BSOD Bad Pool Caller Windows 8.1

Hello,

My problem is my laptop sometimes got the BSOD (that said about BAD_POOL_CALLER) when I connected my laptop to computer via WI-FI and it happened many times like 3 times until I used cable network and the problem is gone.

Product name: HP Pavilion 15 Notebook PC. Windows 8.1 64-bit

I can't verify my account so I don't know how to submit my dump file.

Thank you

PS: This is my dump file: http://1drv.ms/MPUQ7s
February 21st, 2014 12:53pm

Hi,

After analyzing your dump file, I noticed that this issue is caused by network driver, please update it from manufacturers website to check the issue:

Bug Check 0xC2: BAD_POOL_CALLER

http://msdn.microsoft.com/en-us/library/windows/hardware/ff560185(v=vs.85).aspx

The analyzed results:

Debugging Details:
------------------


FAULTING_IP: 
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01798f67 90              nop

BUGCHECK_STR:  0xc2_99

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

LAST_CONTROL_TRANSFER:  from fffff802ab8706a8 to fffff802ab351ca0

STACK_TEXT:  
ffffd000`2147af88 fffff802`ab8706a8 : 00000000`000000c2 00000000`00000099 ffffe000`060c0f38 00000000`00000000 : nt!KeBugCheckEx
ffffd000`2147af90 fffff802`ab3f28f5 : 00000000`00000000 00000000`00000000 ffffe000`06bfe240 fffff800`01770769 : nt!VerifierBugCheckIfAppropriate+0x3c
ffffd000`2147afd0 fffff802`ab496451 : ffffe000`060c0f28 00000000`00000001 00000000`000000ff fffff800`01a927e0 : nt!VerifierFreeTrackedPool+0x41
ffffd000`2147b010 fffff800`01798f67 : ffffe000`06be1b50 ffffe000`0461b040 ffffe000`0590b790 00000000`00000000 : nt!ExFreePoolWithTag+0x1181
ffffd000`2147b0e0 fffff800`01924cb4 : 00000000`00000000 fffff800`01a9307d 00000000`00000000 00000000`00000001 : NETIO! ?? ::FNODOBFM::`string'+0x797c
ffffd000`2147b130 fffff800`01767501 : ffffe000`0822e030 00000000`00000001 ffffe000`045b5d91 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd5c54
ffffd000`2147b180 fffff800`017643e7 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe000`01ca0850 : NETIO!NetioDereferenceNetBufferList+0xb1
ffffd000`2147b1f0 fffff800`0185355b : ffffe000`0137f000 ffffe000`0a498200 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x2a7
ffffd000`2147b2b0 fffff800`0185049a : 00000000`ffffffff ffffe000`01ca0850 ffffe000`0137f000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x55b
ffffd000`2147b3e0 fffff800`01985bd8 : ffffe000`05d5b610 00000000`00000000 ffffe000`0138d901 fffff800`024bd700 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`2147b760 fffff800`01a926d5 : ffffd000`2147bb02 ffffe000`007f5310 ffffd000`2147ba99 ffffd000`21476000 : tcpip!IppInspectInjectReceive+0x148
ffffd000`2147b7c0 fffff802`ab2bc3f9 : ffffe000`088fc2a0 00000000`00001f52 ffffe000`0457b820 ffffe000`0457b820 : fwpkclnt!FwppInjectionStackCallout+0xe5
ffffd000`2147b850 fffff800`01aa36b6 : fffff800`01a925f0 ffffd000`2147ba20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`2147b9a0 fffff800`021e7003 : ffffe000`0457b820 ffffe000`0998e010 fffff800`024d1500 ffffe000`0998e010 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
ffffd000`2147bae0 ffffe000`0457b820 : ffffe000`0998e010 fffff800`024d1500 ffffe000`0998e010 ffffd000`21470002 : klwfp+0x5003
ffffd000`2147bae8 ffffe000`0998e010 : fffff800`024d1500 ffffe000`0998e010 ffffd000`21470002 ffffffff`00000001 : 0xffffe000`0457b820
ffffd000`2147baf0 fffff800`024d1500 : ffffe000`0998e010 ffffd000`21470002 ffffffff`00000001 fffff800`00000003 : 0xffffe000`0998e010
ffffd000`2147baf8 ffffe000`0998e010 : ffffd000`21470002 ffffffff`00000001 fffff800`00000003 fffff800`00000000 : kneps+0x22500
ffffd000`2147bb00 ffffd000`21470002 : ffffffff`00000001 fffff800`00000003 fffff800`00000000 ffffe000`01ca0850 : 0xffffe000`0998e010
ffffd000`2147bb08 ffffffff`00000001 : fffff800`00000003 fffff800`00000000 ffffe000`01ca0850 fffff800`021e6e64 : 0xffffd000`21470002
ffffd000`2147bb10 fffff800`00000003 : fffff800`00000000 ffffe000`01ca0850 fffff800`021e6e64 ffffe000`0998e010 : 0xffffffff`00000001
ffffd000`2147bb18 fffff800`00000000 : ffffe000`01ca0850 fffff800`021e6e64 ffffe000`0998e010 ffffe000`088546d0 : CI!_guard_check_icall_fptr <PERF> (CI+0x3)
ffffd000`2147bb20 ffffe000`01ca0850 : fffff800`021e6e64 ffffe000`0998e010 ffffe000`088546d0 fffff800`024d1540 : CI!_guard_check_icall_fptr <PERF> (CI+0x0)
ffffd000`2147bb28 fffff800`021e6e64 : ffffe000`0998e010 ffffe000`088546d0 fffff800`024d1540 fffff800`021e71be : 0xffffe000`01ca0850
ffffd000`2147bb30 ffffe000`0998e010 : ffffe000`088546d0 fffff800`024d1540 fffff800`021e71be 00000000`00000000 : klwfp+0x4e64
ffffd000`2147bb38 ffffe000`088546d0 : fffff800`024d1540 fffff800`021e71be 00000000`00000000 ffffe000`0998e010 : 0xffffe000`0998e010
ffffd000`2147bb40 fffff800`024d1540 : fffff800`021e71be 00000000`00000000 ffffe000`0998e010 00000000`00000080 : 0xffffe000`088546d0
ffffd000`2147bb48 fffff800`021e71be : 00000000`00000000 ffffe000`0998e010 00000000`00000080 ffffe000`088546d0 : kneps+0x22540
ffffd000`2147bb50 00000000`00000000 : ffffe000`0998e010 00000000`00000080 ffffe000`088546d0 ffffe000`004381b0 : klwfp+0x51be


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO! ?? ::FNODOBFM::`string'+797c
fffff800`01798f67 90              nop

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  NETIO! ?? ::FNODOBFM::`string'+797c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4

IMAGE_VERSION:  6.3.9600.16384

BUCKET_ID_FUNC_OFFSET:  797c

FAILURE_BUCKET_ID:  0xc2_99_NETIO!_??_::FNODOBFM::_string_

BUCKET_ID:  0xc2_99_NETIO!_??_::FNODOBFM::_string_

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_99_netio!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {b8049590-31d0-aee1-11c9-9114e4dbfddc}

Followup: MachineOwner

Free Windows Admin Tool Kit Click here and download it now
February 24th, 2014 2:16am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics