Quantcast
Channel: Windows 8.1 Performance forum
Viewing all articles
Browse latest Browse all 1658

BAD_POOL_CALLER BSOD

$
0
0

Hi,

I am getting BSOD with Bad_pool_caller and I have no idea what is causing the problem. I had some BSODs on win8 earlier (now using 8.1 freshly installed) and get the same BSOD. I didn't get one using Windows 7.

Please help and thank you,

Adrian Cristea

P.S. I cannot provide link to dumpfile "until we are able to verify your account".

but I can do this:

"


Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\030414-29343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff803`3ea1d000 PsLoadedModuleList = 0xfffff803`3ece1990
Debug session time: Tue Mar  4 14:06:05.932 2014 (UTC + 2:00)
System Uptime: 0 days 18:42:33.062
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {b, ffffe00004bb2bd8, 0, ffffe00004bb38e8}

*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
*** WARNING: Unable to verify timestamp for kneps.sys
*** ERROR: Module load completed but symbols could not be loaded for kneps.sys
*** WARNING: Unable to verify timestamp for IntcDAud.sys
*** ERROR: Module load completed but symbols could not be loaded for IntcDAud.sys
Probably caused by : NETIO.SYS ( NETIO! ?? ::FNODOBFM::`string'+797c )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000b, type of pool violation the caller is guilty of.
Arg2: ffffe00004bb2bd8
Arg3: 0000000000000000
Arg4: ffffe00004bb38e8

Debugging Details:
------------------


FAULTING_IP:
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01963f67 90              nop

BUGCHECK_STR:  0xc2_b

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8033ecaf46e to fffff8033eb6aca0

STACK_TEXT: 
ffffd000`21fa9008 fffff803`3ecaf46e : 00000000`000000c2 00000000`0000000b ffffe000`04bb2bd8 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21fa9010 fffff800`01963f67 : ffffe000`067d8850 ffffe000`013a4030 ffffe000`065bc901 fffff800`01d46646 : nt!ExFreePoolWithTag+0x119e
ffffd000`21fa90e0 fffff800`01bcbcb4 : ffffe000`0479a702 ffffe000`07d45e60 00000000`00000001 fffff800`01d471c5 : NETIO! ?? ::FNODOBFM::`string'+0x797c
ffffd000`21fa9130 fffff800`01932501 : ffffe000`071937b0 00000000`00000001 00000000`00000000 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd5c54
ffffd000`21fa9180 fffff800`0192f3e7 : ffffe000`013a4030 00000000`00000000 00000000`00000000 ffffe000`065bc9d0 : NETIO!NetioDereferenceNetBufferList+0xb1
ffffd000`21fa91f0 fffff800`01afa55b : 00000000`00000011 fffff800`01c87100 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2a7
ffffd000`21fa92b0 fffff800`01af749a : 00000000`00000000 ffffe000`013a4030 ffffe000`0234a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x55b
ffffd000`21fa93e0 fffff800`01c2cbd8 : ffffe000`077e1b30 00000000`00000000 ffffe000`0230d901 fffff800`02491700 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`21fa9760 fffff800`01d396d5 : ffffd000`21fa9b02 ffffe000`0108f710 ffffd000`21fa9a99 ffffd000`21fa4000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`21fa97c0 fffff803`3ead53f9 : ffffe000`0622ec10 00000000`00001abe ffffe000`0479a710 ffffe000`0479a710 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`21fa9850 fffff800`01d4a6b6 : fffff800`01d395f0 ffffd000`21fa9a20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`21fa99a0 fffff800`026d6003 : ffffe000`0479a710 ffffe000`07d45dc0 fffff800`024a5500 ffffe000`07d45dc0 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`21fa9ae0 ffffe000`0479a710 : ffffe000`07d45dc0 fffff800`024a5500 ffffe000`07d45dc0 ffffd000`21fa0002 : klwfp+0x5003
ffffd000`21fa9ae8 ffffe000`07d45dc0 : fffff800`024a5500 ffffe000`07d45dc0 ffffd000`21fa0002 ffffffff`00000001 : 0xffffe000`0479a710
ffffd000`21fa9af0 fffff800`024a5500 : ffffe000`07d45dc0 ffffd000`21fa0002 ffffffff`00000001 fffff800`00000003 : 0xffffe000`07d45dc0
ffffd000`21fa9af8 ffffe000`07d45dc0 : ffffd000`21fa0002 ffffffff`00000001 fffff800`00000003 fffff800`00000000 : kneps+0x22500
ffffd000`21fa9b00 ffffd000`21fa0002 : ffffffff`00000001 fffff800`00000003 fffff800`00000000 ffffe000`013a4030 : 0xffffe000`07d45dc0
ffffd000`21fa9b08 ffffffff`00000001 : fffff800`00000003 fffff800`00000000 ffffe000`013a4030 fffff800`026d5e64 : 0xffffd000`21fa0002
ffffd000`21fa9b10 fffff800`00000003 : fffff800`00000000 ffffe000`013a4030 fffff800`026d5e64 ffffe000`07d45dc0 : 0xffffffff`00000001
ffffd000`21fa9b18 fffff800`00000000 : ffffe000`013a4030 fffff800`026d5e64 ffffe000`07d45dc0 ffffe000`018561f0 : IntcDAud+0x3
ffffd000`21fa9b20 ffffe000`013a4030 : fffff800`026d5e64 ffffe000`07d45dc0 ffffe000`018561f0 fffff800`024a5540 : IntcDAud
ffffd000`21fa9b28 fffff800`026d5e64 : ffffe000`07d45dc0 ffffe000`018561f0 fffff800`024a5540 fffff800`026d61be : 0xffffe000`013a4030
ffffd000`21fa9b30 ffffe000`07d45dc0 : ffffe000`018561f0 fffff800`024a5540 fffff800`026d61be 00000000`00000000 : klwfp+0x4e64
ffffd000`21fa9b38 ffffe000`018561f0 : fffff800`024a5540 fffff800`026d61be 00000000`00000000 ffffe000`07d45dc0 : 0xffffe000`07d45dc0
ffffd000`21fa9b40 fffff800`024a5540 : fffff800`026d61be 00000000`00000000 ffffe000`07d45dc0 00000000`00000080 : 0xffffe000`018561f0
ffffd000`21fa9b48 fffff800`026d61be : 00000000`00000000 ffffe000`07d45dc0 00000000`00000080 ffffe000`018561f0 : kneps+0x22540
ffffd000`21fa9b50 00000000`00000000 : ffffe000`07d45dc0 00000000`00000080 ffffe000`018561f0 ffffe000`01955870 : klwfp+0x51be


STACK_COMMAND:  kb

FOLLOWUP_IP:
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01963f67 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  NETIO! ?? ::FNODOBFM::`string'+797c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4

IMAGE_VERSION:  6.3.9600.16384

BUCKET_ID_FUNC_OFFSET:  797c

FAILURE_BUCKET_ID:  0xc2_b_NETIO!_??_::FNODOBFM::_string_

BUCKET_ID:  0xc2_b_NETIO!_??_::FNODOBFM::_string_

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_b_netio!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {2004c761-2953-7123-0c48-7c23e2563df0}

Followup: MachineOwner

"


Viewing all articles
Browse latest Browse all 1658

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>