FAH GPU Tracker V2

FAH GPU Tracker V2 is a Folding@Home Client tracking and control program


    !!! smp client causes BSOD please help

    Share

    tonyxc600

    Posts : 1
    Join date : 2011-12-25

    !!! smp client causes BSOD please help

    Post by tonyxc600 on Sun Dec 25, 2011 5:48 am

    I usually use just the GPU feature of the tracker, and only recently decided to also begin work on the CPU client as well. However, after starting the SMP service, my system would BSOD (blue screen of death) every few hours. The error code is 'PFN-LIST CORRUPT", which is a memory error. On debugging the dump file, Windows Debugger seems to think it was core_a4.exe which was causing the problem. I had reset my CPU clock to default, but the problem was not fixed. Does anyone else have the same problem? How can I fix it? Thanks a lot!

    I am using a Intel i5 760 @ 2.8 ghz

    Below is the debug report for my latest dump file:
    Code:
    *******************************************************************************
    *                                                                            *
    *                        Bugcheck Analysis                                    *
    *                                                                            *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 4E, {7, 11d971, 1, 0}

    Probably caused by : tcpip.sys ( tcpip!TcpCompleteTcbSend+40 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                            *
    *                        Bugcheck Analysis                                    *
    *                                                                            *
    *******************************************************************************

    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
    Arg2: 000000000011d971, page frame number
    Arg3: 0000000000000001, current share count
    Arg4: 0000000000000000, 0

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x4E_7

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    PROCESS_NAME:  FahCore_a4.exe

    CURRENT_IRQL:  2

    LAST_CONTROL_TRANSFER:  from fffff80003136108 to fffff800030d6c40

    STACK_TEXT: 
    fffff800`00ba1648 fffff800`03136108 : 00000000`0000004e 00000000`00000007 00000000`0011d971 00000000`00000001 : nt!KeBugCheckEx
    fffff800`00ba1650 fffff800`03147856 : 00000000`00000000 fffffa80`03f4a7a0 fffffa80`04409c00 fffffa80`042aeac0 : nt! ?? ::FNODOBFM::`string'+0x175b6
    fffff800`00ba1690 fffff800`030d9e48 : fffffa80`042a0004 00000000`00000000 00000000`00000002 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x37875
    fffff800`00ba1720 fffff880`018fa4a0 : 00000000`000001bc 00000000`00000102 fffffa80`04409cf0 00000000`00000000 : nt!IopfCompleteRequest+0x168
    fffff800`00ba1810 fffff880`0192423e : 00000000`00000009 00000000`00000000 fffffa80`045c0880 00000000`00000000 : tcpip!TcpCompleteTcbSend+0x40
    fffff800`00ba1840 fffff880`018fa3e2 : fffffa80`045d0fa0 fffffa80`071cd8e0 fffffa80`04409cf0 fffff880`0190ef34 : tcpip!TcpShutdownTcb+0x50e
    fffff800`00ba1980 fffff880`0191d5f4 : 00000000`00000011 fffff880`0190cb2a 00000000`6b45d520 fffff800`030dcfda : tcpip!TcpAbortTcbDelivery+0x32
    fffff800`00ba19b0 fffff880`0190fd54 : fffff800`00ba1e68 fffff880`00000000 fffffa80`04409cf0 fffff880`06c55200 : tcpip!TcpTcbCarefulDatagram+0xc44
    fffff800`00ba1b60 fffff880`0190e67a : fffffa80`04737490 fffff880`01906b34 fffffa80`045c0880 00000000`00000000 : tcpip!TcpTcbReceive+0x694
    fffff800`00ba1d10 fffff880`019102ab : fffffa80`05a9eaf4 fffffa80`0471e000 00000000`00000000 fffff800`00ba2000 : tcpip!TcpMatchReceive+0x1fa
    fffff800`00ba1e60 fffff880`019071c7 : fffffa80`04737490 fffffa80`045f21f3 fffffa80`0000add6 00000000`0000add6 : tcpip!TcpPreValidatedReceive+0x36b
    fffff800`00ba1f30 fffff880`01906d3a : 00000000`00000000 fffff880`01a269a0 fffff800`00ba20f0 fffffa80`049703d0 : tcpip!IppDeliverListToProtocol+0x97
    fffff800`00ba1ff0 fffff880`01906339 : fffff880`01a269a0 fffffa80`08b6f000 fffff800`00ba20a0 fffff800`00ba20e0 : tcpip!IppProcessDeliverList+0x5a
    fffff800`00ba2090 fffff880`019040af : fffffa80`060eab90 fffffa80`0471e000 fffff880`01a269a0 00000000`062d2001 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff800`00ba2170 fffff880`019036a2 : fffffa80`062e1520 00000000`00000000 fffffa80`062d2001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff800`00ba2370 fffff880`01902b3a : fffffa80`062d2010 fffff800`00ba24a0 fffffa80`062d2010 fffff800`030b0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff800`00ba2450 fffff800`030e3618 : fffffa80`049703d0 00000000`00004800 fffffa80`04029b60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff800`00ba24a0 fffff880`01903202 : fffff880`01902a60 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff800`00ba2580 fffff880`017380eb : fffffa80`062d1010 00000000`00000000 fffffa80`052241a0 fffffa80`052241a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff800`00ba25f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    tcpip!TcpCompleteTcbSend+40
    fffff880`018fa4a0 488b4e48        mov    rcx,qword ptr [rsi+48h]

    SYMBOL_STACK_INDEX:  4

    SYMBOL_NAME:  tcpip!TcpCompleteTcbSend+40

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: tcpip

    IMAGE_NAME:  tcpip.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  4e83e948

    FAILURE_BUCKET_ID:  X64_0x4E_7_tcpip!TcpCompleteTcbSend+40

    BUCKET_ID:  X64_0x4E_7_tcpip!TcpCompleteTcbSend+40

    Followup: MachineOwner
    ---------


      Current date/time is Sun Jul 23, 2017 3:36 pm