Hi,
I am getting BSOD with Bad_pool_caller and I have no idea what is causing the problem. I had some BSODs on win8 earlier (now using 8.1 freshly installed) and get the same BSOD. I didn't get one using Windows 7.
Please help and thank you,
Adrian Cristea
P.S. I cannot provide link to dumpfile "until we are able to verify your account".
but I can do this:
"
Microsoft (R) Windows Debugger Version 6.3.9600.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\030414-29343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff803`3ea1d000 PsLoadedModuleList = 0xfffff803`3ece1990
Debug session time: Tue Mar 4 14:06:05.932 2014 (UTC + 2:00)
System Uptime: 0 days 18:42:33.062
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
......................................
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {b, ffffe00004bb2bd8, 0, ffffe00004bb38e8}
*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
*** WARNING: Unable to verify timestamp for kneps.sys
*** ERROR: Module load completed but symbols could not be loaded for kneps.sys
*** WARNING: Unable to verify timestamp for IntcDAud.sys
*** ERROR: Module load completed but symbols could not be loaded for IntcDAud.sys
Probably caused by : NETIO.SYS ( NETIO! ?? ::FNODOBFM::`string'+797c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 000000000000000b, type of pool violation the caller is guilty of.
Arg2: ffffe00004bb2bd8
Arg3: 0000000000000000
Arg4: ffffe00004bb38e8
Debugging Details:
------------------
FAULTING_IP:
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01963f67 90 nop
BUGCHECK_STR: 0xc2_b
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff8033ecaf46e to fffff8033eb6aca0
STACK_TEXT:
ffffd000`21fa9008 fffff803`3ecaf46e : 00000000`000000c2 00000000`0000000b ffffe000`04bb2bd8 00000000`00000000 : nt!KeBugCheckEx
ffffd000`21fa9010 fffff800`01963f67 : ffffe000`067d8850 ffffe000`013a4030 ffffe000`065bc901 fffff800`01d46646 : nt!ExFreePoolWithTag+0x119e
ffffd000`21fa90e0 fffff800`01bcbcb4 : ffffe000`0479a702 ffffe000`07d45e60 00000000`00000001 fffff800`01d471c5 : NETIO! ?? ::FNODOBFM::`string'+0x797c
ffffd000`21fa9130 fffff800`01932501 : ffffe000`071937b0 00000000`00000001 00000000`00000000 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd5c54
ffffd000`21fa9180 fffff800`0192f3e7 : ffffe000`013a4030 00000000`00000000 00000000`00000000 ffffe000`065bc9d0 : NETIO!NetioDereferenceNetBufferList+0xb1
ffffd000`21fa91f0 fffff800`01afa55b : 00000000`00000011 fffff800`01c87100 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2a7
ffffd000`21fa92b0 fffff800`01af749a : 00000000`00000000 ffffe000`013a4030 ffffe000`0234a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x55b
ffffd000`21fa93e0 fffff800`01c2cbd8 : ffffe000`077e1b30 00000000`00000000 ffffe000`0230d901 fffff800`02491700 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`21fa9760 fffff800`01d396d5 : ffffd000`21fa9b02 ffffe000`0108f710 ffffd000`21fa9a99 ffffd000`21fa4000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`21fa97c0 fffff803`3ead53f9 : ffffe000`0622ec10 00000000`00001abe ffffe000`0479a710 ffffe000`0479a710 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`21fa9850 fffff800`01d4a6b6 : fffff800`01d395f0 ffffd000`21fa9a20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`21fa99a0 fffff800`026d6003 : ffffe000`0479a710 ffffe000`07d45dc0 fffff800`024a5500 ffffe000`07d45dc0 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`21fa9ae0 ffffe000`0479a710 : ffffe000`07d45dc0 fffff800`024a5500 ffffe000`07d45dc0 ffffd000`21fa0002 : klwfp+0x5003
ffffd000`21fa9ae8 ffffe000`07d45dc0 : fffff800`024a5500 ffffe000`07d45dc0 ffffd000`21fa0002 ffffffff`00000001 : 0xffffe000`0479a710
ffffd000`21fa9af0 fffff800`024a5500 : ffffe000`07d45dc0 ffffd000`21fa0002 ffffffff`00000001 fffff800`00000003 : 0xffffe000`07d45dc0
ffffd000`21fa9af8 ffffe000`07d45dc0 : ffffd000`21fa0002 ffffffff`00000001 fffff800`00000003 fffff800`00000000 : kneps+0x22500
ffffd000`21fa9b00 ffffd000`21fa0002 : ffffffff`00000001 fffff800`00000003 fffff800`00000000 ffffe000`013a4030 : 0xffffe000`07d45dc0
ffffd000`21fa9b08 ffffffff`00000001 : fffff800`00000003 fffff800`00000000 ffffe000`013a4030 fffff800`026d5e64 : 0xffffd000`21fa0002
ffffd000`21fa9b10 fffff800`00000003 : fffff800`00000000 ffffe000`013a4030 fffff800`026d5e64 ffffe000`07d45dc0 : 0xffffffff`00000001
ffffd000`21fa9b18 fffff800`00000000 : ffffe000`013a4030 fffff800`026d5e64 ffffe000`07d45dc0 ffffe000`018561f0 : IntcDAud+0x3
ffffd000`21fa9b20 ffffe000`013a4030 : fffff800`026d5e64 ffffe000`07d45dc0 ffffe000`018561f0 fffff800`024a5540 : IntcDAud
ffffd000`21fa9b28 fffff800`026d5e64 : ffffe000`07d45dc0 ffffe000`018561f0 fffff800`024a5540 fffff800`026d61be : 0xffffe000`013a4030
ffffd000`21fa9b30 ffffe000`07d45dc0 : ffffe000`018561f0 fffff800`024a5540 fffff800`026d61be 00000000`00000000 : klwfp+0x4e64
ffffd000`21fa9b38 ffffe000`018561f0 : fffff800`024a5540 fffff800`026d61be 00000000`00000000 ffffe000`07d45dc0 : 0xffffe000`07d45dc0
ffffd000`21fa9b40 fffff800`024a5540 : fffff800`026d61be 00000000`00000000 ffffe000`07d45dc0 00000000`00000080 : 0xffffe000`018561f0
ffffd000`21fa9b48 fffff800`026d61be : 00000000`00000000 ffffe000`07d45dc0 00000000`00000080 ffffe000`018561f0 : kneps+0x22540
ffffd000`21fa9b50 00000000`00000000 : ffffe000`07d45dc0 00000000`00000080 ffffe000`018561f0 ffffe000`01955870 : klwfp+0x51be
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01963f67 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO! ?? ::FNODOBFM::`string'+797c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f7e4
IMAGE_VERSION: 6.3.9600.16384
BUCKET_ID_FUNC_OFFSET: 797c
FAILURE_BUCKET_ID: 0xc2_b_NETIO!_??_::FNODOBFM::_string_
BUCKET_ID: 0xc2_b_NETIO!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_b_netio!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {2004c761-2953-7123-0c48-7c23e2563df0}
Followup: MachineOwner
"