locked
BSOD Windows 8.1 internet related RRS feed

  • Question

  • Hey there,

    On the computer I am currently using I have always had the BSOD occuring whilst using Vuze.

    Today I decided to update my OS to Windows 8.1 to see if that would perhaps fix the issue.

    However it seemed to make it worse because when just simply connect to my router, Bad_Pool_Caller happen after sometimes just a few minutes, sometimes almost straight away. I have also had some other error names come up.

    Here is a link to my crash dumps https://onedrive.live.com/redir?resid=82F39394D01F7639%21106

    That link is not hyperlinked because for some reason I am not getting a verification request for my email. Could anyone explain why?

    Any help you can give me would be much appreciated,

    David

    Monday, October 27, 2014 9:13 PM

Answers

  • WWW

    Easy.  Your Kaspersky is killing netio.sys.  I would remove Kaspersky and use Microsoft Security essentials in its place.  IMHO Kaspersky is one of the WORST malware app in terms of crashing

    Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Ken\Desktop\102714-57406-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 8 Kernel Version 9600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.17238.amd64fre.winblue_gdr.140723-2018
    Machine Name:
    Kernel base = 0xfffff803`ce407000 PsLoadedModuleList = 0xfffff803`ce6d1350
    Debug session time: Mon Oct 27 15:00:08.409 2014 (UTC - 4:00)
    System Uptime: 0 days 0:32:47.297
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1200, 0, ffffe001aaa4b938}
    
    *** WARNING: Unable to verify timestamp for klwfp.sys
    *** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
    GetPointerFromAddress: unable to read from fffff803ce75b138
    unable to get nt!MmNonPagedPoolStart
    unable to get nt!MmSizeOfNonPagedPoolInBytes
    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+2276f )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000000000, Memory contents of the pool block
    Arg4: ffffe001aaa4b938, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe001aaa4b938 
    
    FREED_POOL_TAG:  NDnd
    
    BUGCHECK_STR:  0xc2_7_NDnd
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff803ce69d424 to fffff803ce55aca0
    
    STACK_TEXT:  
    ffffd001`78c28058 fffff803`ce69d424 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
    ffffd001`78c28060 fffff801`04d7addf : 00000000`00000000 ffffe001`a97dcdf0 ffffe001`aa0fa401 fffff801`0510f5ea : nt!ExFreePool+0x7d0
    ffffd001`78c28130 fffff801`04f8badc : ffffe001`a2829e02 ffffe001`a3de31c0 00000000`00000001 fffff801`05110165 : NETIO!NetioFreeMdl+0x2276f
    ffffd001`78c28180 fffff801`04d47911 : ffffe001`aa0fa4f0 00000000`00000000 00000000`00000000 ffffe001`a2829e40 : tcpip!FlpReturnNetBufferListChain+0xbd67c
    ffffd001`78c281d0 fffff801`04d474f8 : ffffe001`a97dcdf0 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xb1
    ffffd001`78c28240 fffff801`04edb7dc : ffffe001`a60bbd00 00000000`00000400 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x3c8
    ffffd001`78c28310 fffff801`04ed87f4 : 00000000`00000001 ffffe001`a97dcdf0 fffff801`05052180 fffff6e8`00bc6140 : tcpip!IppReceiveHeaderBatch+0x40c
    ffffd001`78c28440 fffff801`04ff4fe4 : ffffe001`a748e5e0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x6a9
    ffffd001`78c287c0 fffff801`05101efd : ffffe001`a97dcd02 ffffe001`a3376410 ffffd001`78c28a99 ffffd001`78c23000 : tcpip!IppInspectInjectReceive+0x148
    ffffd001`78c28820 fffff803`ce4d39a6 : ffffe001`aa019200 ffffe001`00000000 ffffe001`a97dcdf0 fffff801`04d82bdb : fwpkclnt!FwppInjectionStackCallout+0xe5
    ffffd001`78c288b0 fffff801`0511362a : fffff801`05101e18 ffffd001`78c28a20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd001`78c289a0 fffff801`05bc1f20 : ffffe001`a2829e40 ffffe001`a3de3120 00000000`00000000 ffffe001`a3de3120 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
    ffffd001`78c28ae0 ffffe001`a2829e40 : ffffe001`a3de3120 00000000`00000000 ffffe001`a3de3120 ffffe001`a9520002 : klwfp+0x4f20
    ffffd001`78c28ae8 ffffe001`a3de3120 : 00000000`00000000 ffffe001`a3de3120 ffffe001`a9520002 fffff801`00000001 : 0xffffe001`a2829e40
    ffffd001`78c28af0 00000000`00000000 : ffffe001`a3de3120 ffffe001`a9520002 fffff801`00000001 ffffe001`00000004 : 0xffffe001`a3de3120
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+2276f
    fffff801`04d7addf 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+2276f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  53d0f177
    
    IMAGE_VERSION:  6.3.9600.17238
    
    BUCKET_ID_FUNC_OFFSET:  2276f
    
    FAILURE_BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_ndnd_netio!netiofreemdl
    
    FAILURE_ID_HASH:  {cb72dcda-a062-d743-ddee-6acf0fa97195}
    
    Followup: MachineOwner
    ---------
    
    


    Wanikiya and Dyami--Team Zigzag

    • Marked as answer by ZigZag3143x Thursday, October 30, 2014 12:34 PM
    Monday, October 27, 2014 10:28 PM

All replies

  • WWW

    Easy.  Your Kaspersky is killing netio.sys.  I would remove Kaspersky and use Microsoft Security essentials in its place.  IMHO Kaspersky is one of the WORST malware app in terms of crashing

    Microsoft (R) Windows Debugger Version 6.3.9600.17237 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Ken\Desktop\102714-57406-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 8 Kernel Version 9600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.17238.amd64fre.winblue_gdr.140723-2018
    Machine Name:
    Kernel base = 0xfffff803`ce407000 PsLoadedModuleList = 0xfffff803`ce6d1350
    Debug session time: Mon Oct 27 15:00:08.409 2014 (UTC - 4:00)
    System Uptime: 0 days 0:32:47.297
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ....................................
    Loading User Symbols
    Loading unloaded module list
    ...........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck C2, {7, 1200, 0, ffffe001aaa4b938}
    
    *** WARNING: Unable to verify timestamp for klwfp.sys
    *** ERROR: Module load completed but symbols could not be loaded for klwfp.sys
    GetPointerFromAddress: unable to read from fffff803ce75b138
    unable to get nt!MmNonPagedPoolStart
    unable to get nt!MmSizeOfNonPagedPoolInBytes
    Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+2276f )
    
    Followup: MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_CALLER (c2)
    The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
    Arguments:
    Arg1: 0000000000000007, Attempt to free pool which was already freed
    Arg2: 0000000000001200, (reserved)
    Arg3: 0000000000000000, Memory contents of the pool block
    Arg4: ffffe001aaa4b938, Address of the block of pool being deallocated
    
    Debugging Details:
    ------------------
    
    
    POOL_ADDRESS:  ffffe001aaa4b938 
    
    FREED_POOL_TAG:  NDnd
    
    BUGCHECK_STR:  0xc2_7_NDnd
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  2
    
    ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff803ce69d424 to fffff803ce55aca0
    
    STACK_TEXT:  
    ffffd001`78c28058 fffff803`ce69d424 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
    ffffd001`78c28060 fffff801`04d7addf : 00000000`00000000 ffffe001`a97dcdf0 ffffe001`aa0fa401 fffff801`0510f5ea : nt!ExFreePool+0x7d0
    ffffd001`78c28130 fffff801`04f8badc : ffffe001`a2829e02 ffffe001`a3de31c0 00000000`00000001 fffff801`05110165 : NETIO!NetioFreeMdl+0x2276f
    ffffd001`78c28180 fffff801`04d47911 : ffffe001`aa0fa4f0 00000000`00000000 00000000`00000000 ffffe001`a2829e40 : tcpip!FlpReturnNetBufferListChain+0xbd67c
    ffffd001`78c281d0 fffff801`04d474f8 : ffffe001`a97dcdf0 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferList+0xb1
    ffffd001`78c28240 fffff801`04edb7dc : ffffe001`a60bbd00 00000000`00000400 00000000`00000000 00000000`00000000 : NETIO!NetioDereferenceNetBufferListChain+0x3c8
    ffffd001`78c28310 fffff801`04ed87f4 : 00000000`00000001 ffffe001`a97dcdf0 fffff801`05052180 fffff6e8`00bc6140 : tcpip!IppReceiveHeaderBatch+0x40c
    ffffd001`78c28440 fffff801`04ff4fe4 : ffffe001`a748e5e0 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x6a9
    ffffd001`78c287c0 fffff801`05101efd : ffffe001`a97dcd02 ffffe001`a3376410 ffffd001`78c28a99 ffffd001`78c23000 : tcpip!IppInspectInjectReceive+0x148
    ffffd001`78c28820 fffff803`ce4d39a6 : ffffe001`aa019200 ffffe001`00000000 ffffe001`a97dcdf0 fffff801`04d82bdb : fwpkclnt!FwppInjectionStackCallout+0xe5
    ffffd001`78c288b0 fffff801`0511362a : fffff801`05101e18 ffffd001`78c28a20 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0xe6
    ffffd001`78c289a0 fffff801`05bc1f20 : ffffe001`a2829e40 ffffe001`a3de3120 00000000`00000000 ffffe001`a3de3120 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x2ea
    ffffd001`78c28ae0 ffffe001`a2829e40 : ffffe001`a3de3120 00000000`00000000 ffffe001`a3de3120 ffffe001`a9520002 : klwfp+0x4f20
    ffffd001`78c28ae8 ffffe001`a3de3120 : 00000000`00000000 ffffe001`a3de3120 ffffe001`a9520002 fffff801`00000001 : 0xffffe001`a2829e40
    ffffd001`78c28af0 00000000`00000000 : ffffe001`a3de3120 ffffe001`a9520002 fffff801`00000001 ffffe001`00000004 : 0xffffe001`a3de3120
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!NetioFreeMdl+2276f
    fffff801`04d7addf 90              nop
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  NETIO!NetioFreeMdl+2276f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  53d0f177
    
    IMAGE_VERSION:  6.3.9600.17238
    
    BUCKET_ID_FUNC_OFFSET:  2276f
    
    FAILURE_BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl
    
    BUCKET_ID:  0xc2_7_NDnd_NETIO!NetioFreeMdl
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0xc2_7_ndnd_netio!netiofreemdl
    
    FAILURE_ID_HASH:  {cb72dcda-a062-d743-ddee-6acf0fa97195}
    
    Followup: MachineOwner
    ---------
    
    


    Wanikiya and Dyami--Team Zigzag

    • Marked as answer by ZigZag3143x Thursday, October 30, 2014 12:34 PM
    Monday, October 27, 2014 10:28 PM
  • Hello David,

    What is your current situation?
    Have you tried the solution as Zigzag mentioned?

    Best regards,
    Fangzhou CHEN


    Fangzhou CHEN
    TechNet Community Support

    Wednesday, October 29, 2014 5:40 AM
  • Thanks a lot for your help.

    I have got rid of Kaspersky and the problem has stopped completely.

    I also got rid of netlimiter, just incase that was causing problems.

    What the heck is wrong with Kaspersky?

    Thursday, October 30, 2014 9:12 AM
  • WWW

    IMHO I would never install Kaspersky, McAfee, or Symantec on any machine.  After 10,000 BSOD analysis I have seen them FAR too often


    Wanikiya and Dyami--Team Zigzag

    Thursday, October 30, 2014 12:35 PM