Windows 2008 x64 crash dump
Greetings!I have a crash dump that requires some investigation and advice.........System: Dell 2950 x64OS: Windows 2008 SP2App: Exchange 2007Broadcom NIC drivers have been upgraded to the latest Dell release.Can anybody assist with diagnostics of this dump file please.ThanksLoading Dump File [C:\Windows\MEMORY.DMP]Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (8 procs) Free x64Product: Server, suite: Enterprise TerminalServer SingleUserTSBuilt by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830Machine Name:Kernel base = 0xfffff800`0185e000 PsLoadedModuleList = 0xfffff800`01a22dd0Debug session time: Thu Aug 6 11:09:18.847 2009 (GMT+2)System Uptime: 1 days 18:19:58.026Loading Kernel Symbols....................................................................................................................................Loading User Symbols
Loading unloaded module list..******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8576fd53, 2, 8, 8576fd53}
*** ERROR: Module load completed but symbols could not be loaded for bxnd60a.sys*** ERROR: Module load completed but symbols could not be loaded for bxvbda.sysProbably caused by : bxnd60a.sys ( bxnd60a+ba5a )
Followup: MachineOwner---------
3: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If kernel debugger is available get stack backtrace.Arguments:Arg1: 000000008576fd53, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000008, value 0 = read operation, 1 = write operationArg4: 000000008576fd53, address which referenced memory
Debugging Details:------------------
READ_ADDRESS: 000000008576fd53
CURRENT_IRQL: 2
FAULTING_IP: +000000000`8576fd53 ?? ???
PROCESS_NAME: System
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffffa60019feea0 -- (.trap 0xfffffa60019feea0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=000000008576fd53 rbx=0000000000000000 rcx=000000000001ad08rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=000000008576fd53 rsp=fffffa60019ff038 rbp=fffffa6001156400r8=fffffa801f0d1840 r9=0000000000000001 r10=fffffa801a2edb10r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po nc00000000`8576fd53 ?? ???Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800018b81ee to fffff800018b8450
FAILED_INSTRUCTION_ADDRESS: +000000000`8576fd53 ?? ???
STACK_TEXT: fffffa60`019fed58 fffff800`018b81ee : 00000000`0000000a 00000000`8576fd53 00000000`00000002 00000000`00000008 : nt!KeBugCheckExfffffa60`019fed60 fffff800`018b70cb : 00000000`00000008 fffffa80`1c05c010 00000000`00000004 fffffa80`1c05c010 : nt!KiBugCheckDispatch+0x6efffffa60`019feea0 00000000`8576fd53 : fffffa60`0106fc76 fffffa80`1c05c010 fffffa60`01156400 00000000`00000000 : nt!KiPageFault+0x20bfffffa60`019ff038 fffffa60`0106fc76 : fffffa80`1c05c010 fffffa60`01156400 00000000`00000000 fffffa80`1f52f010 : 0x8576fd53fffffa60`019ff040 fffffa60`0106ee0a : fffffa80`1c05c010 fffffa80`1a427008 fffffa80`1a30c7c0 fffffa60`019ff120 : tcpip!TcpCleanupTcbWorkQueueRoutine+0xd6fffffa60`019ff080 fffffa60`01069d1a : fffffa80`1a40cf00 00000000`00000001 fffffa80`1a427008 00000000`00000000 : tcpip!TcpTcbReceive+0x6dafffffa60`019ff230 fffffa60`0106883f : fffffa80`1aa67cec 00000000`00000000 00000000`00000000 fffffa60`019f8f00 : tcpip!TcpMatchReceive+0x1bafffffa60`019ff330 fffffa60`01067e23 : 00000000`00000001 00000000`00da7a64 fffffa80`20054506 fffffa80`1d02b960 : tcpip!TcpPreValidatedReceive+0x2effffffa60`019ff3c0 fffffa60`010674cb : fffffa80`1b4c00c0 00000000`00000000 fffffa80`1b0c0006 fffffa80`1a4270f0 : tcpip!IpFlcReceivePreValidatedPackets+0x533fffffa60`019ff520 fffffa60`009b10bc : fffffa80`1bd4b010 00000000`00000000 fffffa60`019ff600 fffffa80`1a6cc1a0 : tcpip!FlReceiveNetBufferListChain+0x9bfffffa60`019ff570 fffffa60`009798c9 : fffffa60`019ff6d0 00000000`00000000 fffffa80`1b14b010 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xacfffffa60`019ff5c0 fffffa60`0080e6f7 : fffffa80`1a6cc1a0 00000000`00000002 fffffa80`1b0c82a0 fffffa60`00e135c8 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d9fffffa60`019ffa40 fffffa60`00f5ba5a : 00000000`00000000 fffffa60`019ffb70 00000000`00000000 fffffa80`1eddb0c0 : NDIS!NdisMIndicateReceiveNetBufferLists+0x67fffffa60`019ffa80 fffffa60`00f5bc2e : fffffa80`1a774010 00000000`00000000 fffffa80`1a7744e8 fffffa80`19f84308 : bxnd60a+0xba5afffffa60`019ffae0 fffffa60`00e0c9a7 : fffffa80`1a196010 fffffa80`1a786000 00000000`00000000 00000000`0000000c : bxnd60a+0xbc2efffffa60`019ffb50 fffffa60`00e0cc42 : fffffa80`1a196010 00000000`ffffffff 00000000`00000000 00000000`00000000 : bxvbda+0x69a7fffffa60`019ffbb0 fffffa60`00e13c16 : fffffa80`1a196990 00000000`00000007 fffffa80`1a199890 fffffa80`1a372a10 : bxvbda+0x6c42fffffa60`019ffc30 fffffa60`00e13de0 : fffffa80`1a196010 fffff780`00000003 00000000`00000007 fffffa60`00f367a2 : bxvbda+0xdc16fffffa60`019ffc90 fffffa60`00e143e1 : fffffa80`1a196010 fffff780`00000008 00000000`00000001 fffffa60`019d8180 : bxvbda+0xdde0fffffa60`019ffce0 fffff800`018bc667 : fffffa80`1a198398 00000000`00000000 fffffa60`019db580 00000000`00000000 : bxvbda+0xe3e1fffffa60`019ffd10 fffff800`018bc8e2 : fffffa60`00e14334 fffffa60`019d8180 00000000`00000000 fffffa60`019e1d40 : nt!KiRetireDpcList+0x117fffffa60`019ffd80 fffff800`01a89860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62fffffa60`019ffdb0 00000000`fffffa60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4fffffa60`019dbd00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00680000`00000000 : 0xfffffa60
STACK_COMMAND: kb
FOLLOWUP_IP: bxnd60a+ba5afffffa60`00f5ba5a 488b5c2460 mov rbx,qword ptr [rsp+60h]
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: bxnd60a+ba5a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: bxnd60a
IMAGE_NAME: bxnd60a.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4980e0ae
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_bxnd60a+ba5a
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_bxnd60a+ba5a
Followup: MachineOwner---------
3: kd> !threadTHREAD fffffa60019e1d40 Cid 0000.0000 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 3Not impersonatingDeviceMap fffff88000007450Owning Process fffff800019d70c0 Image: IdleAttached Process fffffa80199fec10 Image: SystemWait Start TickCount 9663615 Ticks: 105426 (0:00:27:24.656)Context Switch Count 20571280 UserTime 00:00:00.000KernelTime 1 Day 17:47:05.212Win32 Start Address nt!KiIdleLoop (0xfffff800018bc880)Stack Init fffffa60019ffdb0 Current fffffa60019ffd40Base fffffa6001a00000 Limit fffffa60019fa000 Call 0Priority 16 BasePriority 0 PriorityDecrement 0 IoPriority 0 PagePriority 0Child-SP RetAddr : Args to Child : Call Sitefffffa60`019fed58 fffff800`018b81ee : 00000000`0000000a 00000000`8576fd53 00000000`00000002 00000000`00000008 : nt!KeBugCheckExfffffa60`019fed60 fffff800`018b70cb : 00000000`00000008 fffffa80`1c05c010 00000000`00000004 fffffa80`1c05c010 : nt!KiBugCheckDispatch+0x6efffffa60`019feea0 00000000`8576fd53 : fffffa60`0106fc76 fffffa80`1c05c010 fffffa60`01156400 00000000`00000000 : nt!KiPageFault+0x20b (TrapFrame @ fffffa60`019feea0)fffffa60`019ff038 fffffa60`0106fc76 : fffffa80`1c05c010 fffffa60`01156400 00000000`00000000 fffffa80`1f52f010 : 0x8576fd53fffffa60`019ff040 fffffa60`0106ee0a : fffffa80`1c05c010 fffffa80`1a427008 fffffa80`1a30c7c0 fffffa60`019ff120 : tcpip!TcpCleanupTcbWorkQueueRoutine+0xd6fffffa60`019ff080 fffffa60`01069d1a : fffffa80`1a40cf00 00000000`00000001 fffffa80`1a427008 00000000`00000000 : tcpip!TcpTcbReceive+0x6dafffffa60`019ff230 fffffa60`0106883f : fffffa80`1aa67cec 00000000`00000000 00000000`00000000 fffffa60`019f8f00 : tcpip!TcpMatchReceive+0x1bafffffa60`019ff330 fffffa60`01067e23 : 00000000`00000001 00000000`00da7a64 fffffa80`20054506 fffffa80`1d02b960 : tcpip!TcpPreValidatedReceive+0x2effffffa60`019ff3c0 fffffa60`010674cb : fffffa80`1b4c00c0 00000000`00000000 fffffa80`1b0c0006 fffffa80`1a4270f0 : tcpip!IpFlcReceivePreValidatedPackets+0x533fffffa60`019ff520 fffffa60`009b10bc : fffffa80`1bd4b010 00000000`00000000 fffffa60`019ff600 fffffa80`1a6cc1a0 : tcpip!FlReceiveNetBufferListChain+0x9bfffffa60`019ff570 fffffa60`009798c9 : fffffa60`019ff6d0 00000000`00000000 fffffa80`1b14b010 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xacfffffa60`019ff5c0 fffffa60`0080e6f7 : fffffa80`1a6cc1a0 00000000`00000002 fffffa80`1b0c82a0 fffffa60`00e135c8 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d9fffffa60`019ffa40 fffffa60`00f5ba5a : 00000000`00000000 fffffa60`019ffb70 00000000`00000000 fffffa80`1eddb0c0 : NDIS!NdisMIndicateReceiveNetBufferLists+0x67fffffa60`019ffa80 fffffa60`00f5bc2e : fffffa80`1a774010 00000000`00000000 fffffa80`1a7744e8 fffffa80`19f84308 : bxnd60a+0xba5afffffa60`019ffae0 fffffa60`00e0c9a7 : fffffa80`1a196010 fffffa80`1a786000 00000000`00000000 00000000`0000000c : bxnd60a+0xbc2efffffa60`019ffb50 fffffa60`00e0cc42 : fffffa80`1a196010 00000000`ffffffff 00000000`00000000 00000000`00000000 : bxvbda+0x69a7fffffa60`019ffbb0 fffffa60`00e13c16 : fffffa80`1a196990 00000000`00000007 fffffa80`1a199890 fffffa80`1a372a10 : bxvbda+0x6c42fffffa60`019ffc30 fffffa60`00e13de0 : fffffa80`1a196010 fffff780`00000003 00000000`00000007 fffffa60`00f367a2 : bxvbda+0xdc16fffffa60`019ffc90 fffffa60`00e143e1 : fffffa80`1a196010 fffff780`00000008 00000000`00000001 fffffa60`019d8180 : bxvbda+0xdde0fffffa60`019ffce0 fffff800`018bc667 : fffffa80`1a198398 00000000`00000000 fffffa60`019db580 00000000`00000000 : bxvbda+0xe3e1fffffa60`019ffd10 fffff800`018bc8e2 : fffffa60`00e14334 fffffa60`019d8180 00000000`00000000 fffffa60`019e1d40 : nt!KiRetireDpcList+0x117fffffa60`019ffd80 fffff800`01a89860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62fffffa60`019ffdb0 00000000`fffffa60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4fffffa60`019dbd00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00680000`00000000 : 0xfffffa60
3: kd> !process fffff800019d70c0 0PROCESS fffff800019d70c0 SessionId: none Cid: 0000 Peb: 00000000 ParentCid: 0000 DirBase: 00124000 ObjectTable: fffff88000002010 HandleCount: 4419. Image: Idle
August 6th, 2009 3:22pm
Caused by: IMAGE_NAME: bxnd60a.sys googling it, it looks like there are more people with the same problems.
Free Windows Admin Tool Kit Click here and download it now
August 6th, 2009 5:12pm
Hi,
Please understand in this forum, we do not provide debugging support. If you would like to perform debugging, please contact Microsoft Customer Support Service (CSS).
To obtain the phone numbers for specific technology request, please refer to the website listed below:
http://support.microsoft.com/default.aspx?scid=fh;EN-US;PHONENUMBERS
If you are outside the US,please refer to http://support.microsoft.com for regional support phone numbers.
Tim Quan - MSFT
August 7th, 2009 6:01am


