ProLiant Servers (ML,DL,SL)
cancel
Showing results for 
Search instead for 
Did you mean: 

DL380 G6 bxnd60a.sys BSOD in SBS2008 64bit

Ben Corbett
Occasional Visitor

DL380 G6 bxnd60a.sys BSOD in SBS2008 64bit

Hi All,

We've got an HP Proliant DL380 G6 running SBS 2008 x64. It's a new server and has only been running a few weeks and it has started blue screening. It's crashing on the Broadcom Drivers as per win debug below. We're running the 5.2.22.0 drivers found here:

http://h20000.www2.hp.com/bizsupport/TechSupport/SoftwareDescription.jsp?lang=en&cc=au&prodTypeId=15351&prodSeriesId=3884082&prodNameId=3884083&swEnvOID=4024&swLang=13&mode=2&taskId=135&swItem=MTX-0eebc7dc825e4ceb8e6510a91f

Also disabled NICs 1-3 and only 4 is active (although adapter 4 in OS is actually labeled 1 at back of machine)

Tried firmware update and it said it was already latest.

Running low on ideas.

can anyone help?

Cheers

Ben

Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ben\Desktop\Mini100710-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\I386\
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (8 procs) Free x64
Product: LanManNt, suite: SmallBusiness TerminalServer SmallBusinessRestricted SingleUserTS
Built by: 6001.18488.amd64fre.vistasp1_gdr.100608-0458
Machine Name:
Kernel base = 0xfffff800`01a46000 PsLoadedModuleList = 0xfffff800`01c0bdb0
Debug session time: Thu Oct 7 10:58:40.975 2010 (UTC + 10:30)
System Uptime: 10 days 11:16:13.067
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {ff, 2, 0, fffffa60010a7518}

Unable to load image \SystemRoot\system32\DRIVERS\bxnd60a.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for bxnd60a.sys
*** ERROR: Module load completed but symbols could not be loaded for bxnd60a.sys
Probably caused by : bxnd60a.sys ( bxnd60a+c9a2 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000000000ff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa60010a7518, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c6f080
00000000000000ff

CURRENT_IRQL: 2

FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+27c6f
fffffa60`010a7518 8b08 mov ecx,dword ptr [rax]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP

BUGCHECK_STR: 0xD1

PROCESS_NAME: System

TRAP_FRAME: fffffa6001c69f90 -- (.trap 0xfffffa6001c69f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000ff rbx=0000000000000000 rcx=0000000000004440
rdx=fffffa800d698870 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa60010a7518 rsp=fffffa6001c6a120 rbp=0000000000000000
r8=0000000000000000 r9=fffffa800d698870 r10=0000000000000000
r11=fffffa6001c6a100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip! ?? ::FNODOBFM::`string'+0x27c6f:
fffffa60`010a7518 8b08 mov ecx,dword ptr [rax] ds:8870:00000000`000000ff=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80001a9b16e to fffff80001a9b3d0

STACK_TEXT:
fffffa60`01c69e48 fffff800`01a9b16e : 00000000`0000000a 00000000`000000ff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`01c69e50 fffff800`01a9a04b : 00000000`00000000 fffffa60`0114bf20 00000000`00000000 fffffa80`0c39f870 : nt!KiBugCheckDispatch+0x6e
fffffa60`01c69f90 fffffa60`010a7518 : 00000000`00000000 fffffa80`0c39f870 00000000`00000000 fffffa80`0a100c00 : nt!KiPageFault+0x20b
fffffa60`01c6a120 fffffa60`0105c759 : fffffa60`0114bf20 fffffa80`0a0e5000 fffffa80`0afe5c70 fffffa80`0afe5c70 : tcpip! ?? ::FNODOBFM::`string'+0x27c6f
fffffa60`01c6a200 fffffa60`010796b0 : fffffa80`2f411480 00000000`00000000 fffffa80`29880001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x879
fffffa60`01c6a3e0 fffffa60`01076a3b : fffffa80`2f411480 fffffa80`1396ca70 0000004a`00000011 00000000`00000002 : tcpip!IpFlcReceivePreValidatedPackets+0x720
fffffa60`01c6a530 fffffa60`009a533c : fffffa80`30ab7510 00000000`00000000 fffffa60`01c6a600 fffffa80`0a3ac1a0 : tcpip!FlReceiveNetBufferListChain+0x9b
fffffa60`01c6a580 fffffa60`0096e266 : fffffa60`01c6a6e0 fffffa60`01c6a6f0 00000000`00000001 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac
fffffa60`01c6a5d0 fffffa60`00802867 : fffffa80`0a3ac1a0 00000000`00000002 00000000`00000001 fffffa80`12a3c000 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d6
fffffa60`01c6aa50 fffffa60`015429a2 : 00000000`00000000 fffffa60`01c6ab80 fffffa60`014b1110 fffffa80`1095f300 : NDIS!NdisMIndicateReceiveNetBufferLists+0x67
fffffa60`01c6aa90 00000000`00000000 : fffffa60`01c6ab80 fffffa60`014b1110 fffffa80`1095f300 fffffa80`00000001 : bxnd60a+0xc9a2


STACK_COMMAND: kb

FOLLOWUP_IP:
bxnd60a+c9a2
fffffa60`015429a2 ?? ???

SYMBOL_STACK_INDEX: a

SYMBOL_NAME: bxnd60a+c9a2

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: bxnd60a

IMAGE_NAME: bxnd60a.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4b2abed3

FAILURE_BUCKET_ID: X64_0xD1_bxnd60a+c9a2

BUCKET_ID: X64_0xD1_bxnd60a+c9a2

Followup: MachineOwner
---------