BSOD
Hi there, i have recently experienced the bad pool caller BSOD, how can i fix this issue because the laptop just boots and goes straight into the BSOD.
July 8th, 2015 9:15am

We need the DMP files to analyze your crashes and determine a fix, please upload them to your onedrive or another file sharing program and post the link here. If your account is not verified and will not let you post a link, replace HTTP with HXXP and post. If you need instructions on how to retrieve the DMP files, see here.

Blue Screen of Death (BSOD) created by JMH3143/ZigZag3143

Free Windows Admin Tool Kit Click here and download it now
July 8th, 2015 9:21am

https://onedrive.live.com/redir?resid=C1777078CB8441A5!107&authkey=!AHcr4SLsReNYvNU&ithint=file%2czip

sorry for the late-ish reply.

shortened link

http://1drv.ms/1MfizqC

July 8th, 2015 2:41pm

Your crash is caused by klwfp.sys which is a Kaspersky driver. I would suggest removing Kaspersky completely and use the built in Windows Defender.

.

.

.

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1200, 75043960, ffffe000df331588}

*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
fffff80124f38240: Unable to get special pool info
fffff80124f38240: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000075043960, Memory contents of the pool block
Arg4: ffffe000df331588, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS:  ffffe000df331588

FREED_POOL_TAG:  NDnd

BUGCHECK_STR:  0xc2_7_NDnd

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80124f15ff2 to fffff80124dc1ca0

STACK_TEXT:  
ffffd000`fda0d058 fffff801`24f15ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`75043960 : nt!KeBugCheckEx
ffffd000`fda0d060 fffff801`2934b91f : 00000000`00000000 00000000`00000000 ffffe000`dfa955d0 ffffe000`00000004 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`fda0d150 fffff801`29561824 : 00000000`00000000 fffff801`2970f200 ffffe000`de838002 fffff801`296ea48d : NETIO!NetioFreeMdl+0x20d7f
ffffd000`fda0d1a0 fffff801`2931d8c1 : ffffe000`da8367c0 00000000`00000001 00000000`00000000 fffff801`293367b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`fda0d1f0 fffff801`2931d402 : ffffe000`dfa955d0 ffffe000`da8367c0 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`fda0d270 fffff801`294dd61d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2e2
ffffd000`fda0d310 fffff801`294db900 : 00000000`00000001 ffffd000`fda0d540 fffff801`29632370 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x32d
ffffd000`fda0d440 fffff801`295cff74 : ffffe000`e04a8f70 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`fda0d7c0 fffff801`296dc301 : ffffe000`da9a3402 ffffe000`da9a4310 ffffd000`fda0da99 ffffd000`fda08000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`fda0d820 fffff801`24ce3703 : ffffe000`da8367c0 00000000`00000201 ffffe000`de8380e0 ffffe000`de8380e0 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`fda0d8b0 fffff801`296ed7be : fffff801`296dc21c ffffd000`fda0da20 00000000`00000010 ffffe000`de8380e0 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`fda0d9a0 fffff801`2a0fd037 : ffffe000`de8380e0 ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`fda0dae0 ffffe000`de8380e0 : ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 : klwfp+0x5037
ffffd000`fda0dae8 ffffe000`e0684e80 : ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 : 0xffffe000`de8380e0
ffffd000`fda0daf0 ffffe000`e06be800 : ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 : 0xffffe000`e0684e80
ffffd000`fda0daf8 ffffe000`e0684e80 : ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 ffffe000`00000000 : 0xffffe000`e06be800
ffffd000`fda0db00 ffffe000`dff20017 : fffff801`00000001 ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 : 0xffffe000`e0684e80
ffffd000`fda0db08 fffff801`00000001 : ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 : 0xffffe000`dff20017
ffffd000`fda0db10 ffffe000`00000007 : ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 : 0xfffff801`00000001
ffffd000`fda0db18 ffffe000`00000000 : ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 : 0xffffe000`00000007
ffffd000`fda0db20 ffffe000`dfa955d0 : fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 00000000`00000000 : 0xffffe000`00000000
ffffd000`fda0db28 fffff801`2a0fce98 : ffffe000`e0684e80 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 : 0xffffe000`dfa955d0
ffffd000`fda0db30 ffffe000`e0684e80 : 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 : klwfp+0x4e98
ffffd000`fda0db38 00000000`00000000 : 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 ffffe000`e0684e80 : 0xffffe000`e0684e80


STACK_COMMAND:  kb

FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff801`2934b91f 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6

BUCKET_ID_FUNC_OFFSET:  20d7f

FAILURE_BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl

BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl

Followup: MachineOwner



  • Edited by Acreed02 12 hours 34 minutes ago
Free Windows Admin Tool Kit Click here and download it now
July 8th, 2015 2:50pm

Hi thanks for the intel, apparently my sister wanted to uninstall the application ages ago but the uninstallation was interrupted, hence she ended shredding the program files so I'm going to try to reinstall and uninstall it properly.
July 8th, 2015 3:35pm

I also noticed that you have McAfee running as well, never a good idea to have two anti-virus running. They tend to see each other as malicious. Let me know if those BSOD's subside, if you continue to get them just upload the newest DMP file and I'll take a look at it.
Free Windows Admin Tool Kit Click here and download it now
July 8th, 2015 4:10pm

https://onedrive.live.com/redir?resid=C1777078CB8441A5!107&authkey=!AHcr4SLsReNYvNU&ithint=file%2czip

sorry for the late-ish reply.

shortened link

http://1drv.ms/1MfizqC

July 8th, 2015 6:40pm

Your crash is caused by klwfp.sys which is a Kaspersky driver. I would suggest removing Kaspersky completely and use the built in Windows Defender.

.

.

.

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1200, 75043960, ffffe000df331588}

*** WARNING: Unable to verify timestamp for klwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
fffff80124f38240: Unable to get special pool info
fffff80124f38240: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000075043960, Memory contents of the pool block
Arg4: ffffe000df331588, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS:  ffffe000df331588

FREED_POOL_TAG:  NDnd

BUGCHECK_STR:  0xc2_7_NDnd

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80124f15ff2 to fffff80124dc1ca0

STACK_TEXT:  
ffffd000`fda0d058 fffff801`24f15ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`75043960 : nt!KeBugCheckEx
ffffd000`fda0d060 fffff801`2934b91f : 00000000`00000000 00000000`00000000 ffffe000`dfa955d0 ffffe000`00000004 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`fda0d150 fffff801`29561824 : 00000000`00000000 fffff801`2970f200 ffffe000`de838002 fffff801`296ea48d : NETIO!NetioFreeMdl+0x20d7f
ffffd000`fda0d1a0 fffff801`2931d8c1 : ffffe000`da8367c0 00000000`00000001 00000000`00000000 fffff801`293367b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`fda0d1f0 fffff801`2931d402 : ffffe000`dfa955d0 ffffe000`da8367c0 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`fda0d270 fffff801`294dd61d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2e2
ffffd000`fda0d310 fffff801`294db900 : 00000000`00000001 ffffd000`fda0d540 fffff801`29632370 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x32d
ffffd000`fda0d440 fffff801`295cff74 : ffffe000`e04a8f70 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd000`fda0d7c0 fffff801`296dc301 : ffffe000`da9a3402 ffffe000`da9a4310 ffffd000`fda0da99 ffffd000`fda08000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`fda0d820 fffff801`24ce3703 : ffffe000`da8367c0 00000000`00000201 ffffe000`de8380e0 ffffe000`de8380e0 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`fda0d8b0 fffff801`296ed7be : fffff801`296dc21c ffffd000`fda0da20 00000000`00000010 ffffe000`de8380e0 : nt!KeExpandKernelStackAndCalloutInternal+0xf3
ffffd000`fda0d9a0 fffff801`2a0fd037 : ffffe000`de8380e0 ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`fda0dae0 ffffe000`de8380e0 : ffffe000`e0684e80 ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 : klwfp+0x5037
ffffd000`fda0dae8 ffffe000`e0684e80 : ffffe000`e06be800 ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 : 0xffffe000`de8380e0
ffffd000`fda0daf0 ffffe000`e06be800 : ffffe000`e0684e80 ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 : 0xffffe000`e0684e80
ffffd000`fda0daf8 ffffe000`e0684e80 : ffffe000`dff20017 fffff801`00000001 ffffe000`00000007 ffffe000`00000000 : 0xffffe000`e06be800
ffffd000`fda0db00 ffffe000`dff20017 : fffff801`00000001 ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 : 0xffffe000`e0684e80
ffffd000`fda0db08 fffff801`00000001 : ffffe000`00000007 ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 : 0xffffe000`dff20017
ffffd000`fda0db10 ffffe000`00000007 : ffffe000`00000000 ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 : 0xfffff801`00000001
ffffd000`fda0db18 ffffe000`00000000 : ffffe000`dfa955d0 fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 : 0xffffe000`00000007
ffffd000`fda0db20 ffffe000`dfa955d0 : fffff801`2a0fce98 ffffe000`e0684e80 00000000`00000000 00000000`00000000 : 0xffffe000`00000000
ffffd000`fda0db28 fffff801`2a0fce98 : ffffe000`e0684e80 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 : 0xffffe000`dfa955d0
ffffd000`fda0db30 ffffe000`e0684e80 : 00000000`00000000 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 : klwfp+0x4e98
ffffd000`fda0db38 00000000`00000000 : 00000000`00000000 fffff801`2a0fd1f2 00000000`00000000 ffffe000`e0684e80 : 0xffffe000`e0684e80


STACK_COMMAND:  kb

FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff801`2934b91f 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6

BUCKET_ID_FUNC_OFFSET:  20d7f

FAILURE_BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl

BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl

Followup: MachineOwner



  • Edited by Acreed02 Wednesday, July 08, 2015 6:50 PM
Free Windows Admin Tool Kit Click here and download it now
July 8th, 2015 6:48pm

I also noticed that you have McAfee running as well, never a good idea to have two anti-virus running. They tend to see each other as malicious. Let me know if those BSOD's subside, if you continue to get them just upload the newest DMP file and I'll take a look at it.
July 8th, 2015 8:09pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics