I usually use just the GPU feature of the tracker, and only recently decided to also begin work on the CPU client as well. However, after starting the SMP service, my system would BSOD (blue screen of death) every few hours. The error code is 'PFN-LIST CORRUPT", which is a memory error. On debugging the dump file, Windows Debugger seems to think it was core_a4.exe which was causing the problem. I had reset my CPU clock to default, but the problem was not fixed. Does anyone else have the same problem? How can I fix it? Thanks a lot!
I am using a Intel i5 760 @ 2.8 ghz
Below is the debug report for my latest dump file:
I am using a Intel i5 760 @ 2.8 ghz
Below is the debug report for my latest dump file:
- Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {7, 11d971, 1, 0}
Probably caused by : tcpip.sys ( tcpip!TcpCompleteTcbSend+40 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 000000000011d971, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: FahCore_a4.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80003136108 to fffff800030d6c40
STACK_TEXT:
fffff800`00ba1648 fffff800`03136108 : 00000000`0000004e 00000000`00000007 00000000`0011d971 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba1650 fffff800`03147856 : 00000000`00000000 fffffa80`03f4a7a0 fffffa80`04409c00 fffffa80`042aeac0 : nt! ?? ::FNODOBFM::`string'+0x175b6
fffff800`00ba1690 fffff800`030d9e48 : fffffa80`042a0004 00000000`00000000 00000000`00000002 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x37875
fffff800`00ba1720 fffff880`018fa4a0 : 00000000`000001bc 00000000`00000102 fffffa80`04409cf0 00000000`00000000 : nt!IopfCompleteRequest+0x168
fffff800`00ba1810 fffff880`0192423e : 00000000`00000009 00000000`00000000 fffffa80`045c0880 00000000`00000000 : tcpip!TcpCompleteTcbSend+0x40
fffff800`00ba1840 fffff880`018fa3e2 : fffffa80`045d0fa0 fffffa80`071cd8e0 fffffa80`04409cf0 fffff880`0190ef34 : tcpip!TcpShutdownTcb+0x50e
fffff800`00ba1980 fffff880`0191d5f4 : 00000000`00000011 fffff880`0190cb2a 00000000`6b45d520 fffff800`030dcfda : tcpip!TcpAbortTcbDelivery+0x32
fffff800`00ba19b0 fffff880`0190fd54 : fffff800`00ba1e68 fffff880`00000000 fffffa80`04409cf0 fffff880`06c55200 : tcpip!TcpTcbCarefulDatagram+0xc44
fffff800`00ba1b60 fffff880`0190e67a : fffffa80`04737490 fffff880`01906b34 fffffa80`045c0880 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff800`00ba1d10 fffff880`019102ab : fffffa80`05a9eaf4 fffffa80`0471e000 00000000`00000000 fffff800`00ba2000 : tcpip!TcpMatchReceive+0x1fa
fffff800`00ba1e60 fffff880`019071c7 : fffffa80`04737490 fffffa80`045f21f3 fffffa80`0000add6 00000000`0000add6 : tcpip!TcpPreValidatedReceive+0x36b
fffff800`00ba1f30 fffff880`01906d3a : 00000000`00000000 fffff880`01a269a0 fffff800`00ba20f0 fffffa80`049703d0 : tcpip!IppDeliverListToProtocol+0x97
fffff800`00ba1ff0 fffff880`01906339 : fffff880`01a269a0 fffffa80`08b6f000 fffff800`00ba20a0 fffff800`00ba20e0 : tcpip!IppProcessDeliverList+0x5a
fffff800`00ba2090 fffff880`019040af : fffffa80`060eab90 fffffa80`0471e000 fffff880`01a269a0 00000000`062d2001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff800`00ba2170 fffff880`019036a2 : fffffa80`062e1520 00000000`00000000 fffffa80`062d2001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff800`00ba2370 fffff880`01902b3a : fffffa80`062d2010 fffff800`00ba24a0 fffffa80`062d2010 fffff800`030b0000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff800`00ba2450 fffff800`030e3618 : fffffa80`049703d0 00000000`00004800 fffffa80`04029b60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff800`00ba24a0 fffff880`01903202 : fffff880`01902a60 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff800`00ba2580 fffff880`017380eb : fffffa80`062d1010 00000000`00000000 fffffa80`052241a0 fffffa80`052241a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff800`00ba25f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpCompleteTcbSend+40
fffff880`018fa4a0 488b4e48 mov rcx,qword ptr [rsi+48h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: tcpip!TcpCompleteTcbSend+40
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e83e948
FAILURE_BUCKET_ID: X64_0x4E_7_tcpip!TcpCompleteTcbSend+40
BUCKET_ID: X64_0x4E_7_tcpip!TcpCompleteTcbSend+40
Followup: MachineOwner
---------