C# .net application doing serial communication bug-check Window 2003.

Ø An application which is doing intensive serial communication may bug-check( blue Screen) a Windows 2003 Server even with latest update until this date 29 - March - 2010.

Ø This is potentially a issue in the speed.sys but yet have to confirm.

Ø As far as I know this issue is extremely rare only happens when you have very high load of serial communication.

 

Following is the analysis details.

 

3: kd> k100

ChildEBP RetAddr

b89a7a70 ba79d409 nt!KiTrap0E+0x2a7

WARNING: Stack unwind information not available. Following frames may be wrong.

b89a7b20 ba79d2b1 speed+0x2409

b89a7b38 ba79cb61 speed+0x22b1

b89a7bd8 ba79f4b6 speed+0x1b61

b89a7c04 f75785b7 speed+0x44b6

b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65

b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72

b89a7c50 8092b51f nt!IofCallDriver+0x45

b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b

b89a7d00 8092b574 nt!IopXxxControlFile+0x60f

b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a

b89a7d34 7c82860c nt!KiFastCallEntry+0xfc

03dbe8f8 00000000 0x7c82860c

3: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If kernel debugger is available get stack backtrace.

Arguments:

Arg1: 0000000c, memory referenced

Arg2: d0000005, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: ba79d409, address which referenced memory

Debugging Details:

------------------

Debugger CompCtrlDb Connection::Open failed 80004005

Debugger Dbgportaldb Connection::Open failed 80040e4d

Database Dbgportaldb not connected

READ_ADDRESS: 0000000c

CURRENT_IRQL: 5

FAULTING_IP:

speed+2409

ba79d409 8b480c mov ecx,dword ptr [eax+0Ch]

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: HYC.TMS4.Securi

TRAP_FRAME: b89a7a70 -- (.trap ffffffffb89a7a70)

ErrCode = 00000000

eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354

eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0 nv up ei pl nz na po nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202

speed+0x2409:

ba79d409 8b480c mov ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????

Resetting default scope

LAST_CONTROL_TRANSFER: from ba79d409 to 80836dfd

STACK_TEXT:

b89a7a70 ba79d409 badb0d00 00000000 f7737120 nt!KiTrap0E+0x2a7

WARNING: Stack unwind information not available. Following frames may be wrong.

b89a7b20 ba79d2b1 8830f0f8 86d03a60 8830f0f8 speed+0x2409

b89a7b38 ba79cb61 8830f0f8 86d03960 8830f33c speed+0x22b1

b89a7bd8 ba79f4b6 8830f040 86d03960 8830ebc8 speed+0x1b61

b89a7c04 f75785b7 8830ebc8 86d03960 86d03a60 speed+0x44b6

b89a7c18 f75787c6 8830eb10 00d03960 86d03960 serenum!Serenum_DispatchPassThrough+0x65

b89a7c3c 80840153 8830eb10 00000000 87f88c10 serenum!Serenum_IoCtl+0x72

b89a7c50 8092b51f 86d03a60 86491238 86d03960 nt!IofCallDriver+0x45

b89a7c64 8092b454 8830eb10 86d03960 86491238 nt!IopSynchronousServiceTail+0x10b

b89a7d00 8092b574 00000e1c 00000acc 00000000 nt!IopXxxControlFile+0x60f

b89a7d34 80833bef 00000e1c 00000acc 00000000 nt!NtDeviceIoControlFile+0x2a

b89a7d34 7c82860c 00000e1c 00000acc 00000000 nt!KiFastCallEntry+0xfc

03dbe8f8 00000000 00000000 00000000 00000000 0x7c82860c

STACK_COMMAND: kb

FOLLOWUP_IP:

speed+2409

ba79d409 8b480c mov ecx,dword ptr [eax+0Ch]

SYMBOL_STACK_INDEX: 1

FOLLOWUP_NAME: tomgreen

MODULE_NAME: speed

DEBUG_FLR_IMAGE_TIMESTAMP: 41388d6e

SYMBOL_NAME: speed+2409

IMAGE_NAME: speed.sys

FAILURE_BUCKET_ID: 0xD1_speed+2409

BUCKET_ID: 0xD1_speed+2409

Followup: tomgreen

---------

3: kd> .trap ffffffffb89a7a70

ErrCode = 00000000

eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354

eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0 nv up ei pl nz na po nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202

speed+0x2409:

ba79d409 8b480c mov ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????

3: kd> k100

ChildEBP RetAddr

WARNING: Stack unwind information not available. Following frames may be wrong.

b89a7b20 ba79d2b1 speed+0x2409

b89a7b38 ba79cb61 speed+0x22b1

b89a7bd8 ba79f4b6 speed+0x1b61

b89a7c04 f75785b7 speed+0x44b6

b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65

b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72

b89a7c50 8092b51f nt!IofCallDriver+0x45

b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b

b89a7d00 8092b574 nt!IopXxxControlFile+0x60f

b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a

b89a7d34 7c82860c nt!KiFastCallEntry+0xfc

03dbe8f8 00000000 0x7c82860c

I would have stopped my analysis with above logs and agreed with !analyze -v if the address trying to access had not been 0000000c because

nt!KeSynchronizeExecution

https://msdn.microsoft.com/en-us/library/ms801652.aspx

Will raised the IRQL to Device IRQL ( 5 here ) to Mask all the interrupt to IRQL such that the function speed!SerialFinishOldWait and ISR ( Interrupt service subroutine ) of that Device are not executed asynchronously. Because ISR as well as speed!SerialFinishOldWait most probably accessing the device registers ( reading and writing to it ). Also interrupt handle should probably be avoid when programming the device.

So the bottom line is when calling speed!SerialFinishOldWait Irql is 5 and no paging and scheduling is enabled. And we will get this bug check if that function try to access any paged locations in the system.

But I was not convinced by above points as the address which was trying to access was 0000000cdue to following reason.

Even if the IRQL was 0 which is passive or user mode it would have caused AV - ( which is page fault in kernel mode ). So I went via the following analysis.

3: kd> ub eip

speed+0x23e7:

ba79d3e7 8b8664020000 mov eax,dword ptr [esi+264h]

ba79d3ed 52 push edx

ba79d3ee c7401c04000000 mov dword ptr [eax+1Ch],4

ba79d3f5 52 push edx

ba79d3f6 8d86e8030000 lea eax,[esi+3E8h]

ba79d3fc 50 push eax

ba79d3fd ff15cc507aba call dword ptr [speed+0xa0cc (ba7a50cc)]

ba79d403 8b865c020000 mov eax,dword ptr [esi+25Ch]

3: kd> !address esi

  82b7e000 - 07c82000

          Usage KernelSpaceUsageNonPagedPool

3: kd> !pool esi

Pool page 8830f0f8 region is Nonpaged pool

*8830f000 size: 810 previous size: 0 (Allocated) *Devi (Protected)

              Pooltag Devi : Device objects

 8830f810 size: 8 previous size: 810 (Free) ....

 8830f818 size: 40 previous size: 8 (Allocated) WmiR

 8830f858 size: 128 previous size: 40 (Allocated) Dnod

 8830f980 size: 128 previous size: 128 (Allocated) Dnod

 8830faa8 size: 128 previous size: 128 (Allocated) Dnod

 8830fbd0 size: 128 previous size: 128 (Allocated) Dnod

 8830fcf8 size: 128 previous size: 128 (Allocated) Dnod

 8830fe20 size: 78 previous size: 128 (Allocated) SPED

 8830fe98 size: 78 previous size: 78 (Allocated) SPED

 8830ff10 size: 78 previous size: 78 (Allocated) SPED

 8830ff88 size: 78 previous size: 78 (Allocated) SPED

3: kd> dc 8830f000

8830f000 0b020000 e9766544 00000000 000000e8 ....Dev.........

8830f010 00000800 00000000 e1003268 00140014 ........h2......

8830f020 e168b388 00000001 00000006 00000000 ..h.............

8830f030 8a7f0ca0 1a200010 00000001 00000000 ...... .........

8830f040 07a00003 00000001 89db34d0 89cefd10 .........4......

8830f050 8830eb10 00000000 00000000 0000304c ..0.........L0..

8830f060 00000000 00000000 8830f0f8 0000001b ..........0.....

8830f070 00000004 00000000 00000000 00000000 ................

3: kd> !devobj 8830f040

Device object (8830f040) is for:

 SPEEDPort0 \Driver\SPEED DriverObject 89db34d0

Current Irp 00000000 RefCount 1 Type 0000001b Flags 0000304c

Dacl e14e9be4 DevExt 8830f0f8 DevObjExt 8830f7e0 DevNode 8830fd00

ExtensionFlags (0000000000)

AttachedDevice (Upper) 8830eb10 \Driver\serenum

Device queue is not busy.

3: kd> r esi

Last set context:

esi=8830f0f8

0x8830f0f8 is our ESI and we are interested in offset 25C from

ba79d403 8b865c020000 mov eax,dword ptr [esi+25Ch]

To go further we need the symbols for speed.sys which is not available externally. Following is what I found from further analysis with internals symbols for speed.sys.I did a dt on the 8830f0f8 and found the field which is going zero. The field happen to be an associate IRP which is zero and the code is not checking if it is null while accessing it.

Now following points worth mentioning.

Ø This is not a IRQL issue.

Ø Although the IRQL is high null reference is the root cause.

Ø If the developer of speed.sys is checking this pointer and after that some other thread is modifying it this is a timing issue. But can be in "other thread"

Ø Otherwise the developer of speed.sys should check the pointer for null before accessing it.

To see the other driver loaded at the time of crash

3: kd> lm

start end module name

80800000 80a7e000 nt (pdb symbols) F:\SymbolsPub\ntkrnlmp.pdb\36D676FC59054878A16CD63CFEDCD9772\ntkrnlmp.pdb

80a7e000 80aaa000 hal (pdb symbols) F:\SymbolsPub\halmacpi.pdb\F799635F9A7C45BDBF439633754B99B61\halmacpi.pdb

b8c90000 b8cbb000 RDPWD (pdb symbols) F:\SymbolsPub\RDPWD.pdb\854B8010B0834D189776AF0F9667C6BE1\RDPWD.pdb

b952b000 b954c480 tmcomm (export symbols) tmcomm.sys

b981d000 b987b000 srv (pdb symbols) F:\SymbolsPub\srv.pdb\36A3BEB1677845B2A1285F64E20035A12\srv.pdb

b987b000 b9898000 mqac (pdb symbols) F:\SymbolsPub\mqac.pdb\006191D266F74EA69CCC9A3C35D32BD81\mqac.pdb

b99b0000 b9a00000 HTTP (pdb symbols) F:\SymbolsPub\http.pdb\BFE8AB596A714ECFBB54FC7075F4E5EB2\http.pdb

b9a98000 b9aa3000 TDTCP (pdb symbols) F:\SymbolsPub\tdtcp.pdb\874BED119EF947B598E9F42A5143A3111\tdtcp.pdb

b9c30000 b9c5f000 RMCAST (pdb symbols) F:\SymbolsPub\rmcast.pdb\63DB75FA0168412E962E1BDE6F7C91AC1\rmcast.pdb

b9d7f000 b9d88000 kbdhid (pdb symbols) F:\SymbolsPub\kbdhid.pdb\46D80290361D43ABA8DA734886E6A8E31\kbdhid.pdb

b9d8f000 b9d9d000 HIDCLASS (pdb symbols) F:\SymbolsPub\hidclass.pdb\90EE77DAAF034BD498E8699CA92F038E1\hidclass.pdb

b9d9f000 b9da8000 hidusb (pdb symbols) F:\SymbolsPub\hidusb.pdb\23FA99CBB6804C65AE51E94B1315C34B1\hidusb.pdb

b9e17000 b9e33000 dump_HpCISSs2 (no symbols)

b9e33000 b9e48000 Cdfs (pdb symbols) F:\SymbolsPub\cdfs.pdb\A452AB41FCA143C196ED15B34FFBC9802\cdfs.pdb

b9e48000 b9e59000 Fips (pdb symbols) F:\SymbolsPub\fips.pdb\03ABC31C2E494610B7D0BB23716AFD4F2\fips.pdb

b9e59000 b9ecf000 mrxsmb (pdb symbols) F:\SymbolsPub\mrxsmb.pdb\A3DFEE39DD064F5B8CA33222BF4AC0B52\mrxsmb.pdb

b9ef7000 b9f27000 rdbss (pdb symbols) F:\SymbolsPub\rdbss.pdb\FB1A2E64899146228FFC6BFECCE150742\rdbss.pdb

b9f97000 b9fa1000 Dxapi (pdb symbols) F:\SymbolsPub\dxapi.pdb\721396546D2043D2A9DDC6356312CA191\dxapi.pdb

b9fa7000 b9fb1000 dump_diskdump (pdb symbols) F:\SymbolsPub\diskdump.pdb\37F6801A2CB6409D8B08EC25EF4EB7F11\diskdump.pdb

b9fc7000 b9ff1000 afd (pdb symbols) F:\SymbolsPub\afd.pdb\58290F5DE8594177A0C88B7AD053A8C32\afd.pdb

b9ff1000 ba022000 netbt (pdb symbols) F:\SymbolsPub\netbt.pdb\455C06551A2147F5ADA64BFD6208F89B2\netbt.pdb

ba022000 ba0b6000 tcpip (pdb symbols) F:\SymbolsPub\tcpip.pdb\FC26191633F5414C99223CC9CD0AD4E32\tcpip.pdb

ba0b6000 ba0cf000 ipsec (pdb symbols) F:\SymbolsPub\ipsec.pdb\7EE640C522DD4088841B425FE48823532\ipsec.pdb

ba0ff000 ba106000 dxgthk (pdb symbols) F:\SymbolsPub\dxgthk.pdb\4FB4E43B8ABA4A548F650E2495D3BD201\dxgthk.pdb

ba1df000 ba1f4000 usbhub (pdb symbols) F:\SymbolsPub\usbhub.pdb\B3158E43948342539C03D8B84230FA921\usbhub.pdb

ba324000 ba383000 update (pdb symbols) F:\SymbolsPub\update.pdb\7251883337484E1E92D3F41D533749D52\update.pdb

ba3ab000 ba3e2000 rdpdr (pdb symbols) F:\SymbolsPub\rdpdr.pdb\848BC2B36384480CA59D94CD7CDFB0AF1\rdpdr.pdb

ba3e2000 ba438000 wlbs (pdb symbols) F:\SymbolsPub\wlbs.pdb\59077440992B41359712B962D79370CF2\wlbs.pdb

ba438000 ba44a000 raspptp (pdb symbols) F:\SymbolsPub\raspptp.pdb\4A592EBA851241449D43421574548C4E2\raspptp.pdb

ba44a000 ba463000 ndiswan (pdb symbols) F:\SymbolsPub\ndiswan.pdb\4160C938B1CE46B2BA662E25F575E66E2\ndiswan.pdb

ba463000 ba477000 rasl2tp (pdb symbols) F:\SymbolsPub\rasl2tp.pdb\48A300C372444C9397750F72BF6BC6152\rasl2tp.pdb

ba477000 ba4b0000 cpqteam (no symbols)

ba4b0000 ba4d7000 ks (pdb symbols) F:\SymbolsPub\ks.pdb\98407F7F5B8B47549ECDA3C47B16EB0B2\ks.pdb

ba4d7000 ba4eb000 redbook (pdb symbols) F:\SymbolsPub\redbook.pdb\458F1549775540A98F797ED48965388A1\redbook.pdb

ba4eb000 ba500000 cdrom (pdb symbols) F:\SymbolsPub\cdrom.pdb\6FB9D56F0A8247F1AB68A39F0EDC8FFE1\cdrom.pdb

ba500000 ba515000 serial (pdb symbols) F:\SymbolsPub\serial.pdb\2E4EDCACDC754270B075AA7FE795E6A21\serial.pdb

ba578000 ba585000 netbios (pdb symbols) F:\SymbolsPub\netbios.pdb\B833FF7890A84BF0BB7CF97E9459552C1\netbios.pdb

ba588000 ba595000 wanarp (pdb symbols) F:\SymbolsPub\wanarp.pdb\BD3EDDE433F742FC925ED70B71B78BC81\wanarp.pdb

ba598000 ba5a6000 msgpc (pdb symbols) F:\SymbolsPub\msgpc.pdb\14067A1904E94FE0B4A4B31B7FDD68021\msgpc.pdb

ba5a8000 ba5b5000 Npfs (pdb symbols) F:\SymbolsPub\npfs.pdb\0EB5780ED0A743A784EA2905F520FFBA1\npfs.pdb

ba5b8000 ba5c3000 Msfs (pdb symbols) F:\SymbolsPub\msfs.pdb\0A946EF7249C40FCBDA787C46FC201531\msfs.pdb

ba5c8000 ba5e3600 hpqilo2 (no symbols)

ba5e4000 ba600000 VIDEOPRT (pdb symbols) F:\SymbolsPub\videoprt.pdb\29B14447FED6419C834515565167DDDE1\videoprt.pdb

ba600000 ba75e000 ati2mtag (no symbols)

ba75e000 ba788000 USBPORT (pdb symbols) F:\SymbolsPub\usbport.pdb\8A87CD9FE4234E4DBABFF30842FD3E761\usbport.pdb

ba788000 ba79b000 bxnd52x (no symbols)

ba79b000 ba7ad800 speed (no symbols)

ba7ae000 ba7eb000 e1e5132 (no symbols)

bf800000 bf9d1000 win32k (pdb symbols) F:\SymbolsPub\win32k.pdb\73E7CBCC75964FAEB4D0AB689120F9EF2\win32k.pdb

bf9d1000 bf9e8000 dxg (pdb symbols) F:\SymbolsPub\dxg.pdb\8A5D0F9CC1F34C4F8D567056B62A271B1\dxg.pdb

bf9e8000 bfa28000 ati2dvag (no symbols)

bfa28000 bfa62000 ati2cqag (export symbols) ati2cqag.dll

bfa62000 bfa98000 atikvmag (export symbols) atikvmag.dll

bffa0000 bffea000 ATMFD T (no symbols)

f7109000 f7128000 Mup (pdb symbols) F:\SymbolsPub\mup.pdb\D1EB3084BA214384B224969400033F2B2\mup.pdb

f7128000 f7167000 NDIS (pdb symbols) F:\SymbolsPub\ndis.pdb\A14D4209157649C29C2B53ACB7C24C122\ndis.pdb

f7167000 f71fc000 Ntfs (pdb symbols) F:\SymbolsPub\ntfs.pdb\DF8CD23355324E71824D94ED509B922B2\ntfs.pdb

f71fc000 f726e000 bxvbdx (no symbols)

f726e000 f7294000 KSecDD (pdb symbols) F:\SymbolsPub\ksecdd.pdb\97DD9A8843E144AF82946CEA0D39912D1\ksecdd.pdb

f7294000 f72b9000 fltmgr (pdb symbols) F:\SymbolsPub\fltMgr.pdb\89680A31E23A42F8B81765B0CCF6AC7B1\fltMgr.pdb

f72b9000 f72cc000 CLASSPNP (pdb symbols) F:\SymbolsPub\classpnp.pdb\7A500B223916422893BA4BE476B22FE82\classpnp.pdb

f72cc000 f72ea000 storport (pdb symbols) F:\SymbolsPub\storport.pdb\C52B0EA7F7574A9AB0D5961C3E61C5021\storport.pdb

f72ea000 f7306000 HpCISSs2 (no symbols)

f7306000 f7323000 atapi (pdb symbols) F:\SymbolsPub\atapi.pdb\D28555240C3F4860B53C1CB1F6FB6BE01\atapi.pdb

f7323000 f734d000 volsnap (pdb symbols) F:\SymbolsPub\volsnap.pdb\7DF5DBDD4B744321952CA20C41C092421\volsnap.pdb

f734d000 f7379000 dmio (pdb symbols) F:\SymbolsPub\dmio.pdb\FD474E74B14F40AEB147FB0399D67BDB1\dmio.pdb

f7379000 f73a0000 ftdisk (pdb symbols) F:\SymbolsPub\ftdisk.pdb\A35F2DA3D87F4FEBAD01015FB3D84FCE1\ftdisk.pdb

f73a0000 f741c000 Wdf01000 (pdb symbols) F:\SymbolsPub\Wdf01000.pdb\0E5C347DFB5A4B1DB1606D336048C5D11\Wdf01000.pdb

f741c000 f7432000 pci (pdb symbols) F:\SymbolsPub\pci.pdb\19C18EEF2357412DA2D507D00DFDBD021\pci.pdb

f7432000 f7466000 ACPI (pdb symbols) F:\SymbolsPub\acpi.pdb\FBB7E7F76E2D4337B34F0D037397A1F91\acpi.pdb

f7487000 f7490000 WMILIB (pdb symbols) F:\SymbolsPub\wmilib.pdb\12857EA639DF4B4886C59A41723B52101\wmilib.pdb

f7497000 f74a6000 isapnp (pdb symbols) F:\SymbolsPub\isapnp.pdb\126F8C9AD41142309A3D9E6E109719CC1\isapnp.pdb

f74a7000 f74b4000 WDFLDR (pdb symbols) F:\SymbolsPub\wdfldr.pdb\43C2BA1CD34C49D6BA4C5DDF7582AFDE1\wdfldr.pdb

f74b7000 f74c4000 PCIIDEX (pdb symbols) F:\SymbolsPub\pciidex.pdb\70C5240A95584B429B1003B33A658A411\pciidex.pdb

f74c7000 f74d7000 MountMgr (pdb symbols) F:\SymbolsPub\mountmgr.pdb\5C581012D23247898DCE1121BB49C9591\mountmgr.pdb

f74d7000 f74e2000 PartMgr (pdb symbols) F:\SymbolsPub\partmgr.pdb\553D05ACC6B74F7A96205455C0FDC0612\partmgr.pdb

f74e7000 f74f7000 disk (pdb symbols) F:\SymbolsPub\disk.pdb\3DA44D56F4CF49678E6E538BEA9F55311\disk.pdb

f74f7000 f7503000 Dfs (pdb symbols) F:\SymbolsPub\dfs.pdb\E9ECFFE65B694263B16AF5284A76B7781\dfs.pdb

f7507000 f7511000 crcdisk (pdb symbols) F:\SymbolsPub\crcdisk.pdb\ECA72D45092A44938120B985ED028F501\crcdisk.pdb

f7547000 f7551000 mouclass (pdb symbols) F:\SymbolsPub\mouclass.pdb\4B24438EF11E4AA9BAAB1B922FF2BC121\mouclass.pdb

f7557000 f7566000 intelppm (pdb symbols) F:\SymbolsPub\intelppm.pdb\1D52238AE4AE49FCBD2A8EAC319ACED61\intelppm.pdb

f7567000 f7575000 NDProxy (pdb symbols) F:\SymbolsPub\ndproxy.pdb\77302E5EAF7A49A4B9F73812034D64C71\ndproxy.pdb

f7577000 f7581000 serenum (pdb symbols) F:\SymbolsPub\SerEnum.pdb\FE31D81794834D0E849795D9DEBA10301\SerEnum.pdb

f7587000 f7590000 raspti (pdb symbols) F:\SymbolsPub\raspti.pdb\C8CA04E9714C4C28B72736651219753C1\raspti.pdb

f7597000 f75a2000 ptilink (pdb symbols) F:\SymbolsPub\ptilink.pdb\8C99481FF12B4CE0A314836D0BFDFF541\ptilink.pdb

f75a7000 f75b6000 termdd (pdb symbols) F:\SymbolsPub\termdd.pdb\AD7D318B739B4975A1413478D74ADD2F1\termdd.pdb

f75b7000 f75c2000 TDI (pdb symbols) F:\SymbolsPub\tdi.pdb\0A6B164853FB4C3CA35A39F06BCF263B1\tdi.pdb

f7607000 f7612000 kbdclass (pdb symbols) F:\SymbolsPub\kbdclass.pdb\D89740D4F8B24AC994B9F73E7D52BA2A1\kbdclass.pdb

f7617000 f7623000 vga (pdb symbols) F:\SymbolsPub\vga.pdb\AE1F18524D5A4C4091E78CD12096C26B1\vga.pdb

f7637000 f7640000 mssmbios (pdb symbols) F:\SymbolsPub\mssmbios.pdb\DD4D360AB16648F8B4985A9734CFA0201\mssmbios.pdb

f7647000 f7650000 ndistapi (pdb symbols) F:\SymbolsPub\ndistapi.pdb\6AA8C8C3CC6F44AA95D41F674C66DAE31\ndistapi.pdb

f7667000 f7670000 watchdog (pdb symbols) F:\SymbolsPub\watchdog.pdb\7C54E285D9D847918F46360629BD10E11\watchdog.pdb

f76a7000 f76b2000 cpqcidrv (no symbols)

f76b7000 f76c6000 raspppoe (pdb symbols) F:\SymbolsPub\raspppoe.pdb\0D3511AF68AE4E3EAB560AAB7A5C3B841\raspppoe.pdb

f7707000 f770f000 kdcom (pdb symbols) F:\SymbolsPub\kdcom.pdb\D2DF9C86F6194ED680A7DD270076F7281\kdcom.pdb

f770f000 f7717000 BOOTVID (pdb symbols) F:\SymbolsPub\bootvid.pdb\8D00A98A20CF4EE0B3609CB593AD6B2B1\bootvid.pdb

f7717000 f771e000 pciide (pdb symbols) F:\SymbolsPub\pciide.pdb\432C26B572F0435A9570629D6D2DFC6A1\pciide.pdb

f771f000 f7726000 dmload (pdb symbols) F:\SymbolsPub\dmload.pdb\CF29F13A227D435D9215BD7E0064AAE21\dmload.pdb

f773f000 f7745300 HIDPARSE (pdb symbols) F:\SymbolsPub\hidparse.pdb\168DA5EBED074018AE53EFEAA44C5D131\hidparse.pdb

f775f000 f7767000 mnmdd (pdb symbols) F:\SymbolsPub\mnmdd.pdb\6E7B24987F6544B395CE03910BA9B1331\mnmdd.pdb

f7767000 f776f000 RDPCDD (pdb symbols) F:\SymbolsPub\RDPCDD.pdb\EE64C3AA62364E13BD4A32C8A16F8C201\RDPCDD.pdb

f776f000 f7777000 rasacd (pdb symbols) F:\SymbolsPub\rasacd.pdb\1B61FBD6F931427DBF2E82BA4D54E9471\rasacd.pdb

f77cf000 f77d6d80 usbccgp (pdb symbols) F:\SymbolsPub\usbccgp.pdb\91512AFAB385436892FEBAEBC8D73E161\usbccgp.pdb

f77df000 f77e4180 usbuhci (pdb symbols) F:\SymbolsPub\usbuhci.pdb\CA0AA1F5D3404F99BA02B344556720E61\usbuhci.pdb

f77e7000 f77edb80 usbehci (pdb symbols) F:\SymbolsPub\usbehci.pdb\02CCADF14C474631AF8FC8DDD63116331\usbehci.pdb

f77ef000 f77f7000 audstub (pdb symbols) F:\SymbolsPub\audstub.pdb\92AF0464295942BFAE368894C109C5331\audstub.pdb

f7807000 f780f000 mouhid (pdb symbols) F:\SymbolsPub\mouhid.pdb\F24F259F8DA548778D3EBD9BF17C2F711\mouhid.pdb

f780f000 f7817000 Fs_Rec (pdb symbols) F:\SymbolsPub\fs_rec.pdb\1190586148B845039CC8B5AA797BFB141\fs_rec.pdb

f7817000 f781e000 Null (pdb symbols) F:\SymbolsPub\null.pdb\ADB22E796C7C4B8AAAB67D2320C1A0321\null.pdb

f781f000 f7826000 Beep (pdb symbols) F:\SymbolsPub\beep.pdb\414379B62B904661988B3E7E7707F8C41\beep.pdb

f79a3000 f79a4280 swenum (pdb symbols) F:\SymbolsPub\swenum.pdb\43D2DC836ED549DDA233FF0D539B5F071\swenum.pdb

f79a5000 f79a6580 USBD (pdb symbols) F:\SymbolsPub\usbd.pdb\9F47B9915C294DDF913B6BB2EB77A80E1\usbd.pdb

Unloaded modules:

ba548000 ba556000 HIDCLASS.SYS

ba558000 ba561000 hidusb.sys

f7777000 f777f000 usbccgp.sys

ba538000 ba541000 kbdhid.sys

f777f000 f7787000 mouhid.sys

ba515000 ba528000 i8042prt.sys

ba568000 ba576000 imapi.sys

f75d7000 f75e0000 kbdhid.sys

f7807000 f780f000 Sfloppy.SYS

f7697000 f76a1000 Flpydisk.SYS