bad_pool_caller error
my pc is showing this error again n again here is the link of my dmp files pls help soon http://1drv.ms/1RcuLMM
May 6th, 2015 8:38am
HS
These are related to Avast. I would remove it and use the built in defender in its place
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\zigza\Desktop\New folder\050615-49187-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17041.amd64fre.winblue_gdr.140305-1710 Machine Name: Kernel base = 0xfffff803`a807c000 PsLoadedModuleList = 0xfffff803`a83462d0 Debug session time: Wed May 6 20:24:09.457 2015 (UTC - 4:00) System Uptime: 0 days 0:50:34.241 Loading Kernel Symbols ............................................................... ................................................................ ............................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C2, {7, 1200, 0, ffffe0007db516d8} *** WARNING: Unable to verify timestamp for aswStm.sys *** ERROR: Module load completed but symbols could not be loaded for aswStm.sys GetPointerFromAddress: unable to read from fffff803a83d0138 unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+26f37 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* BAD_POOL_CALLER (c2) The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc. Arguments: Arg1: 0000000000000007, Attempt to free pool which was already freed Arg2: 0000000000001200, (reserved) Arg3: 0000000000000000, Memory contents of the pool block Arg4: ffffe0007db516d8, Address of the block of pool being deallocated Debugging Details: ------------------ POOL_ADDRESS: ffffe0007db516d8 FREED_POOL_TAG: Mdl BUGCHECK_STR: 0xc2_7_Mdl CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff803a831242a to fffff803a81cffa0 STACK_TEXT: ffffd000`c8e7b538 fffff803`a831242a : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx ffffd000`c8e7b540 fffff800`f0590f67 : 00000000`00000000 fffff803`a8130c1e ffffe000`00000000 00000000`00000001 : nt!ExFreePoolWithTag+0x114a ffffd000`c8e7b610 fffff800`f073ae00 : ffffe000`7f100198 00000000`00000000 0000007f`fffffff8 00000980`00000000 : NETIO!NetioFreeMdl+0x26f37 ffffd000`c8e7b660 fffff800`f055f501 : ffffe000`7c879760 ffffd000`c8e7b800 00000000`00000000 fffff800`efc4983b : tcpip!FlpReturnNetBufferListChain+0xbd8e0 ffffd000`c8e7b6b0 fffff800`f08be5ea : ffffe000`7c879760 ffffd000`c8e7b800 00000000`00000000 ffffe000`7c879760 : NETIO!NetioDereferenceNetBufferList+0xb1 ffffd000`c8e7b720 fffff800`f08bf165 : ffffe000`7c879760 ffffd000`c8e7b7c0 ffffd000`c8e7b830 ffffe000`7ee4d470 : fwpkclnt!FwppDereferenceNetioNetBufferList+0x46 ffffd000`c8e7b770 fffff800`f08bf2be : ffffe000`7c879760 00000000`00000000 ffffe000`7eb27620 ffffd000`c8e7b800 : fwpkclnt!FwpsDereferenceNetBufferList0+0x25 ffffd000`c8e7b7a0 fffff800`f1607728 : ffffe000`7e9bbf00 00000000`00000000 ffffd000`c8e7b8e0 fffff800`f1612e15 : fwpkclnt!FwpsFreeCloneNetBufferList0+0x106 ffffd000`c8e7b7e0 ffffe000`7e9bbf00 : 00000000`00000000 ffffd000`c8e7b8e0 fffff800`f1612e15 00000000`00000000 : aswStm+0x7728 ffffd000`c8e7b7e8 00000000`00000000 : ffffd000`c8e7b8e0 fffff800`f1612e15 00000000`00000000 fffff800`f16072cf : 0xffffe000`7e9bbf00 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NetioFreeMdl+26f37 fffff800`f0590f67 90 nop SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: NETIO!NetioFreeMdl+26f37 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 5215f7e4 IMAGE_VERSION: 6.3.9600.16384 BUCKET_ID_FUNC_OFFSET: 26f37 FAILURE_BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xc2_7_mdl__netio!netiofreemdl FAILURE_ID_HASH: {f2c46e80-d936-89a0-13f9-f9b302dc640b} Followup: MachineOwner ---------
Free Windows Admin Tool Kit Click here and download it now
May 6th, 2015 9:23am
thanks for the help
May 6th, 2015 10:21am