2012 R2 New Install Bug Check


we in process of rebuilding our 2012 hyperv hosts 2012r2.  have built 6 , 6 have

we installed os applied patches, ran hp spp , hp 2012r2 supplemental spp.

looks servers crashing bug check on ixi63x64.sys

here part of memory.dmp:

bugcheck 1e, {ffffffffc0000005, fffff8020563c1c0, ffffd000305e9b48, ffffd000305e9350}

*** error: module load completed symbols not loaded ixi63x64.sys
caused : ntkrnlmp.exe ( nt!exquerydepthslist+0 )

followup: machineowner
---------

24: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        bugcheck analysis                                    *
*                                                                             *
*******************************************************************************

kmode_exception_not_handled (1e)
common bugcheck.  exception address pinpoints
driver/function caused problem.  note address
link date of driver/image contains address.
arguments:
arg1: ffffffffc0000005, exception code not handled
arg2: fffff8020563c1c0, address exception occurred at
arg3: ffffd000305e9b48, parameter 0 of exception
arg4: ffffd000305e9350, parameter 1 of exception

debugging details:
------------------


write_address: fffff802058b5340: unable special pool info
fffff802058b5340: unable special pool info
 ffffd000305e9350

exception_code: (ntstatus) 0xc0000005 - instruction @ 0x%08lx referenced memory @ 0x%08lx. memory not %s.

faulting_ip:
nt!exquerydepthslist+0
fffff802`0563c1c0 8b01            mov     eax,dword ptr [rcx]

exception_parameter1:  ffffd000305e9b48

exception_parameter2:  ffffd000305e9350

bugcheck_str:  0x1e_c0000005

default_bucket_id:  win8_driver_fault

process_name:  system

current_irql:  0

exception_record:  ffffe000081ce010 -- (.exr 0xffffe000081ce010)
exceptionaddress: ffffe00003cf02d0
   exceptioncode: 03880105
  exceptionflags: 00000000
numberparameters: 136111376
   parameter[0]: ffffe00006fdf1a0
   parameter[1]: ffffe000081d3f40
   parameter[2]: ffffe000081cff20
   parameter[3]: 0000000100000810
   parameter[4]: 0000000000000004
   parameter[5]: 0000000000000000
   parameter[6]: 0000000000000001
   parameter[7]: ffffe000081d3f10
   parameter[8]: 0000000000000000
   parameter[9]: ffffe00008071840
   parameter[10]: 0000000000000000
   parameter[11]: 0000000000000000
   parameter[12]: 0000000000000000
   parameter[13]: 0000000000000000
   parameter[14]: 0000000000000000

last_control_transfer:  fffff802057d6ebf fffff80205750ca0

stack_text: 
ffffd000`305e8ae8 fffff802`057d6ebf : 00000000`0000001e ffffffff`c0000005 fffff802`0563c1c0 ffffd000`305e9b48 : nt!kebugcheckex
ffffd000`305e8af0 fffff802`05761c66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000ffff : nt!kifatalfilter+0x1f
ffffd000`305e8b30 fffff802`0573fda6 : ffffe001`6af359e0 fffff800`00661120 ffffe001`6ae5d1a0 ffffd000`305e8bf0 : nt! ?? ::fnodobfm::`string'+0xac6
ffffd000`305e8b80 fffff802`057581ed : 00000000`00000000 ffffd000`305e8d20 ffffd000`305e9b48 00000000`00000000 : nt!_c_specific_handler+0x86
ffffd000`305e8bf0 fffff802`056de595 : 00000000`00000007 ffffd000`305e8d20 fffff800`006d123c fffff800`00678622 : nt!rtlpexecutehandlerforexception+0xd
ffffd000`305e8c20 fffff802`056df45b : ffffd000`305e9b48 ffffd000`305e9850 ffffd000`305e9b48 ffffe001`6befbc80 : nt!rtldispatchexception+0x455
ffffd000`305e9320 fffff802`0575c8c2 : ffffe000`081ce010 fffff800`00671d01 ffffd000`305e9e00 00000000`4002000d : nt!kidispatchexception+0x61f
ffffd000`305e9a10 fffff802`0575b014 : 00000000`00000000 ffffe001`6bfeb030 00000000`00000000 ffffd000`305e9bf0 : nt!kiexceptiondispatch+0xc2
ffffd000`305e9bf0 fffff802`0563c1c0 : fffff800`00662fb1 ffffe001`6bfeb030 ffffd000`305e9e00 ffffe000`0709e000 : nt!kipagefault+0x214
ffffd000`305e9d88 fffff800`00662fb1 : ffffe001`6bfeb030 ffffd000`305e9e00 ffffe000`0709e000 00000000`00000000 : nt!exquerydepthslist
ffffd000`305e9d90 fffff800`01caa637 : ffffe000`070a1e40 ffffe000`0709e000 ffffe001`6bfe6010 00000000`00000000 : ndis!ndisfreenetbufferlist+0xb1
ffffd000`305e9e10 fffff800`01caadf9 : ffffe000`070a1e40 ffffe000`0709e000 00000000`00000002 00000000`00000000 : ixi63x64+0x25637
ffffd000`305e9e40 fffff800`01cab150 : ffffe000`070a1e40 00000000`00000003 00000000`00000000 ffffe000`0709e000 : ixi63x64+0x25df9
ffffd000`305e9e80 fffff800`01cb8b9b : ffffe000`0709e000 00000000`00000002 ffffe000`0709e000 ffffe001`00000004 : ixi63x64+0x26150
ffffd000`305e9eb0 fffff800`01ca571b : 00000000`00000000 ffffd000`2d577990 ffffe000`0709e000 00000000`00000000 : ixi63x64+0x33b9b
ffffd000`305e9ef0 fffff800`01ca8b79 : ffffe000`081ce002 00000000`00000000 ffffe000`0709e000 ffffd000`2d577990 : ixi63x64+0x2071b
ffffd000`305e9f40 fffff800`01ca929b : ffffe001`6ca2f120 fffff800`00666b19 ffffd000`305ea0e0 ffffe000`03cf02d0 : ixi63x64+0x23b79
ffffd000`305e9fb0 fffff800`006ef12e : 00000000`00010224 ffffe001`6ca2f158 ffffe001`6ca2f154 ffffe000`06fdf1a0 : ixi63x64+0x2429b
ffffd000`305ea020 fffff800`006677c1 : ffffe000`06fdf1a0 00000000`00000000 00000000`00000000 00000000`00000011 : ndis!ndisminvokeoidrequest+0x4e
ffffd000`305ea060 fffff800`006667e0 : 00000000`00000000 00000000`00000000 ffffd000`305ea240 ffffe001`6ca2f168 : ndis!ndismdooidrequest+0x3b9
ffffd000`305ea140 fffff800`00666c06 : ffffe000`06feb1a0 ffffe001`6af359e0 00000000`00000000 fffff800`0066c9b4 : ndis!ndisqueueoidrequest+0x4b0
ffffd000`305ea2d0 fffff800`010011b2 : ffffe001`6c96edb0 00000000`00010224 ffffe001`6c96edb0 ffffe000`081ce510 : ndis!ndisfoidrequest+0xc2
ffffd000`305ea390 fffff800`00667d3e : ffffe001`6ca2f120 ffffe000`03cf02d0 00000000`00000000 ffffe000`081ce010 : wfplwfs!lwfloweroidrequest+0x6e
ffffd000`305ea3c0 fffff802`056bb3f9 : ffffd000`305ea710 ffffd000`305e5000 00000000`00000000 00000000`00000000 : ndis!ndisfdooidrequestinternal+0x2ee
ffffd000`305ea4c0 fffff800`006665ef : fffff800`00667a50 ffffe000`081ce010 ffffe001`6be16600 fffff800`00000000 : nt!keexpandkernelstackandcalloutinternal+0xe9
ffffd000`305ea610 fffff800`00668183 : 00000000`00000002 ffffd000`2011b260 ffffe001`6af359e0 fffff800`0066d025 : ndis!ndisqueueoidrequest+0x2bf
ffffd000`305ea7a0 fffff800`01fe6f04 : 00000000`00000001 ffffe000`081d4000 00000000`00000000 fffff800`01fe3e41 : ndis!ndismoidrequest+0x193
ffffd000`305ea8b0 fffff800`01fe52e5 : ffffe000`0800ff00 ffffe000`081d9020 ffffd000`305eaa00 00000000`00000000 : ndisimplatform!implatdooidrequestonadapter+0x214
ffffd000`305ea900 fffff800`01fe6fc0 : 00000000`00000000 00000000`00000000 ffffe000`081d9000 ffffe001`6be167c0 : ndisimplatform!implatoidrequestinternal+0x1fd
ffffd000`305eaac0 fffff802`056a3a0e : ffffe001`6bf07120 ffffe000`07f7c050 00000000`00000000 fffff800`6977444e : ndisimplatform!implatoidrequestworkitem+0x24
ffffd000`305eaaf0 fffff802`056a41b9 : fffff800`0066297c fffff802`056a3998 ffffd000`305eabd0 ffffe001`6bf07120 : nt!iopprocessworkitem+0x76
ffffd000`305eab50 fffff802`056902e4 : ffffe000`04f5f2d0 ffffe001`6be166c0 ffffe001`6be166c0 ffffe000`0300f940 : nt!expworkerthread+0x2b5
ffffd000`305eac00 fffff802`057572c6 : ffffd000`24140180 ffffe001`6be166c0 ffffd000`2414d140 fffff802`056ef90f : nt!pspsystemthreadstartup+0x58
ffffd000`305eac60 00000000`00000000 : ffffd000`305eb000 ffffd000`305e5000 00000000`00000000 00000000`00000000 : nt!kistartsystemthread+0x16


stack_command:  kb

followup_ip:
nt!exquerydepthslist+0
fffff802`0563c1c0 8b01            mov     eax,dword ptr [rcx]

symbol_stack_index:  9

symbol_name:  nt!exquerydepthslist+0

followup_name:  machineowner

module_name: nt

image_name:  ntkrnlmp.exe

debug_flr_image_timestamp:  52718d9c

bucket_id_func_offset:  0

failure_bucket_id:  0x1e_c0000005_nt!exquerydepthslist

bucket_id:  0x1e_c0000005_nt!exquerydepthslist

any ideas?  did search ixi63x64.sys , doesn't return much.  thought ask before opening ms case.  thanks.

can locate ixi63x64.sys file on server? there may metadata on file far owner of file.
possible kernel dump skydrive?

brad held http://windorks.wordpress.com




Windows Server  >  Windows Server 2012 Setup



Comments

Popular posts from this blog

server manager error: ADAM.events.xml could not be enumerated.

Cannot access Anywhere Access using domain name?

WMI Failure: Unable to update Local Resource Group