithLock+d6
fffff800`02b7e7da 488b154f09f1ff mov rdx,qword ptr [nt!CmpNameCacheTable (fffff800`02a8f130)]

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!CmpDereferenceNameControlBlockWithLock+d6

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb

FAILURE_BUCKET_ID: X64_0xc2_7_CMNb_nt!CmpDereferenceNameControlBlockWithLock+d6

BUCKET_ID: X64_0xc2_7_CMNb_nt!CmpDereferenceNameControlBlockWithLock+d6

Followup: MachineOwner
---------




Here is the second dmp file




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\050310-24601-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02819000 PsLoadedModuleList = 0xfffff800`02a56e50
Debug session time: Mon May 3 09:07:05.345 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:09.796
Loading Kernel Symbols
...............................................................
......................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1097, 1080109, fffff8a000446ef0}

GetPointerFromAddress: unable to read from fffff80002ac10e0
Probably caused by : ntkrnlmp.exe ( nt!CmpDereferenceNameControlBlockWithLock+d6 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000001080109, Memory contents of the pool block
Arg4: fffff8a000446ef0, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS: fffff8a000446ef0

FREED_POOL_TAG: CMNb

BUGCHECK_STR: 0xc2_7_CMNb

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff800029bc60e to fffff80002889600

STACK_TEXT:
fffff880`031a1ae8 fffff800`029bc60e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`01080109 : nt!KeBugCheckEx
fffff880`031a1af0 fffff800`02b7e7da : 00000000`82020de9 fffff8a0`00000000 fffff8a0`624e4d43 00000000`00000001 : nt!ExFreePool+0xccb
fffff880`031a1ba0 fffff800`02b7e6a4 : fffff8a0`004444a8 00000000`00000001 fffff8a0`00023420 ffffffff`ffffffff : nt!CmpDereferenceNameControlBlockWithLock+0xd6
fffff880`031a1bd0 fffff800`02b7cfc0 : 00000000`00000000 00000000`00000001 00000000`6c414d43 00000000`00000001 : nt!CmpCleanUpKcbCacheWithLock+0x34
fffff880`031a1c00 fffff800`02b7d1cb : 00000000`00000000 00000000`00000001 fffff8a0`00023420 fffff800`02b7cddf : nt!CmpDereferenceKeyControlBlockWithLock+0x150
fffff880`031a1c30 fffff800`02b7d590 : 00000000`00000000 00000000`00000001 fffff8a0`00023420 fffffa80`0370a040 : nt!CmpDereferenceKeyControlBlock+0x11f
fffff880`031a1c80 fffff800`02896861 : fffff800`02b7d4a8 fffff800`02a2e5f8 fffffa80`0370a040 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0xe8
fffff880`031a1cb0 fffff800`02b2ea86 : 41480000`00000004 fffffa80`0370a040 00000000`00000080 fffffa80`0366b9e0 : nt!ExpWorkerThread+0x111
fffff880`031a1d40 fffff800`02867b06 : fffff880`02fd3180 fffffa80`0370a040 fffff880`02fddfc0 ff3fc45f`276d1c86 : nt!PspSystemThreadStartup+0x5a
fffff880`031a1d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!CmpDereferenceNameControlBlockWithLock+d6
fffff800`02b7e7da 488b154f09f1ff mov rdx,qword ptr [nt!CmpNameCacheTable (fffff800`02a8f130)]

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!CmpDereferenceNameControlBlockWithLock+d6

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb

FAILURE_BUCKET_ID: X64_0xc2_7_CMNb_nt!CmpDereferenceNameControlBlockWithLock+d6

BUCKET_ID: X64_0xc2_7_CMNb_nt!CmpDereferenceNameControlBlockWithLock+d6

Followup: MachineOwner
---------
May 4, 2010 3:07:56 AM

bump
January 11, 2014 1:32:45 AM

im curently expercing land of BSOD myself i can help you get the dump files on here. Make a free acount with medafire upload a zip copy of the dump files then click on share and copy the forum post link
!