Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_BSOD%20with%20Kaspersky[1].zip\Windows_NT6_BSOD_jcgriff2\Mini021711-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16973.x86fre.vista_gdr.091208-0542
Machine Name:
Kernel base = 0x82400000 PsLoadedModuleList = 0x82511e10
Debug session time: Thu Feb 17 17:19:28.453 2011 (GMT-5)
System Uptime: 0 days 0:00:15.031
Loading Kernel Symbols
...............................................................
...................
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {18, 2, 0, 908c1651}
Unable to load image \SystemRoot\system32\DRIVERS\sis163u.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sis163u.sys
*** ERROR: Module load completed but symbols could not be loaded for sis163u.sys
Probably caused by : sis163u.sys ( sis163u+1651 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000018, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 908c1651, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 825315ac
Unable to read MiSystemVaType memory at 825117e0
00000018
CURRENT_IRQL: 2
FAULTING_IP:
sis163u+1651
908c1651 ?? ???
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 8c0a147c -- (.trap 0xffffffff8c0a147c)
ErrCode = 00000000
eax=88816878 ebx=87eae110 ecx=00000010 edx=8899700c esi=887e5a20 edi=874b3780
eip=908c1651 esp=8c0a14f0 ebp=8c0a1504 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
sis163u+0x1651:
908c1651 ?? ???
Resetting default scope
LOCK_ADDRESS: 8252e080 -- (!locks 8252e080)
Resource @ nt!PiEngineLock (0x8252e080) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0x8252e080
Thread Count : 0
Thread address: 0x00000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from 908c1651 to 8248fe14
STACK_TEXT:
8c0a147c 908c1651 badb0d00 8899700c 0008800a nt!KiTrap0E+0x2ac
WARNING: Stack unwind information not available. Following frames may be wrong.
8c0a14ec 887e5a20 887d6000 887e8650 00000010 sis163u+0x1651
8c0a1504 908c1c1a 007d6000 8899700c 007e5a20 0x887e5a20
8c0a154c 908c2485 887d6000 88a6e8f0 885c4000 sis163u+0x1c1a
8c0a1564 908e323e 887d6000 88822804 885c4000 sis163u+0x2485
8c0a157c 908e3aa9 885c4000 88822804 8c0a15a8 sis163u+0x2323e
8c0a158c 908d360a 885c4000 88822804 88a6e8f0 sis163u+0x23aa9
8c0a15a8 908e2621 885c4000 88822804 8c0a1600 sis163u+0x1360a
8c0a15d8 908e2774 88700408 88822804 000000ff sis163u+0x22621
8c0a1608 908dec0d 88700408 00000004 88700408 sis163u+0x22774
8c0a161c 908dd54b 88700408 000000ff 88700408 sis163u+0x1ec0d
8c0a1634 908dc207 88700408 00000011 00000000 sis163u+0x1d54b
8c0a1648 908dc146 88700408 00000011 00000000 sis163u+0x1c207
8c0a1660 908cdaee 88700408 00000000 877fd0e8 sis163u+0x1c146
8c0a1678 908c43bb 887d6000 8c0a1704 877f5010 sis163u+0xdaee
8c0a168c 908c0643 887d6000 877fdee0 8c0a1948 sis163u+0x43bb
8c0a169c 82dccb50 8c0a16d8 8c0a1738 82d318c0 sis163u+0x643
8c0a1948 82dd46aa 877f5010 877fd0e8 877fdee0 ndis!ndisMInitializeAdapter+0x5aa
8c0a1980 82dd4525 877f5010 877fd030 877f52d0 ndis!ndisInitializeAdapter+0x109
8c0a19a8 82dcfedc 877fd030 00000000 87401ee0 ndis!ndisPnPStartDevice+0xf3
8c0a19f8 82427f9f 877fd030 87401e28 8c0a1a74 ndis!ndisPnPDispatch+0x697
8c0a1a10 825b0809 00000000 8525ec90 87ea0110 nt!IofCallDriver+0x63
8c0a1a2c 8240797b 8c0a1a50 824077b5 87ea0110 nt!PnpAsynchronousCall+0x96
8c0a1a78 825b9731 824077b5 87ea0110 8525eb08 nt!PnpStartDevice+0xb7
8c0a1ad4 825b9094 87ea0110 0000000d 00000000 nt!PnpStartDeviceNode+0x13a
8c0a1af0 825b68a8 00000000 00000001 8252d2f0 nt!PipProcessStartPhase1+0x65
8c0a1cec 824072f5 852d6768 874bff18 8c0a1d38 nt!PipProcessDevNodeTree+0x18d
8c0a1d44 82478fc0 00000000 00000000 852cd580 nt!PnpDeviceActionWorker+0x21b
8c0a1d7c 82625544 00000000 8c0aa680 00000000 nt!ExpWorkerThread+0xfd
8c0a1dc0 8249162e 82478ec3 00000001 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
sis163u+1651
908c1651 ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: sis163u+1651
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sis163u
IMAGE_NAME: sis163u.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43682a32
FAILURE_BUCKET_ID: 0xD1_sis163u+1651
BUCKET_ID: 0xD1_sis163u+1651