locked
Bad pool call? RRS feed

  • Question

  • Hi everyone,

    My laptop is constantly restarting with an issue of "Bad Pool Call" and I'd really like to solve this issue.

    I tried to look up a solution to this issue but it seems to vary among users and I don't really know how to analyze my minidump files.

    https://onedrive.live.com/redir?resid=D50316536DB3DEE5!106&authkey=!AHAka_YxdeiXWdY&ithint=file%2czip

    Thanks so much for your help!

    Tim

    Thursday, January 22, 2015 7:23 PM

Answers

  • TH

    It is NEVER a good idea to have more than one malware app. You have 2.  I would remove BOTH McAfee and Avast and use the built in defender.  They are your  problem

    Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Ken\Desktop\012215-34687-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 8 Kernel Version 9600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
    Machine Name:
    Kernel base = 0xfffff802`7a402000 PsLoadedModuleList = 0xfffff802`7a6d8370
    Debug session time: Thu Jan 22 13:02:12.927 2015 (UTC - 5:00)
    System Uptime: 1 days 23:51:09.823
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ...............................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1200, 202082, ffffe00100348008}
    
    GetPointerFromAddress: unable to read from fffff8027a762138
    unable to get nt!MmNonPagedPoolStart
    unable to get nt!MmSizeOfNonPagedPoolInBytes
    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000202082, Memory contents of the pool block
    Arg4: ffffe00100348008, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe00100348008 
    
    FREED_POOL_TAG:  Mdl 
    
    BUGCHECK_STR:  0xc2_7_Mdl 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0
    
    STACK_TEXT:  
    ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
    ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
    ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
    ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
    ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
    ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
    ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
    ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
    ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
    ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
    ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
    ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
    ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
    ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
    ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
    ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
    ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
    ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
    ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+20d7f
    fffff800`35f8791f 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6
    
    IMAGE_VERSION:  6.3.9600.17337
    
    BUCKET_ID_FUNC_OFFSET:  20d7f
    
    FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl
    
    FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000202082, Memory contents of the pool block
    Arg4: ffffe00100348008, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe00100348008 
    
    FREED_POOL_TAG:  Mdl 
    
    BUGCHECK_STR:  0xc2_7_Mdl 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0
    
    STACK_TEXT:  
    ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
    ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
    ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
    ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
    ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
    ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
    ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
    ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
    ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
    ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
    ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
    ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
    ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
    ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
    ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
    ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
    ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
    ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
    ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+20d7f
    fffff800`35f8791f 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6
    
    IMAGE_VERSION:  6.3.9600.17337
    
    BUCKET_ID_FUNC_OFFSET:  20d7f
    
    FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl
    
    FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}
    
    Followup: MachineOwner
    ---------
    
    


    Wanikiya and Dyami--Team Zigzag

    • Proposed as answer by Yolanda Zhu Friday, January 23, 2015 5:59 AM
    • Marked as answer by ZigZag3143x Sunday, February 1, 2015 1:33 AM
    Thursday, January 22, 2015 8:31 PM

All replies

  • TH

    It is NEVER a good idea to have more than one malware app. You have 2.  I would remove BOTH McAfee and Avast and use the built in defender.  They are your  problem

    Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Ken\Desktop\012215-34687-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*h:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 8 Kernel Version 9600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
    Machine Name:
    Kernel base = 0xfffff802`7a402000 PsLoadedModuleList = 0xfffff802`7a6d8370
    Debug session time: Thu Jan 22 13:02:12.927 2015 (UTC - 5:00)
    System Uptime: 1 days 23:51:09.823
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................................
    Loading User Symbols
    Loading unloaded module list
    ...............................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1200, 202082, ffffe00100348008}
    
    GetPointerFromAddress: unable to read from fffff8027a762138
    unable to get nt!MmNonPagedPoolStart
    unable to get nt!MmSizeOfNonPagedPoolInBytes
    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000202082, Memory contents of the pool block
    Arg4: ffffe00100348008, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe00100348008 
    
    FREED_POOL_TAG:  Mdl 
    
    BUGCHECK_STR:  0xc2_7_Mdl 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0
    
    STACK_TEXT:  
    ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
    ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
    ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
    ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
    ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
    ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
    ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
    ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
    ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
    ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
    ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
    ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
    ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
    ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
    ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
    ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
    ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
    ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
    ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+20d7f
    fffff800`35f8791f 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6
    
    IMAGE_VERSION:  6.3.9600.17337
    
    BUCKET_ID_FUNC_OFFSET:  20d7f
    
    FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl
    
    FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000202082, Memory contents of the pool block
    Arg4: ffffe00100348008, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe00100348008 
    
    FREED_POOL_TAG:  Mdl 
    
    BUGCHECK_STR:  0xc2_7_Mdl 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff8027a6a408a to fffff8027a5511a0
    
    STACK_TEXT:  
    ffffd000`f70a5c68 fffff802`7a6a408a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00202082 : nt!KeBugCheckEx
    ffffd000`f70a5c70 fffff800`35f8791f : ffffe001`08c71740 ffffe001`02a21650 ffff2a15`0d1f1956 00000000`00000000 : nt!ExAllocatePoolWithTag+0x113a
    ffffd000`f70a5d60 fffff800`36172ca5 : ffffd000`f70a5ec0 fffff800`360e4270 00000000`00000000 fffff800`36077aef : NETIO!NetioFreeMdl+0x20d7f
    ffffd000`f70a5db0 fffff800`35f591f3 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xbd455
    ffffd000`f70a5e00 fffff800`360cdb28 : 00000000`00000000 00000000`00000001 ffffe000`fb22b010 ffffe001`08c71740 : NETIO!NetioDereferenceNetBufferListChain+0xd3
    ffffd000`f70a5ea0 fffff800`360e3cfa : ffffe001`048fc060 00000000`0106e1c3 00000000`00000000 ffffe000`f9e9afa0 : tcpip!TcpFlushDelay+0x88
    ffffd000`f70a5f50 fffff800`360c2b5f : ffffe000`fb5ebb40 ffffd000`f70abb01 ffffd000`f70ad3c8 ffffe001`0925d3c8 : tcpip!TcpPreValidatedReceive+0x3ea
    ffffd000`f70a6050 fffff800`360c1433 : 00000000`00000003 00000000`00000000 00000000`00000003 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
    ffffd000`f70a6110 fffff800`360c2475 : 00000000`00000011 fffff800`36237180 3fe00000`00000000 ffffd000`f70a6218 : tcpip!IppProcessDeliverList+0x63
    ffffd000`f70a61b0 fffff800`360bfabc : 00000000`f70a6701 ffffd000`f70a63e0 00000000`00000000 ffffe000`fb7de000 : tcpip!IppReceiveHeaderBatch+0x225
    ffffd000`f70a62e0 fffff800`360b5eed : ffffe000`ff9f94f0 00000000`00000000 ffffd000`f70a6701 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0xa4d
    ffffd000`f70a6660 fffff800`360b5a95 : ffffe000`fb220017 00000000`00000000 fffff800`360b5850 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x313
    ffffd000`f70a6750 fffff802`7a4bdf46 : ffffe000`fb301040 00000000`00000000 ffffe000`fc926110 ffffd000`f70a1000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x155
    ffffd000`f70a6880 fffff800`360b5b96 : fffff800`360b5940 ffffd000`f70a69a0 ffffe001`03640c10 ffffd000`f70a6a00 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd000`f70a6970 fffff800`35e41903 : 00000000`00000000 ffffd000`f70a6a51 00000000`00000001 00001f80`000b0000 : tcpip!FlReceiveNetBufferListChain+0xb6
    ffffd000`f70a69f0 fffff800`35ea3953 : 00000000`00000001 ffffe000`fb30dd00 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
    ffffd000`f70a6ab0 fffff800`35ea5507 : ffffe000`fb0b91a0 00000000`00000000 ffffe000`fb301001 ffffe000`00000001 : ndis!ndisDoPeriodicReceivesIndication+0x39f
    ffffd000`f70a6b40 fffff800`35e4f331 : ffffe000`fb010390 ffffe000`fb303870 00000000`00000000 ffffe000`fb301000 : ndis!ndisPeriodicReceivesWorker+0x63
    ffffd000`f70a6b70 fffff802`7a500e70 : fffff802`7a75ba00 ffffe000`fb301040 00000000`00000080 ffffe000`fb301040 : ndis!ndisReceiveWorkerThread+0x151
    ffffd000`f70a6c00 fffff802`7a5577c6 : fffff802`7a702180 ffffe000`fb301040 fffff802`7a75ba00 e39c56a8`a2ba4c2f : nt!PspSystemThreadStartup+0x58
    ffffd000`f70a6c60 00000000`00000000 : ffffd000`f70a7000 ffffd000`f70a1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+20d7f
    fffff800`35f8791f 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+20d7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  540ebbe6
    
    IMAGE_VERSION:  6.3.9600.17337
    
    BUCKET_ID_FUNC_OFFSET:  20d7f
    
    FAILURE_BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_Mdl__NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_mdl__netio!netiofreemdl
    
    FAILURE_ID_HASH:  {f2c46e80-d936-89a0-13f9-f9b302dc640b}
    
    Followup: MachineOwner
    ---------
    
    


    Wanikiya and Dyami--Team Zigzag

    • Proposed as answer by Yolanda Zhu Friday, January 23, 2015 5:59 AM
    • Marked as answer by ZigZag3143x Sunday, February 1, 2015 1:33 AM
    Thursday, January 22, 2015 8:31 PM
  • Thanks a ton! I'll try it!
    Thursday, January 22, 2015 10:24 PM
  • I uinstalled avast and mcafee but I still got the bad pool call error.

    I uploaded my most recent minidump file, could you take a look at it when you have a chance?

    https://onedrive.live.com/redir?resid=D50316536DB3DEE5!107&authkey=!AAk7q-_SGBt9Tp8&ithint=file%2cdmp

    Thanks,

    Tim


    Tuesday, January 27, 2015 6:09 PM
  • Timothy

    Um, no you did not.  Please remove them both


    Wanikiya and Dyami--Team Zigzag

    Tuesday, January 27, 2015 7:07 PM
  • where can I find the files to delete? I uninstalled the programs through the uninstall program feature in control panel but I guess it didn't uninstall everything

    Tim

    Friday, January 30, 2015 7:12 PM
  • Timothy

    Have you tried searching for them?


    Wanikiya and Dyami--Team Zigzag

    Sunday, February 1, 2015 1:32 AM
  • So I think I completely deleted all of my Mcafee and Avast but I still get the bad pool error and occassionally the Driver not less or equal error. 

    Below is a new file containing all my minidump files

    Thanks,

    Tim

    https://onedrive.live.com/redir?resid=D50316536DB3DEE5!108&authkey=!AEnPZrWE_ny9Fag&ithint=file%2czip

    Monday, February 2, 2015 7:46 AM
  • These crashes were related to memory corruption (probably caused by a driver). 

    Please run these two tests to verify your memory and find which driver is causing the problem.  Please run verifier  first

    If you are over-clocking anything reset to default before running these tests.
    In other words STOP!!! 
     

    If you do not know what this means you probably are not


    1-Driver verifier (for complete directions see our wiki here)

    2-Memtest. (You can read more about running memtest here)



    Wanikiya and Dyami--Team Zigzag

    Monday, February 2, 2015 12:08 PM