2012 R2 New Install Bug Check
we in process of rebuilding our 2012 hyperv hosts 2012r2. have built 6 , 6 have
we installed os applied patches, ran hp spp , hp 2012r2 supplemental spp.
looks servers crashing bug check on ixi63x64.sys
here part of memory.dmp:
bugcheck 1e, {ffffffffc0000005, fffff8020563c1c0, ffffd000305e9b48, ffffd000305e9350}
*** error: module load completed symbols not loaded ixi63x64.sys
caused : ntkrnlmp.exe ( nt!exquerydepthslist+0 )
followup: machineowner
---------
24: kd> !analyze -v
*******************************************************************************
* *
* bugcheck analysis *
* *
*******************************************************************************
kmode_exception_not_handled (1e)
common bugcheck. exception address pinpoints
driver/function caused problem. note address
link date of driver/image contains address.
arguments:
arg1: ffffffffc0000005, exception code not handled
arg2: fffff8020563c1c0, address exception occurred at
arg3: ffffd000305e9b48, parameter 0 of exception
arg4: ffffd000305e9350, parameter 1 of exception
debugging details:
------------------
write_address: fffff802058b5340: unable special pool info
fffff802058b5340: unable special pool info
ffffd000305e9350
exception_code: (ntstatus) 0xc0000005 - instruction @ 0x%08lx referenced memory @ 0x%08lx. memory not %s.
faulting_ip:
nt!exquerydepthslist+0
fffff802`0563c1c0 8b01 mov eax,dword ptr [rcx]
exception_parameter1: ffffd000305e9b48
exception_parameter2: ffffd000305e9350
bugcheck_str: 0x1e_c0000005
default_bucket_id: win8_driver_fault
process_name: system
current_irql: 0
exception_record: ffffe000081ce010 -- (.exr 0xffffe000081ce010)
exceptionaddress: ffffe00003cf02d0
exceptioncode: 03880105
exceptionflags: 00000000
numberparameters: 136111376
parameter[0]: ffffe00006fdf1a0
parameter[1]: ffffe000081d3f40
parameter[2]: ffffe000081cff20
parameter[3]: 0000000100000810
parameter[4]: 0000000000000004
parameter[5]: 0000000000000000
parameter[6]: 0000000000000001
parameter[7]: ffffe000081d3f10
parameter[8]: 0000000000000000
parameter[9]: ffffe00008071840
parameter[10]: 0000000000000000
parameter[11]: 0000000000000000
parameter[12]: 0000000000000000
parameter[13]: 0000000000000000
parameter[14]: 0000000000000000
last_control_transfer: fffff802057d6ebf fffff80205750ca0
stack_text:
ffffd000`305e8ae8 fffff802`057d6ebf : 00000000`0000001e ffffffff`c0000005 fffff802`0563c1c0 ffffd000`305e9b48 : nt!kebugcheckex
ffffd000`305e8af0 fffff802`05761c66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000ffff : nt!kifatalfilter+0x1f
ffffd000`305e8b30 fffff802`0573fda6 : ffffe001`6af359e0 fffff800`00661120 ffffe001`6ae5d1a0 ffffd000`305e8bf0 : nt! ?? ::fnodobfm::`string'+0xac6
ffffd000`305e8b80 fffff802`057581ed : 00000000`00000000 ffffd000`305e8d20 ffffd000`305e9b48 00000000`00000000 : nt!_c_specific_handler+0x86
ffffd000`305e8bf0 fffff802`056de595 : 00000000`00000007 ffffd000`305e8d20 fffff800`006d123c fffff800`00678622 : nt!rtlpexecutehandlerforexception+0xd
ffffd000`305e8c20 fffff802`056df45b : ffffd000`305e9b48 ffffd000`305e9850 ffffd000`305e9b48 ffffe001`6befbc80 : nt!rtldispatchexception+0x455
ffffd000`305e9320 fffff802`0575c8c2 : ffffe000`081ce010 fffff800`00671d01 ffffd000`305e9e00 00000000`4002000d : nt!kidispatchexception+0x61f
ffffd000`305e9a10 fffff802`0575b014 : 00000000`00000000 ffffe001`6bfeb030 00000000`00000000 ffffd000`305e9bf0 : nt!kiexceptiondispatch+0xc2
ffffd000`305e9bf0 fffff802`0563c1c0 : fffff800`00662fb1 ffffe001`6bfeb030 ffffd000`305e9e00 ffffe000`0709e000 : nt!kipagefault+0x214
ffffd000`305e9d88 fffff800`00662fb1 : ffffe001`6bfeb030 ffffd000`305e9e00 ffffe000`0709e000 00000000`00000000 : nt!exquerydepthslist
ffffd000`305e9d90 fffff800`01caa637 : ffffe000`070a1e40 ffffe000`0709e000 ffffe001`6bfe6010 00000000`00000000 : ndis!ndisfreenetbufferlist+0xb1
ffffd000`305e9e10 fffff800`01caadf9 : ffffe000`070a1e40 ffffe000`0709e000 00000000`00000002 00000000`00000000 : ixi63x64+0x25637
ffffd000`305e9e40 fffff800`01cab150 : ffffe000`070a1e40 00000000`00000003 00000000`00000000 ffffe000`0709e000 : ixi63x64+0x25df9
ffffd000`305e9e80 fffff800`01cb8b9b : ffffe000`0709e000 00000000`00000002 ffffe000`0709e000 ffffe001`00000004 : ixi63x64+0x26150
ffffd000`305e9eb0 fffff800`01ca571b : 00000000`00000000 ffffd000`2d577990 ffffe000`0709e000 00000000`00000000 : ixi63x64+0x33b9b
ffffd000`305e9ef0 fffff800`01ca8b79 : ffffe000`081ce002 00000000`00000000 ffffe000`0709e000 ffffd000`2d577990 : ixi63x64+0x2071b
ffffd000`305e9f40 fffff800`01ca929b : ffffe001`6ca2f120 fffff800`00666b19 ffffd000`305ea0e0 ffffe000`03cf02d0 : ixi63x64+0x23b79
ffffd000`305e9fb0 fffff800`006ef12e : 00000000`00010224 ffffe001`6ca2f158 ffffe001`6ca2f154 ffffe000`06fdf1a0 : ixi63x64+0x2429b
ffffd000`305ea020 fffff800`006677c1 : ffffe000`06fdf1a0 00000000`00000000 00000000`00000000 00000000`00000011 : ndis!ndisminvokeoidrequest+0x4e
ffffd000`305ea060 fffff800`006667e0 : 00000000`00000000 00000000`00000000 ffffd000`305ea240 ffffe001`6ca2f168 : ndis!ndismdooidrequest+0x3b9
ffffd000`305ea140 fffff800`00666c06 : ffffe000`06feb1a0 ffffe001`6af359e0 00000000`00000000 fffff800`0066c9b4 : ndis!ndisqueueoidrequest+0x4b0
ffffd000`305ea2d0 fffff800`010011b2 : ffffe001`6c96edb0 00000000`00010224 ffffe001`6c96edb0 ffffe000`081ce510 : ndis!ndisfoidrequest+0xc2
ffffd000`305ea390 fffff800`00667d3e : ffffe001`6ca2f120 ffffe000`03cf02d0 00000000`00000000 ffffe000`081ce010 : wfplwfs!lwfloweroidrequest+0x6e
ffffd000`305ea3c0 fffff802`056bb3f9 : ffffd000`305ea710 ffffd000`305e5000 00000000`00000000 00000000`00000000 : ndis!ndisfdooidrequestinternal+0x2ee
ffffd000`305ea4c0 fffff800`006665ef : fffff800`00667a50 ffffe000`081ce010 ffffe001`6be16600 fffff800`00000000 : nt!keexpandkernelstackandcalloutinternal+0xe9
ffffd000`305ea610 fffff800`00668183 : 00000000`00000002 ffffd000`2011b260 ffffe001`6af359e0 fffff800`0066d025 : ndis!ndisqueueoidrequest+0x2bf
ffffd000`305ea7a0 fffff800`01fe6f04 : 00000000`00000001 ffffe000`081d4000 00000000`00000000 fffff800`01fe3e41 : ndis!ndismoidrequest+0x193
ffffd000`305ea8b0 fffff800`01fe52e5 : ffffe000`0800ff00 ffffe000`081d9020 ffffd000`305eaa00 00000000`00000000 : ndisimplatform!implatdooidrequestonadapter+0x214
ffffd000`305ea900 fffff800`01fe6fc0 : 00000000`00000000 00000000`00000000 ffffe000`081d9000 ffffe001`6be167c0 : ndisimplatform!implatoidrequestinternal+0x1fd
ffffd000`305eaac0 fffff802`056a3a0e : ffffe001`6bf07120 ffffe000`07f7c050 00000000`00000000 fffff800`6977444e : ndisimplatform!implatoidrequestworkitem+0x24
ffffd000`305eaaf0 fffff802`056a41b9 : fffff800`0066297c fffff802`056a3998 ffffd000`305eabd0 ffffe001`6bf07120 : nt!iopprocessworkitem+0x76
ffffd000`305eab50 fffff802`056902e4 : ffffe000`04f5f2d0 ffffe001`6be166c0 ffffe001`6be166c0 ffffe000`0300f940 : nt!expworkerthread+0x2b5
ffffd000`305eac00 fffff802`057572c6 : ffffd000`24140180 ffffe001`6be166c0 ffffd000`2414d140 fffff802`056ef90f : nt!pspsystemthreadstartup+0x58
ffffd000`305eac60 00000000`00000000 : ffffd000`305eb000 ffffd000`305e5000 00000000`00000000 00000000`00000000 : nt!kistartsystemthread+0x16
stack_command: kb
followup_ip:
nt!exquerydepthslist+0
fffff802`0563c1c0 8b01 mov eax,dword ptr [rcx]
symbol_stack_index: 9
symbol_name: nt!exquerydepthslist+0
followup_name: machineowner
module_name: nt
image_name: ntkrnlmp.exe
debug_flr_image_timestamp: 52718d9c
bucket_id_func_offset: 0
failure_bucket_id: 0x1e_c0000005_nt!exquerydepthslist
bucket_id: 0x1e_c0000005_nt!exquerydepthslist
any ideas? did search ixi63x64.sys , doesn't return much. thought ask before opening ms case. thanks.
possible kernel dump skydrive?
brad held http://windorks.wordpress.com
Windows Server > Windows Server 2012 Setup
Comments
Post a Comment