Bad pool call?

Hi everyone,

My laptop is constantly restarting with an issue of "Bad Pool Call" and I'd really like to solve this issue.

I tried to look up a solution to this issue but it seems to vary among users and I don't really know how to analyze my minidump files.

https://onedrive.live.com/redir?resid=D50316536DB3DEE5!106&authkey=!AHAka_YxdeiXWdY&ithint=file%2czip

Thanks so much for your help!

Tim

January 22nd, 2015 10:23pm

TH

It is NEVER a good idea to have more than one malware app. You have 2.  I would remove BOTH McAfee and Avast and use the built in defender.  They are your  problem

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Ken\Desktop\012215-34687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
Machine Name:
Kernel base = 0xfffff802`7a402000 PsLoadedModuleList = 0xfffff802`7a6d8370
Debug session time: Thu Jan 22 13:02:12.927 2015 (UTC - 5:00)
System Uptime: 1 days 23:51:09.823
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
...............................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, 1200, 202082, ffffe00100348008}

GetPointerFromAddress: unable to read from fffff8027a762138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000202082, Memory contents of the pool block
Arg4: ffffe00100348008, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS:  ffffe00100348008 

FREED_POOL_TAG:  Mdl 

BUGCHECK_STR:  0xc2_7_Mdl 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0

STACK_TEXT:  
ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioFreeMdl+20d7f
fffff800`35f8791f 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6

IMAGE_VERSION:  6.3.9600.17337

BUCKET_ID_FUNC_OFFSET:  20d7f

FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl

BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl

FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000202082, Memory contents of the pool block
Arg4: ffffe00100348008, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS:  ffffe00100348008 

FREED_POOL_TAG:  Mdl 

BUGCHECK_STR:  0xc2_7_Mdl 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0

STACK_TEXT:  
ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!NetioFreeMdl+20d7f
fffff800`35f8791f 90              nop

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6

IMAGE_VERSION:  6.3.9600.17337

BUCKET_ID_FUNC_OFFSET:  20d7f

FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl

BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl

FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}

Followup: MachineOwner
---------


Free Windows Admin Tool Kit Click here and download it now
January 22nd, 2015 11:31pm

Thanks a ton! I'll try it!
January 23rd, 2015 1:24am

I uinstalled avast and mcafee but I still got the bad pool call error.

I uploaded my most recent minidump file, could you take a look at it when you have a chance?

https://onedrive.live.com/redir?resid=D50316536DB3DEE5!107&authkey=!AAk7q-_SGBt9Tp8&ithint=file%2cdmp

Thanks,

Tim


Free Windows Admin Tool Kit Click here and download it now
January 27th, 2015 9:09pm

I uinstalled avast and mcafee but I still got the bad pool call error.

I uploaded my most recent minidump file, could you take a look at it when you have a chance?

https://onedrive.live.com/redir?resid=D50316536DB3DEE5!107&authkey=!AAk7q-_SGBt9Tp8&ithint=file%2cdmp

Thanks,

Tim


January 27th, 2015 9:09pm

Timothy

Um, no you did not.  Please remove them both

Free Windows Admin Tool Kit Click here and download it now
January 27th, 2015 10:07pm

where can I find the files to delete? I uninstalled the programs through the uninstall program feature in control panel but I guess it didn't uninstall everything

Tim

January 30th, 2015 10:12pm

Timothy

Have you tried searching for them?

Free Windows Admin Tool Kit Click here and download it now
January 31st, 2015 8:34pm

So I think I completely deleted all of my Mcafee and Avast but I still get the bad pool error and occassionally the Driver not less or equal error. 

Below is a new file containing all my minidump files

Thanks,

Tim

https://onedrive.live.com/redir?resid=D50316536DB3DEE5!108&authkey=!AEnPZrWE_ny9Fag&ithint=file%2czip

February 2nd, 2015 2:48am

These crashes were related to memory corruption (probably caused by a driver). 

Please run these two tests to verify your memory and find which driver is causing the problem.  Please run verifier  first

If you are over-clocking anything reset to default before running these tests.
In other words STOP!!! 
 

If you do not know what this means you probably are not

1-Driver verifier (for complete directions see our wiki here)

2-Memtest. (You can read more about running memtest here)


Free Windows Admin Tool Kit Click here and download it now
February 2nd, 2015 7:10am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics