C# .net application doing serial communication bug-check Window 2003.
Ø An application which is doing intensive serial communication may bug-check( blue Screen) a Windows 2003 Server even with latest update until this date 29 - March - 2010.
Ø This is potentially a issue in the speed.sys but yet have to confirm.
Ø As far as I know this issue is extremely rare only happens when you have very high load of serial communication.
Following is the analysis details.
3: kd> k100
ChildEBP RetAddr
b89a7a70 ba79d409 nt!KiTrap0E+0x2a7
WARNING: Stack unwind information not available. Following frames may be wrong.
b89a7b20 ba79d2b1 speed+0x2409
b89a7b38 ba79cb61 speed+0x22b1
b89a7bd8 ba79f4b6 speed+0x1b61
b89a7c04 f75785b7 speed+0x44b6
b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65
b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72
b89a7c50 8092b51f nt!IofCallDriver+0x45
b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b
b89a7d00 8092b574 nt!IopXxxControlFile+0x60f
b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a
b89a7d34 7c82860c nt!KiFastCallEntry+0xfc
03dbe8f8 00000000 0x7c82860c
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000c, memory referenced
Arg2: d0000005, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: ba79d409, address which referenced memory
Debugging Details:
------------------
Debugger CompCtrlDb Connection::Open failed 80004005
Debugger Dbgportaldb Connection::Open failed 80040e4d
Database Dbgportaldb not connected
READ_ADDRESS: 0000000c
CURRENT_IRQL: 5
FAULTING_IP:
speed+2409
ba79d409 8b480c mov ecx,dword ptr [eax+0Ch]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: HYC.TMS4.Securi
TRAP_FRAME: b89a7a70 -- (.trap ffffffffb89a7a70)
ErrCode = 00000000
eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354
eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
speed+0x2409:
ba79d409 8b480c mov ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from ba79d409 to 80836dfd
STACK_TEXT:
b89a7a70 ba79d409 badb0d00 00000000 f7737120 nt!KiTrap0E+0x2a7
WARNING: Stack unwind information not available. Following frames may be wrong.
b89a7b20 ba79d2b1 8830f0f8 86d03a60 8830f0f8 speed+0x2409
b89a7b38 ba79cb61 8830f0f8 86d03960 8830f33c speed+0x22b1
b89a7bd8 ba79f4b6 8830f040 86d03960 8830ebc8 speed+0x1b61
b89a7c04 f75785b7 8830ebc8 86d03960 86d03a60 speed+0x44b6
b89a7c18 f75787c6 8830eb10 00d03960 86d03960 serenum!Serenum_DispatchPassThrough+0x65
b89a7c3c 80840153 8830eb10 00000000 87f88c10 serenum!Serenum_IoCtl+0x72
b89a7c50 8092b51f 86d03a60 86491238 86d03960 nt!IofCallDriver+0x45
b89a7c64 8092b454 8830eb10 86d03960 86491238 nt!IopSynchronousServiceTail+0x10b
b89a7d00 8092b574 00000e1c 00000acc 00000000 nt!IopXxxControlFile+0x60f
b89a7d34 80833bef 00000e1c 00000acc 00000000 nt!NtDeviceIoControlFile+0x2a
b89a7d34 7c82860c 00000e1c 00000acc 00000000 nt!KiFastCallEntry+0xfc
03dbe8f8 00000000 00000000 00000000 00000000 0x7c82860c
STACK_COMMAND: kb
FOLLOWUP_IP:
speed+2409
ba79d409 8b480c mov ecx,dword ptr [eax+0Ch]
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: tomgreen
MODULE_NAME: speed
DEBUG_FLR_IMAGE_TIMESTAMP: 41388d6e
SYMBOL_NAME: speed+2409
IMAGE_NAME: speed.sys
FAILURE_BUCKET_ID: 0xD1_speed+2409
BUCKET_ID: 0xD1_speed+2409
Followup: tomgreen
---------
3: kd> .trap ffffffffb89a7a70
ErrCode = 00000000
eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354
eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
speed+0x2409:
ba79d409 8b480c mov ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????
3: kd> k100
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
b89a7b20 ba79d2b1 speed+0x2409
b89a7b38 ba79cb61 speed+0x22b1
b89a7bd8 ba79f4b6 speed+0x1b61
b89a7c04 f75785b7 speed+0x44b6
b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65
b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72
b89a7c50 8092b51f nt!IofCallDriver+0x45
b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b
b89a7d00 8092b574 nt!IopXxxControlFile+0x60f
b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a
b89a7d34 7c82860c nt!KiFastCallEntry+0xfc
03dbe8f8 00000000 0x7c82860c
I would have stopped my analysis with above logs and agreed with !analyze -v if the address trying to access had not been 0000000c because
nt!KeSynchronizeExecution
https://msdn.microsoft.com/en-us/library/ms801652.aspx
Will raised the IRQL to Device IRQL ( 5 here ) to Mask all the interrupt to IRQL such that the function speed!SerialFinishOldWait and ISR ( Interrupt service subroutine ) of that Device are not executed asynchronously. Because ISR as well as speed!SerialFinishOldWait most probably accessing the device registers ( reading and writing to it ). Also interrupt handle should probably be avoid when programming the device.
So the bottom line is when calling speed!SerialFinishOldWait Irql is 5 and no paging and scheduling is enabled. And we will get this bug check if that function try to access any paged locations in the system.
But I was not convinced by above points as the address which was trying to access was 0000000cdue to following reason.
Even if the IRQL was 0 which is passive or user mode it would have caused AV - ( which is page fault in kernel mode ). So I went via the following analysis.
3: kd> ub eip
speed+0x23e7:
ba79d3e7 8b8664020000 mov eax,dword ptr [esi+264h]
ba79d3ed 52 push edx
ba79d3ee c7401c04000000 mov dword ptr [eax+1Ch],4
ba79d3f5 52 push edx
ba79d3f6 8d86e8030000 lea eax,[esi+3E8h]
ba79d3fc 50 push eax
ba79d3fd ff15cc507aba call dword ptr [speed+0xa0cc (ba7a50cc)]
ba79d403 8b865c020000 mov eax,dword ptr [esi+25Ch]
3: kd> !address esi
82b7e000 - 07c82000
Usage KernelSpaceUsageNonPagedPool
3: kd> !pool esi
Pool page 8830f0f8 region is Nonpaged pool
*8830f000 size: 810 previous size: 0 (Allocated) *Devi (Protected)
Pooltag Devi : Device objects
8830f810 size: 8 previous size: 810 (Free) ....
8830f818 size: 40 previous size: 8 (Allocated) WmiR
8830f858 size: 128 previous size: 40 (Allocated) Dnod
8830f980 size: 128 previous size: 128 (Allocated) Dnod
8830faa8 size: 128 previous size: 128 (Allocated) Dnod
8830fbd0 size: 128 previous size: 128 (Allocated) Dnod
8830fcf8 size: 128 previous size: 128 (Allocated) Dnod
8830fe20 size: 78 previous size: 128 (Allocated) SPED
8830fe98 size: 78 previous size: 78 (Allocated) SPED
8830ff10 size: 78 previous size: 78 (Allocated) SPED
8830ff88 size: 78 previous size: 78 (Allocated) SPED
3: kd> dc 8830f000
8830f000 0b020000 e9766544 00000000 000000e8 ....Dev.........
8830f010 00000800 00000000 e1003268 00140014 ........h2......
8830f020 e168b388 00000001 00000006 00000000 ..h.............
8830f030 8a7f0ca0 1a200010 00000001 00000000 ...... .........
8830f040 07a00003 00000001 89db34d0 89cefd10 .........4......
8830f050 8830eb10 00000000 00000000 0000304c ..0.........L0..
8830f060 00000000 00000000 8830f0f8 0000001b ..........0.....
8830f070 00000004 00000000 00000000 00000000 ................
3: kd> !devobj 8830f040
Device object (8830f040) is for:
SPEEDPort0 \Driver\SPEED DriverObject 89db34d0
Current Irp 00000000 RefCount 1 Type 0000001b Flags 0000304c
Dacl e14e9be4 DevExt 8830f0f8 DevObjExt 8830f7e0 DevNode 8830fd00
ExtensionFlags (0000000000)
AttachedDevice (Upper) 8830eb10 \Driver\serenum
Device queue is not busy.
3: kd> r esi
Last set context:
esi=8830f0f8
0x8830f0f8 is our ESI and we are interested in offset 25C from
ba79d403 8b865c020000 mov eax,dword ptr [esi+25Ch]
To go further we need the symbols for speed.sys which is not available externally. Following is what I found from further analysis with internals symbols for speed.sys.I did a dt on the 8830f0f8 and found the field which is going zero. The field happen to be an associate IRP which is zero and the code is not checking if it is null while accessing it.
Now following points worth mentioning.
Ø This is not a IRQL issue.
Ø Although the IRQL is high null reference is the root cause.
Ø If the developer of speed.sys is checking this pointer and after that some other thread is modifying it this is a timing issue. But can be in "other thread"
Ø Otherwise the developer of speed.sys should check the pointer for null before accessing it.
To see the other driver loaded at the time of crash
3: kd> lm
start end module name
80800000 80a7e000 nt (pdb symbols) F:\SymbolsPub\ntkrnlmp.pdb\36D676FC59054878A16CD63CFEDCD9772\ntkrnlmp.pdb
80a7e000 80aaa000 hal (pdb symbols) F:\SymbolsPub\halmacpi.pdb\F799635F9A7C45BDBF439633754B99B61\halmacpi.pdb
b8c90000 b8cbb000 RDPWD (pdb symbols) F:\SymbolsPub\RDPWD.pdb\854B8010B0834D189776AF0F9667C6BE1\RDPWD.pdb
b952b000 b954c480 tmcomm (export symbols) tmcomm.sys
b981d000 b987b000 srv (pdb symbols) F:\SymbolsPub\srv.pdb\36A3BEB1677845B2A1285F64E20035A12\srv.pdb
b987b000 b9898000 mqac (pdb symbols) F:\SymbolsPub\mqac.pdb\006191D266F74EA69CCC9A3C35D32BD81\mqac.pdb
b99b0000 b9a00000 HTTP (pdb symbols) F:\SymbolsPub\http.pdb\BFE8AB596A714ECFBB54FC7075F4E5EB2\http.pdb
b9a98000 b9aa3000 TDTCP (pdb symbols) F:\SymbolsPub\tdtcp.pdb\874BED119EF947B598E9F42A5143A3111\tdtcp.pdb
b9c30000 b9c5f000 RMCAST (pdb symbols) F:\SymbolsPub\rmcast.pdb\63DB75FA0168412E962E1BDE6F7C91AC1\rmcast.pdb
b9d7f000 b9d88000 kbdhid (pdb symbols) F:\SymbolsPub\kbdhid.pdb\46D80290361D43ABA8DA734886E6A8E31\kbdhid.pdb
b9d8f000 b9d9d000 HIDCLASS (pdb symbols) F:\SymbolsPub\hidclass.pdb\90EE77DAAF034BD498E8699CA92F038E1\hidclass.pdb
b9d9f000 b9da8000 hidusb (pdb symbols) F:\SymbolsPub\hidusb.pdb\23FA99CBB6804C65AE51E94B1315C34B1\hidusb.pdb
b9e17000 b9e33000 dump_HpCISSs2 (no symbols)
b9e33000 b9e48000 Cdfs (pdb symbols) F:\SymbolsPub\cdfs.pdb\A452AB41FCA143C196ED15B34FFBC9802\cdfs.pdb
b9e48000 b9e59000 Fips (pdb symbols) F:\SymbolsPub\fips.pdb\03ABC31C2E494610B7D0BB23716AFD4F2\fips.pdb
b9e59000 b9ecf000 mrxsmb (pdb symbols) F:\SymbolsPub\mrxsmb.pdb\A3DFEE39DD064F5B8CA33222BF4AC0B52\mrxsmb.pdb
b9ef7000 b9f27000 rdbss (pdb symbols) F:\SymbolsPub\rdbss.pdb\FB1A2E64899146228FFC6BFECCE150742\rdbss.pdb
b9f97000 b9fa1000 Dxapi (pdb symbols) F:\SymbolsPub\dxapi.pdb\721396546D2043D2A9DDC6356312CA191\dxapi.pdb
b9fa7000 b9fb1000 dump_diskdump (pdb symbols) F:\SymbolsPub\diskdump.pdb\37F6801A2CB6409D8B08EC25EF4EB7F11\diskdump.pdb
b9fc7000 b9ff1000 afd (pdb symbols) F:\SymbolsPub\afd.pdb\58290F5DE8594177A0C88B7AD053A8C32\afd.pdb
b9ff1000 ba022000 netbt (pdb symbols) F:\SymbolsPub\netbt.pdb\455C06551A2147F5ADA64BFD6208F89B2\netbt.pdb
ba022000 ba0b6000 tcpip (pdb symbols) F:\SymbolsPub\tcpip.pdb\FC26191633F5414C99223CC9CD0AD4E32\tcpip.pdb
ba0b6000 ba0cf000 ipsec (pdb symbols) F:\SymbolsPub\ipsec.pdb\7EE640C522DD4088841B425FE48823532\ipsec.pdb
ba0ff000 ba106000 dxgthk (pdb symbols) F:\SymbolsPub\dxgthk.pdb\4FB4E43B8ABA4A548F650E2495D3BD201\dxgthk.pdb
ba1df000 ba1f4000 usbhub (pdb symbols) F:\SymbolsPub\usbhub.pdb\B3158E43948342539C03D8B84230FA921\usbhub.pdb
ba324000 ba383000 update (pdb symbols) F:\SymbolsPub\update.pdb\7251883337484E1E92D3F41D533749D52\update.pdb
ba3ab000 ba3e2000 rdpdr (pdb symbols) F:\SymbolsPub\rdpdr.pdb\848BC2B36384480CA59D94CD7CDFB0AF1\rdpdr.pdb
ba3e2000 ba438000 wlbs (pdb symbols) F:\SymbolsPub\wlbs.pdb\59077440992B41359712B962D79370CF2\wlbs.pdb
ba438000 ba44a000 raspptp (pdb symbols) F:\SymbolsPub\raspptp.pdb\4A592EBA851241449D43421574548C4E2\raspptp.pdb
ba44a000 ba463000 ndiswan (pdb symbols) F:\SymbolsPub\ndiswan.pdb\4160C938B1CE46B2BA662E25F575E66E2\ndiswan.pdb
ba463000 ba477000 rasl2tp (pdb symbols) F:\SymbolsPub\rasl2tp.pdb\48A300C372444C9397750F72BF6BC6152\rasl2tp.pdb
ba477000 ba4b0000 cpqteam (no symbols)
ba4b0000 ba4d7000 ks (pdb symbols) F:\SymbolsPub\ks.pdb\98407F7F5B8B47549ECDA3C47B16EB0B2\ks.pdb
ba4d7000 ba4eb000 redbook (pdb symbols) F:\SymbolsPub\redbook.pdb\458F1549775540A98F797ED48965388A1\redbook.pdb
ba4eb000 ba500000 cdrom (pdb symbols) F:\SymbolsPub\cdrom.pdb\6FB9D56F0A8247F1AB68A39F0EDC8FFE1\cdrom.pdb
ba500000 ba515000 serial (pdb symbols) F:\SymbolsPub\serial.pdb\2E4EDCACDC754270B075AA7FE795E6A21\serial.pdb
ba578000 ba585000 netbios (pdb symbols) F:\SymbolsPub\netbios.pdb\B833FF7890A84BF0BB7CF97E9459552C1\netbios.pdb
ba588000 ba595000 wanarp (pdb symbols) F:\SymbolsPub\wanarp.pdb\BD3EDDE433F742FC925ED70B71B78BC81\wanarp.pdb
ba598000 ba5a6000 msgpc (pdb symbols) F:\SymbolsPub\msgpc.pdb\14067A1904E94FE0B4A4B31B7FDD68021\msgpc.pdb
ba5a8000 ba5b5000 Npfs (pdb symbols) F:\SymbolsPub\npfs.pdb\0EB5780ED0A743A784EA2905F520FFBA1\npfs.pdb
ba5b8000 ba5c3000 Msfs (pdb symbols) F:\SymbolsPub\msfs.pdb\0A946EF7249C40FCBDA787C46FC201531\msfs.pdb
ba5c8000 ba5e3600 hpqilo2 (no symbols)
ba5e4000 ba600000 VIDEOPRT (pdb symbols) F:\SymbolsPub\videoprt.pdb\29B14447FED6419C834515565167DDDE1\videoprt.pdb
ba600000 ba75e000 ati2mtag (no symbols)
ba75e000 ba788000 USBPORT (pdb symbols) F:\SymbolsPub\usbport.pdb\8A87CD9FE4234E4DBABFF30842FD3E761\usbport.pdb
ba788000 ba79b000 bxnd52x (no symbols)
ba79b000 ba7ad800 speed (no symbols)
ba7ae000 ba7eb000 e1e5132 (no symbols)
bf800000 bf9d1000 win32k (pdb symbols) F:\SymbolsPub\win32k.pdb\73E7CBCC75964FAEB4D0AB689120F9EF2\win32k.pdb
bf9d1000 bf9e8000 dxg (pdb symbols) F:\SymbolsPub\dxg.pdb\8A5D0F9CC1F34C4F8D567056B62A271B1\dxg.pdb
bf9e8000 bfa28000 ati2dvag (no symbols)
bfa28000 bfa62000 ati2cqag (export symbols) ati2cqag.dll
bfa62000 bfa98000 atikvmag (export symbols) atikvmag.dll
bffa0000 bffea000 ATMFD T (no symbols)
f7109000 f7128000 Mup (pdb symbols) F:\SymbolsPub\mup.pdb\D1EB3084BA214384B224969400033F2B2\mup.pdb
f7128000 f7167000 NDIS (pdb symbols) F:\SymbolsPub\ndis.pdb\A14D4209157649C29C2B53ACB7C24C122\ndis.pdb
f7167000 f71fc000 Ntfs (pdb symbols) F:\SymbolsPub\ntfs.pdb\DF8CD23355324E71824D94ED509B922B2\ntfs.pdb
f71fc000 f726e000 bxvbdx (no symbols)
f726e000 f7294000 KSecDD (pdb symbols) F:\SymbolsPub\ksecdd.pdb\97DD9A8843E144AF82946CEA0D39912D1\ksecdd.pdb
f7294000 f72b9000 fltmgr (pdb symbols) F:\SymbolsPub\fltMgr.pdb\89680A31E23A42F8B81765B0CCF6AC7B1\fltMgr.pdb
f72b9000 f72cc000 CLASSPNP (pdb symbols) F:\SymbolsPub\classpnp.pdb\7A500B223916422893BA4BE476B22FE82\classpnp.pdb
f72cc000 f72ea000 storport (pdb symbols) F:\SymbolsPub\storport.pdb\C52B0EA7F7574A9AB0D5961C3E61C5021\storport.pdb
f72ea000 f7306000 HpCISSs2 (no symbols)
f7306000 f7323000 atapi (pdb symbols) F:\SymbolsPub\atapi.pdb\D28555240C3F4860B53C1CB1F6FB6BE01\atapi.pdb
f7323000 f734d000 volsnap (pdb symbols) F:\SymbolsPub\volsnap.pdb\7DF5DBDD4B744321952CA20C41C092421\volsnap.pdb
f734d000 f7379000 dmio (pdb symbols) F:\SymbolsPub\dmio.pdb\FD474E74B14F40AEB147FB0399D67BDB1\dmio.pdb
f7379000 f73a0000 ftdisk (pdb symbols) F:\SymbolsPub\ftdisk.pdb\A35F2DA3D87F4FEBAD01015FB3D84FCE1\ftdisk.pdb
f73a0000 f741c000 Wdf01000 (pdb symbols) F:\SymbolsPub\Wdf01000.pdb\0E5C347DFB5A4B1DB1606D336048C5D11\Wdf01000.pdb
f741c000 f7432000 pci (pdb symbols) F:\SymbolsPub\pci.pdb\19C18EEF2357412DA2D507D00DFDBD021\pci.pdb
f7432000 f7466000 ACPI (pdb symbols) F:\SymbolsPub\acpi.pdb\FBB7E7F76E2D4337B34F0D037397A1F91\acpi.pdb
f7487000 f7490000 WMILIB (pdb symbols) F:\SymbolsPub\wmilib.pdb\12857EA639DF4B4886C59A41723B52101\wmilib.pdb
f7497000 f74a6000 isapnp (pdb symbols) F:\SymbolsPub\isapnp.pdb\126F8C9AD41142309A3D9E6E109719CC1\isapnp.pdb
f74a7000 f74b4000 WDFLDR (pdb symbols) F:\SymbolsPub\wdfldr.pdb\43C2BA1CD34C49D6BA4C5DDF7582AFDE1\wdfldr.pdb
f74b7000 f74c4000 PCIIDEX (pdb symbols) F:\SymbolsPub\pciidex.pdb\70C5240A95584B429B1003B33A658A411\pciidex.pdb
f74c7000 f74d7000 MountMgr (pdb symbols) F:\SymbolsPub\mountmgr.pdb\5C581012D23247898DCE1121BB49C9591\mountmgr.pdb
f74d7000 f74e2000 PartMgr (pdb symbols) F:\SymbolsPub\partmgr.pdb\553D05ACC6B74F7A96205455C0FDC0612\partmgr.pdb
f74e7000 f74f7000 disk (pdb symbols) F:\SymbolsPub\disk.pdb\3DA44D56F4CF49678E6E538BEA9F55311\disk.pdb
f74f7000 f7503000 Dfs (pdb symbols) F:\SymbolsPub\dfs.pdb\E9ECFFE65B694263B16AF5284A76B7781\dfs.pdb
f7507000 f7511000 crcdisk (pdb symbols) F:\SymbolsPub\crcdisk.pdb\ECA72D45092A44938120B985ED028F501\crcdisk.pdb
f7547000 f7551000 mouclass (pdb symbols) F:\SymbolsPub\mouclass.pdb\4B24438EF11E4AA9BAAB1B922FF2BC121\mouclass.pdb
f7557000 f7566000 intelppm (pdb symbols) F:\SymbolsPub\intelppm.pdb\1D52238AE4AE49FCBD2A8EAC319ACED61\intelppm.pdb
f7567000 f7575000 NDProxy (pdb symbols) F:\SymbolsPub\ndproxy.pdb\77302E5EAF7A49A4B9F73812034D64C71\ndproxy.pdb
f7577000 f7581000 serenum (pdb symbols) F:\SymbolsPub\SerEnum.pdb\FE31D81794834D0E849795D9DEBA10301\SerEnum.pdb
f7587000 f7590000 raspti (pdb symbols) F:\SymbolsPub\raspti.pdb\C8CA04E9714C4C28B72736651219753C1\raspti.pdb
f7597000 f75a2000 ptilink (pdb symbols) F:\SymbolsPub\ptilink.pdb\8C99481FF12B4CE0A314836D0BFDFF541\ptilink.pdb
f75a7000 f75b6000 termdd (pdb symbols) F:\SymbolsPub\termdd.pdb\AD7D318B739B4975A1413478D74ADD2F1\termdd.pdb
f75b7000 f75c2000 TDI (pdb symbols) F:\SymbolsPub\tdi.pdb\0A6B164853FB4C3CA35A39F06BCF263B1\tdi.pdb
f7607000 f7612000 kbdclass (pdb symbols) F:\SymbolsPub\kbdclass.pdb\D89740D4F8B24AC994B9F73E7D52BA2A1\kbdclass.pdb
f7617000 f7623000 vga (pdb symbols) F:\SymbolsPub\vga.pdb\AE1F18524D5A4C4091E78CD12096C26B1\vga.pdb
f7637000 f7640000 mssmbios (pdb symbols) F:\SymbolsPub\mssmbios.pdb\DD4D360AB16648F8B4985A9734CFA0201\mssmbios.pdb
f7647000 f7650000 ndistapi (pdb symbols) F:\SymbolsPub\ndistapi.pdb\6AA8C8C3CC6F44AA95D41F674C66DAE31\ndistapi.pdb
f7667000 f7670000 watchdog (pdb symbols) F:\SymbolsPub\watchdog.pdb\7C54E285D9D847918F46360629BD10E11\watchdog.pdb
f76a7000 f76b2000 cpqcidrv (no symbols)
f76b7000 f76c6000 raspppoe (pdb symbols) F:\SymbolsPub\raspppoe.pdb\0D3511AF68AE4E3EAB560AAB7A5C3B841\raspppoe.pdb
f7707000 f770f000 kdcom (pdb symbols) F:\SymbolsPub\kdcom.pdb\D2DF9C86F6194ED680A7DD270076F7281\kdcom.pdb
f770f000 f7717000 BOOTVID (pdb symbols) F:\SymbolsPub\bootvid.pdb\8D00A98A20CF4EE0B3609CB593AD6B2B1\bootvid.pdb
f7717000 f771e000 pciide (pdb symbols) F:\SymbolsPub\pciide.pdb\432C26B572F0435A9570629D6D2DFC6A1\pciide.pdb
f771f000 f7726000 dmload (pdb symbols) F:\SymbolsPub\dmload.pdb\CF29F13A227D435D9215BD7E0064AAE21\dmload.pdb
f773f000 f7745300 HIDPARSE (pdb symbols) F:\SymbolsPub\hidparse.pdb\168DA5EBED074018AE53EFEAA44C5D131\hidparse.pdb
f775f000 f7767000 mnmdd (pdb symbols) F:\SymbolsPub\mnmdd.pdb\6E7B24987F6544B395CE03910BA9B1331\mnmdd.pdb
f7767000 f776f000 RDPCDD (pdb symbols) F:\SymbolsPub\RDPCDD.pdb\EE64C3AA62364E13BD4A32C8A16F8C201\RDPCDD.pdb
f776f000 f7777000 rasacd (pdb symbols) F:\SymbolsPub\rasacd.pdb\1B61FBD6F931427DBF2E82BA4D54E9471\rasacd.pdb
f77cf000 f77d6d80 usbccgp (pdb symbols) F:\SymbolsPub\usbccgp.pdb\91512AFAB385436892FEBAEBC8D73E161\usbccgp.pdb
f77df000 f77e4180 usbuhci (pdb symbols) F:\SymbolsPub\usbuhci.pdb\CA0AA1F5D3404F99BA02B344556720E61\usbuhci.pdb
f77e7000 f77edb80 usbehci (pdb symbols) F:\SymbolsPub\usbehci.pdb\02CCADF14C474631AF8FC8DDD63116331\usbehci.pdb
f77ef000 f77f7000 audstub (pdb symbols) F:\SymbolsPub\audstub.pdb\92AF0464295942BFAE368894C109C5331\audstub.pdb
f7807000 f780f000 mouhid (pdb symbols) F:\SymbolsPub\mouhid.pdb\F24F259F8DA548778D3EBD9BF17C2F711\mouhid.pdb
f780f000 f7817000 Fs_Rec (pdb symbols) F:\SymbolsPub\fs_rec.pdb\1190586148B845039CC8B5AA797BFB141\fs_rec.pdb
f7817000 f781e000 Null (pdb symbols) F:\SymbolsPub\null.pdb\ADB22E796C7C4B8AAAB67D2320C1A0321\null.pdb
f781f000 f7826000 Beep (pdb symbols) F:\SymbolsPub\beep.pdb\414379B62B904661988B3E7E7707F8C41\beep.pdb
f79a3000 f79a4280 swenum (pdb symbols) F:\SymbolsPub\swenum.pdb\43D2DC836ED549DDA233FF0D539B5F071\swenum.pdb
f79a5000 f79a6580 USBD (pdb symbols) F:\SymbolsPub\usbd.pdb\9F47B9915C294DDF913B6BB2EB77A80E1\usbd.pdb
Unloaded modules:
ba548000 ba556000 HIDCLASS.SYS
ba558000 ba561000 hidusb.sys
f7777000 f777f000 usbccgp.sys
ba538000 ba541000 kbdhid.sys
f777f000 f7787000 mouhid.sys
ba515000 ba528000 i8042prt.sys
ba568000 ba576000 imapi.sys
f75d7000 f75e0000 kbdhid.sys
f7807000 f780f000 Sfloppy.SYS
f7697000 f76a1000 Flpydisk.SYS