Hi and thanks again,
I appreciate the instructions -- I got it to work, but really still do not understand the whole l deal... Yes, it asked to reinstall the video drivers, but I did not let it. The system stayed up all day and rebuilt one of the raid drives. I installed the oldest, whql, x64 driver with 8800 support that I could find, 97.44. I found a couple user reviews that said it was solid. In anycase, the drivers installed and seem to work fine... but.. I tried to run World In Conflict and BAM, the BSODs started again.
Here's a debug from last night, I think this is the one that happened at that point
Microsoft (R) Windows Debugger Version 6.7.0005.1
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini100707-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.070321-2337
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Sun Oct 7 17:51:20.781 2007 (GMT-4)
System Uptime: 0 days 3:38:33.875
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Loading Kernel Symbols
..........................................................................................................
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff800014141d1, 2, 0, fffff8000104f236}
Probably caused by : tcpip.sys ( tcpip!ProcessSynTcbs+f0 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800014141d1, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000104f236, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: fffff800014141d1
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlVirtualUnwind+132
fffff800`0104f236 440fb603 movzx r8d,byte ptr [rbx]
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Idle
TRAP_FRAME: fffffadf910393b0 -- (.trap 0xfffffadf910393b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffadf9aa1a040 rbx=0000000000000000 rcx=ff00fadf9aa14950
rdx=0000000000010000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001024f90 rsp=fffffadf91039548 rbp=ff00fadf9aa14940
r8=0000000000004001 r9=0000000000000005 r10=0000000000000003
r11=fffffadf87c9f1b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KeAcquireSpinLockAtDpcLevel:
fffff800`01024f90 f0480fba2900 lock bts qword ptr [rcx],0 ds:ff00fadf`9aa14950=????????????????
Resetting default scope
EXCEPTION_RECORD: fffffadf91039320 -- (.exr 0xfffffadf91039320)
ExceptionAddress: fffff80001024f90 (nt!KeAcquireSpinLockAtDpcLevel)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
LAST_CONTROL_TRANSFER: from fffff8000102e5b4 to fffff8000102e890
STACK_TEXT:
fffffadf`910381d8 fffff800`0102e5b4 : 00000000`0000000a fffff800`014141d1 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffadf`910381e0 fffff800`0102d547 : 00000000`00000202 fffff800`01025817 fffffadf`9c244000 fffffadf`90334346 : nt!KiBugCheckDispatch+0x74
fffffadf`91038360 fffff800`0104f236 : 00000000`00000000 fffffadf`9c0d4000 fffffadf`00000056 fffffadf`91038638 : nt!KiPageFault+0x207
fffffadf`910384f0 fffff800`01054a97 : fffffadf`9c1a0660 fffffadf`91039db0 00000000`00000000 00000000`91038d30 : nt!RtlVirtualUnwind+0x132
fffffadf`91038570 fffff800`0100b901 : fffffadf`91039320 fffffadf`91038d30 fffffadf`91039320 fffffadf`91039430 : nt!RtlDispatchException+0x10b
fffffadf`91038c30 fffff800`0102e6af : fffffadf`91039320 fffffadf`9c0016b0 fffffadf`910393b0 00000000`00000000 : nt!KiDispatchException+0xd9
fffffadf`91039230 fffff800`0102d30d : 00000000`0001896a fffff800`0102f557 00000000`00000001 fffffadf`9c10d010 : nt!KiExceptionExit
fffffadf`910393b0 fffff800`01024f90 : fffffadf`87c05ec9 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0xcd
fffffadf`91039548 fffffadf`87c05ec9 : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`00000003 : nt!KeAcquireSpinLockAtDpcLevel
fffffadf`91039550 fffffadf`87c17916 : 00000000`000000a8 00000000`00000000 00000000`0001ffa7 00000000`00000003 : tcpip!ProcessSynTcbs+0xf0
fffffadf`910395e0 fffff800`010285a1 : 00000000`00000010 00000000`00000217 00000000`00000000 00000000`00000000 : tcpip!TCBTimeout+0x1ee2
fffffadf`91039d20 fffff800`01067c10 : fffffadf`90c8b180 fffffadf`90c8b180 00000000`00000000 fffffadf`90c93680 : nt!KiRetireDpcList+0x150
fffffadf`91039db0 fffff800`014141d1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x50
fffffadf`91039de0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1bf
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!ProcessSynTcbs+f0
fffffadf`87c05ec9 0fba63381f bt dword ptr [rbx+38h],1Fh
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: tcpip!ProcessSynTcbs+f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 45d699a3
FAILURE_BUCKET_ID: X64_0xA_tcpip!ProcessSynTcbs+f0
BUCKET_ID: X64_0xA_tcpip!ProcessSynTcbs+f0
Followup: MachineOwner
---------
Here's one AFTER that... it implicates iastor.sys...
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffadf9058e138, The address that the exception occurred at
Arg3: fffffadf91143a80, Exception Record Address
Arg4: fffffadf91143490, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
iaStor+29138
fffffadf`9058e138 498b4008 mov rax,qword ptr [r8+8]
EXCEPTION_RECORD: fffffadf91143a80 -- (.exr 0xfffffadf91143a80)
ExceptionAddress: fffffadf9058e138 (iaStor+0x0000000000029138)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffadf91143490 -- (.cxr 0xfffffadf91143490)
rax=fffffadf9b873340 rbx=fffffadf9b5d0000 rcx=fffffadf9ba93070
rdx=fffffadf9ba930f0 rsi=fffffadf9b60cb50 rdi=fffffadf9b86fa60
rip=fffffadf9058e138 rsp=fffffadf91143ca0 rbp=0000000000000080
r8=ffff00000000c800 r9=fffffadf90c8b180 r10=0000000000000000
r11=0000000000000000 r12=fffffadf9bd23c30 r13=0000000000000000
r14=fffffadf9ca8f040 r15=fffffadf90c8d600
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
iaStor+0x29138:
fffffadf`9058e138 498b4008 mov rax,qword ptr [r8+8] ds:002b:ffff0000`0000c808=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
READ_ADDRESS: ffffffffffffffff
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffffadf9058e138
STACK_TEXT:
fffffadf`91143ca0 00000000`00000000 : 00000000`00000000 fffffadf`9bd23c20 fffffadf`905a5278 fffffadf`9b86fa60 : iaStor+0x29138
fffffadf`91143ca8 00000000`00000000 : fffffadf`9bd23c20 fffffadf`905a5278 fffffadf`9b86fa60 fffffadf`9058dc1b : 0x0
fffffadf`91143cb0 fffffadf`9bd23c20 : fffffadf`905a5278 fffffadf`9b86fa60 fffffadf`9058dc1b fffffadf`9ba93070 : 0x0
fffffadf`91143cb8 fffffadf`905a5278 : fffffadf`9b86fa60 fffffadf`9058dc1b fffffadf`9ba93070 00000000`00000000 : 0xfffffadf`9bd23c20
fffffadf`91143cc0 fffffadf`9b86fa60 : fffffadf`9058dc1b fffffadf`9ba93070 00000000`00000000 fffffadf`9bd23c30 : iaStor+0x40278
fffffadf`91143cc8 fffffadf`9058dc1b : fffffadf`9ba93070 00000000`00000000 fffffadf`9bd23c30 fffffadf`9b0a58f0 : 0xfffffadf`9b86fa60
fffffadf`91143cd0 fffffadf`9ba93070 : 00000000`00000000 fffffadf`9bd23c30 fffffadf`9b0a58f0 fffffadf`9c4e0bf0 : iaStor+0x28c1b
fffffadf`91143cd8 00000000`00000000 : fffffadf`9bd23c30 fffffadf`9b0a58f0 fffffadf`9c4e0bf0 00000000`00000080 : 0xfffffadf`9ba93070
fffffadf`91143ce0 fffffadf`9bd23c30 : fffffadf`9b0a58f0 fffffadf`9c4e0bf0 00000000`00000080 fffffadf`9b0a58f0 : 0x0
fffffadf`91143ce8 fffffadf`9b0a58f0 : fffffadf`9c4e0bf0 00000000`00000080 fffffadf`9b0a58f0 fffffadf`9059346a : 0xfffffadf`9bd23c30
fffffadf`91143cf0 fffffadf`9c4e0bf0 : 00000000`00000080 fffffadf`9b0a58f0 fffffadf`9059346a fffffadf`9bd23c20 : 0xfffffadf`9b0a58f0
fffffadf`91143cf8 00000000`00000080 : fffffadf`9b0a58f0 fffffadf`9059346a fffffadf`9bd23c20 fffffadf`9c4e0bf0 : 0xfffffadf`9c4e0bf0
fffffadf`91143d00 fffffadf`9b0a58f0 : fffffadf`9059346a fffffadf`9bd23c20 fffffadf`9c4e0bf0 fffffadf`00000000 : 0x80
fffffadf`91143d08 fffffadf`9059346a : fffffadf`9bd23c20 fffffadf`9c4e0bf0 fffffadf`00000000 00000000`00000000 : 0xfffffadf`9b0a58f0
fffffadf`91143d10 fffffadf`9bd23c20 : fffffadf`9c4e0bf0 fffffadf`00000000 00000000`00000000 00000000`00000000 : iaStor+0x2e46a
fffffadf`91143d18 fffffadf`9c4e0bf0 : fffffadf`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffadf`9bd23c20
fffffadf`91143d20 fffffadf`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffadf`9c4e0bf0
fffffadf`91143d28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffadf`00000000
fffffadf`91143d30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffadf`9bd23c30 : 0x0
fffffadf`91143d38 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffadf`9bd23c30 fffffadf`9bd23c48 : 0x0
fffffadf`91143d40 00000000`00000000 : 00000000`00000000 fffffadf`9bd23c30 fffffadf`9bd23c48 00000000`00000000 : 0x0
fffffadf`91143d48 00000000`00000000 : fffffadf`9bd23c30 fffffadf`9bd23c48 00000000`00000000 fffff800`0124a972 : 0x0
fffffadf`91143d50 fffffadf`9bd23c30 : fffffadf`9bd23c48 00000000`00000000 fffff800`0124a972 fffffadf`9c4e0bf0 : 0x0
fffffadf`91143d58 fffffadf`9bd23c48 : 00000000`00000000 fffff800`0124a972 fffffadf`9c4e0bf0 00000000`00000080 : 0xfffffadf`9bd23c30
fffffadf`91143d60 00000000`00000000 : fffff800`0124a972 fffffadf`9c4e0bf0 00000000`00000080 fffffadf`9c4e0bf0 : 0xfffffadf`9bd23c48
fffffadf`91143d68 fffff800`0124a972 : fffffadf`9c4e0bf0 00000000`00000080 fffffadf`9c4e0bf0 fffffadf`90c93680 : 0x0
fffffadf`91143d70 fffff800`01020226 : fffffadf`90c8b180 fffffadf`9c4e0bf0 fffffadf`90c93680 00000000`00000000 : nt!PspSystemThreadStartup+0x3e
fffffadf`91143dd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
FOLLOWUP_IP:
iaStor+29138
fffffadf`9058e138 498b4008 mov rax,qword ptr [r8+8]
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4696b5c1
SYMBOL_NAME: iaStor+29138
STACK_COMMAND: .cxr 0xfffffadf91143490 ; kb
FAILURE_BUCKET_ID: X64_0x7E_iaStor+29138
BUCKET_ID: X64_0x7E_iaStor+29138
Followup: MachineOwner
---------