C# .net application doing serial communication bug-check Window 2003.


Ø  An application which is doing intensive serial communication may bug-check( blue Screen) a Windows 2003 Server even with latest update until this date 29 - March - 2010.


Ø  This is potentially a issue in the speed.sys but yet have to confirm.


Ø  As far as I know this issue is extremely rare only happens when you have very high load of serial communication.


 


Following is the analysis details.


 


3: kd> k100


ChildEBP RetAddr 


b89a7a70 ba79d409 nt!KiTrap0E+0x2a7


WARNING: Stack unwind information not available. Following frames may be wrong.


b89a7b20 ba79d2b1 speed+0x2409


b89a7b38 ba79cb61 speed+0x22b1


b89a7bd8 ba79f4b6 speed+0x1b61


b89a7c04 f75785b7 speed+0x44b6


b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65


b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72


b89a7c50 8092b51f nt!IofCallDriver+0x45


b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b


b89a7d00 8092b574 nt!IopXxxControlFile+0x60f


b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a


b89a7d34 7c82860c nt!KiFastCallEntry+0xfc


03dbe8f8 00000000 0x7c82860c


 


3: kd> !analyze -v


*******************************************************************************


*                                                                             *


*                        Bugcheck Analysis                                    *


*                                                                             *


*******************************************************************************


 


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)


An attempt was made to access a pageable (or completely invalid) address at an


interrupt request level (IRQL) that is too high.  This is usually


caused by drivers using improper addresses.


If kernel debugger is available get stack backtrace.


Arguments:


Arg1: 0000000c, memory referenced


Arg2: d0000005, IRQL


Arg3: 00000000, value 0 = read operation, 1 = write operation


Arg4: ba79d409, address which referenced memory


 


Debugging Details:


------------------


 


Debugger CompCtrlDb Connection::Open failed 80004005


Debugger Dbgportaldb Connection::Open failed 80040e4d


Database Dbgportaldb not connected


 


READ_ADDRESS:  0000000c


 


CURRENT_IRQL:  5


 


FAULTING_IP:


speed+2409


ba79d409 8b480c          mov     ecx,dword ptr [eax+0Ch]


 


DEFAULT_BUCKET_ID:  DRIVER_FAULT


 


BUGCHECK_STR:  0xD1


 


PROCESS_NAME:  HYC.TMS4.Securi


 


TRAP_FRAME:  b89a7a70 -- (.trap ffffffffb89a7a70)


ErrCode = 00000000


eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354


eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0         nv up ei pl nz na po nc


cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202


speed+0x2409:


ba79d409 8b480c          mov     ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????


Resetting default scope


 


LAST_CONTROL_TRANSFER:  from ba79d409 to 80836dfd


 


STACK_TEXT: 


b89a7a70 ba79d409 badb0d00 00000000 f7737120 nt!KiTrap0E+0x2a7


WARNING: Stack unwind information not available. Following frames may be wrong.


b89a7b20 ba79d2b1 8830f0f8 86d03a60 8830f0f8 speed+0x2409


b89a7b38 ba79cb61 8830f0f8 86d03960 8830f33c speed+0x22b1


b89a7bd8 ba79f4b6 8830f040 86d03960 8830ebc8 speed+0x1b61


b89a7c04 f75785b7 8830ebc8 86d03960 86d03a60 speed+0x44b6


b89a7c18 f75787c6 8830eb10 00d03960 86d03960 serenum!Serenum_DispatchPassThrough+0x65


b89a7c3c 80840153 8830eb10 00000000 87f88c10 serenum!Serenum_IoCtl+0x72


b89a7c50 8092b51f 86d03a60 86491238 86d03960 nt!IofCallDriver+0x45


b89a7c64 8092b454 8830eb10 86d03960 86491238 nt!IopSynchronousServiceTail+0x10b


b89a7d00 8092b574 00000e1c 00000acc 00000000 nt!IopXxxControlFile+0x60f


b89a7d34 80833bef 00000e1c 00000acc 00000000 nt!NtDeviceIoControlFile+0x2a


b89a7d34 7c82860c 00000e1c 00000acc 00000000 nt!KiFastCallEntry+0xfc


03dbe8f8 00000000 00000000 00000000 00000000 0x7c82860c


 


 


STACK_COMMAND:  kb


 


FOLLOWUP_IP:


speed+2409


ba79d409 8b480c          mov     ecx,dword ptr [eax+0Ch]


 


SYMBOL_STACK_INDEX:  1


 


FOLLOWUP_NAME:  tomgreen


 


MODULE_NAME:  speed


 


DEBUG_FLR_IMAGE_TIMESTAMP:  41388d6e


 


SYMBOL_NAME:  speed+2409


 


IMAGE_NAME:  speed.sys


 


FAILURE_BUCKET_ID:  0xD1_speed+2409


 


BUCKET_ID:  0xD1_speed+2409


 


Followup: tomgreen


---------


 


3: kd> .trap ffffffffb89a7a70


ErrCode = 00000000


eax=00000000 ebx=883e78f4 ecx=f7737a05 edx=00000000 esi=8830f0f8 edi=8830f354


eip=ba79d409 esp=b89a7ae4 ebp=b89a7b20 iopl=0         nv up ei pl nz na po nc


cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202


speed+0x2409:


ba79d409 8b480c          mov     ecx,dword ptr [eax+0Ch] ds:0023:0000000c=????????


 


 


 


3: kd> k100


ChildEBP RetAddr 


WARNING: Stack unwind information not available. Following frames may be wrong.


b89a7b20 ba79d2b1 speed+0x2409


b89a7b38 ba79cb61 speed+0x22b1


b89a7bd8 ba79f4b6 speed+0x1b61


b89a7c04 f75785b7 speed+0x44b6


b89a7c18 f75787c6 serenum!Serenum_DispatchPassThrough+0x65


b89a7c3c 80840153 serenum!Serenum_IoCtl+0x72


b89a7c50 8092b51f nt!IofCallDriver+0x45


b89a7c64 8092b454 nt!IopSynchronousServiceTail+0x10b


b89a7d00 8092b574 nt!IopXxxControlFile+0x60f


b89a7d34 80833bef nt!NtDeviceIoControlFile+0x2a


b89a7d34 7c82860c nt!KiFastCallEntry+0xfc


03dbe8f8 00000000 0x7c82860c


 


I would have stopped my analysis with above logs and agreed with !analyze -v if the address trying to access had not been 0000000c because


 


nt!KeSynchronizeExecution


http://msdn.microsoft.com/en-us/library/ms801652.aspx


 


 


Will raised the IRQL to Device IRQL ( 5 here ) to Mask all the interrupt to IRQL such that the function speed!SerialFinishOldWait and ISR ( Interrupt service subroutine ) of that Device are not executed asynchronously. Because ISR as well as speed!SerialFinishOldWait most probably accessing the device registers  ( reading and writing to it ). Also interrupt handle should probably be avoid when programming the device.


 


So the bottom line is when calling speed!SerialFinishOldWait Irql is 5 and no paging and scheduling is enabled. And we will get this bug check if that function try to access any paged locations in the system.


 


But I was not convinced by above points as the address which was trying to access was 0000000c due to following reason.


 


Even if the IRQL was 0 which is passive or user mode it would have caused AV - ( which is page fault in kernel mode ). So I went via the following analysis.


 


 


3: kd> ub eip


speed+0x23e7:


ba79d3e7 8b8664020000    mov     eax,dword ptr [esi+264h]


ba79d3ed 52              push    edx


ba79d3ee c7401c04000000  mov     dword ptr [eax+1Ch],4


ba79d3f5 52              push    edx


ba79d3f6 8d86e8030000    lea     eax,[esi+3E8h]


ba79d3fc 50              push    eax


ba79d3fd ff15cc507aba    call    dword ptr [speed+0xa0cc (ba7a50cc)]


ba79d403 8b865c020000    mov     eax,dword ptr [esi+25Ch]


 


3: kd> !address esi


  82b7e000 - 07c82000                          


          Usage       KernelSpaceUsageNonPagedPool


 


3: kd> !pool esi


Pool page 8830f0f8 region is Nonpaged pool


*8830f000 size:  810 previous size:    0  (Allocated) *Devi (Protected)


              Pooltag Devi : Device objects


 8830f810 size:    8 previous size:  810  (Free)       ....


 8830f818 size:   40 previous size:    8  (Allocated)  WmiR


 8830f858 size:  128 previous size:   40  (Allocated)  Dnod


 8830f980 size:  128 previous size:  128  (Allocated)  Dnod


 8830faa8 size:  128 previous size:  128  (Allocated)  Dnod


 8830fbd0 size:  128 previous size:  128  (Allocated)  Dnod


 8830fcf8 size:  128 previous size:  128  (Allocated)  Dnod


 8830fe20 size:   78 previous size:  128  (Allocated)  SPED


 8830fe98 size:   78 previous size:   78  (Allocated)  SPED


 8830ff10 size:   78 previous size:   78  (Allocated)  SPED


 8830ff88 size:   78 previous size:   78  (Allocated)  SPED


 


3: kd> dc 8830f000


8830f000  0b020000 e9766544 00000000 000000e8  ....Dev.........


8830f010  00000800 00000000 e1003268 00140014  ........h2......


8830f020  e168b388 00000001 00000006 00000000  ..h.............


8830f030  8a7f0ca0 1a200010 00000001 00000000  ...... .........


8830f040  07a00003 00000001 89db34d0 89cefd10  .........4......


8830f050  8830eb10 00000000 00000000 0000304c  ..0.........L0..


8830f060  00000000 00000000 8830f0f8 0000001b  ..........0.....


8830f070  00000004 00000000 00000000 00000000  ................


 


 


3: kd> !devobj 8830f040


Device object (8830f040) is for:


 SPEEDPort0 \Driver\SPEED DriverObject 89db34d0


Current Irp 00000000 RefCount 1 Type 0000001b Flags 0000304c


Dacl e14e9be4 DevExt 8830f0f8 DevObjExt 8830f7e0 DevNode 8830fd00


ExtensionFlags (0000000000) 


AttachedDevice (Upper) 8830eb10 \Driver\serenum


Device queue is not busy.


3: kd> r esi


Last set context:


esi=8830f0f8


 


 


0x8830f0f8 is our ESI and we are interested in offset 25C from


 


ba79d403 8b865c020000    mov     eax,dword ptr [esi+25Ch]


 


To go further we need the symbols for speed.sys which is not available externally. Following is what I found from further analysis with internals symbols for speed.sys.I did a dt on the 8830f0f8 and found the field which is going zero. The field happen to be an associate IRP which is zero and the code is not checking if it is null while accessing it.


 


Now following points worth mentioning.


 


Ø  This is not a IRQL issue.


Ø  Although the IRQL is high null reference is the root cause.


Ø  If the developer of speed.sys is checking this pointer and after that some other thread is modifying it this is a timing issue. But can be in "other thread"


Ø  Otherwise the developer of speed.sys should check the pointer for null before accessing it.


 


To see the other driver loaded at the time of crash


 


 


3: kd> lm


start    end        module name


80800000 80a7e000   nt         (pdb symbols)          F:\SymbolsPub\ntkrnlmp.pdb\36D676FC59054878A16CD63CFEDCD9772\ntkrnlmp.pdb


80a7e000 80aaa000   hal        (pdb symbols)          F:\SymbolsPub\halmacpi.pdb\F799635F9A7C45BDBF439633754B99B61\halmacpi.pdb


b8c90000 b8cbb000   RDPWD      (pdb symbols)          F:\SymbolsPub\RDPWD.pdb\854B8010B0834D189776AF0F9667C6BE1\RDPWD.pdb


b952b000 b954c480   tmcomm     (export symbols)       tmcomm.sys


b981d000 b987b000   srv        (pdb symbols)          F:\SymbolsPub\srv.pdb\36A3BEB1677845B2A1285F64E20035A12\srv.pdb


b987b000 b9898000   mqac       (pdb symbols)          F:\SymbolsPub\mqac.pdb\006191D266F74EA69CCC9A3C35D32BD81\mqac.pdb


b99b0000 b9a00000   HTTP       (pdb symbols)          F:\SymbolsPub\http.pdb\BFE8AB596A714ECFBB54FC7075F4E5EB2\http.pdb


b9a98000 b9aa3000   TDTCP      (pdb symbols)          F:\SymbolsPub\tdtcp.pdb\874BED119EF947B598E9F42A5143A3111\tdtcp.pdb


b9c30000 b9c5f000   RMCAST     (pdb symbols)          F:\SymbolsPub\rmcast.pdb\63DB75FA0168412E962E1BDE6F7C91AC1\rmcast.pdb


b9d7f000 b9d88000   kbdhid     (pdb symbols)          F:\SymbolsPub\kbdhid.pdb\46D80290361D43ABA8DA734886E6A8E31\kbdhid.pdb


b9d8f000 b9d9d000   HIDCLASS   (pdb symbols)          F:\SymbolsPub\hidclass.pdb\90EE77DAAF034BD498E8699CA92F038E1\hidclass.pdb


b9d9f000 b9da8000   hidusb     (pdb symbols)          F:\SymbolsPub\hidusb.pdb\23FA99CBB6804C65AE51E94B1315C34B1\hidusb.pdb


b9e17000 b9e33000   dump_HpCISSs2   (no symbols)          


b9e33000 b9e48000   Cdfs       (pdb symbols)          F:\SymbolsPub\cdfs.pdb\A452AB41FCA143C196ED15B34FFBC9802\cdfs.pdb


b9e48000 b9e59000   Fips       (pdb symbols)          F:\SymbolsPub\fips.pdb\03ABC31C2E494610B7D0BB23716AFD4F2\fips.pdb


b9e59000 b9ecf000   mrxsmb     (pdb symbols)          F:\SymbolsPub\mrxsmb.pdb\A3DFEE39DD064F5B8CA33222BF4AC0B52\mrxsmb.pdb


b9ef7000 b9f27000   rdbss      (pdb symbols)          F:\SymbolsPub\rdbss.pdb\FB1A2E64899146228FFC6BFECCE150742\rdbss.pdb


b9f97000 b9fa1000   Dxapi      (pdb symbols)          F:\SymbolsPub\dxapi.pdb\721396546D2043D2A9DDC6356312CA191\dxapi.pdb


b9fa7000 b9fb1000   dump_diskdump   (pdb symbols)          F:\SymbolsPub\diskdump.pdb\37F6801A2CB6409D8B08EC25EF4EB7F11\diskdump.pdb


b9fc7000 b9ff1000   afd        (pdb symbols)          F:\SymbolsPub\afd.pdb\58290F5DE8594177A0C88B7AD053A8C32\afd.pdb


b9ff1000 ba022000   netbt      (pdb symbols)          F:\SymbolsPub\netbt.pdb\455C06551A2147F5ADA64BFD6208F89B2\netbt.pdb


ba022000 ba0b6000   tcpip      (pdb symbols)          F:\SymbolsPub\tcpip.pdb\FC26191633F5414C99223CC9CD0AD4E32\tcpip.pdb


ba0b6000 ba0cf000   ipsec      (pdb symbols)          F:\SymbolsPub\ipsec.pdb\7EE640C522DD4088841B425FE48823532\ipsec.pdb


ba0ff000 ba106000   dxgthk     (pdb symbols)          F:\SymbolsPub\dxgthk.pdb\4FB4E43B8ABA4A548F650E2495D3BD201\dxgthk.pdb


ba1df000 ba1f4000   usbhub     (pdb symbols)          F:\SymbolsPub\usbhub.pdb\B3158E43948342539C03D8B84230FA921\usbhub.pdb


ba324000 ba383000   update     (pdb symbols)          F:\SymbolsPub\update.pdb\7251883337484E1E92D3F41D533749D52\update.pdb


ba3ab000 ba3e2000   rdpdr      (pdb symbols)          F:\SymbolsPub\rdpdr.pdb\848BC2B36384480CA59D94CD7CDFB0AF1\rdpdr.pdb


ba3e2000 ba438000   wlbs       (pdb symbols)          F:\SymbolsPub\wlbs.pdb\59077440992B41359712B962D79370CF2\wlbs.pdb


ba438000 ba44a000   raspptp    (pdb symbols)          F:\SymbolsPub\raspptp.pdb\4A592EBA851241449D43421574548C4E2\raspptp.pdb


ba44a000 ba463000   ndiswan    (pdb symbols)          F:\SymbolsPub\ndiswan.pdb\4160C938B1CE46B2BA662E25F575E66E2\ndiswan.pdb


ba463000 ba477000   rasl2tp    (pdb symbols)          F:\SymbolsPub\rasl2tp.pdb\48A300C372444C9397750F72BF6BC6152\rasl2tp.pdb


ba477000 ba4b0000   cpqteam    (no symbols)          


ba4b0000 ba4d7000   ks         (pdb symbols)          F:\SymbolsPub\ks.pdb\98407F7F5B8B47549ECDA3C47B16EB0B2\ks.pdb


ba4d7000 ba4eb000   redbook    (pdb symbols)          F:\SymbolsPub\redbook.pdb\458F1549775540A98F797ED48965388A1\redbook.pdb


ba4eb000 ba500000   cdrom      (pdb symbols)          F:\SymbolsPub\cdrom.pdb\6FB9D56F0A8247F1AB68A39F0EDC8FFE1\cdrom.pdb


ba500000 ba515000   serial     (pdb symbols)          F:\SymbolsPub\serial.pdb\2E4EDCACDC754270B075AA7FE795E6A21\serial.pdb


ba578000 ba585000   netbios    (pdb symbols)          F:\SymbolsPub\netbios.pdb\B833FF7890A84BF0BB7CF97E9459552C1\netbios.pdb


ba588000 ba595000   wanarp     (pdb symbols)          F:\SymbolsPub\wanarp.pdb\BD3EDDE433F742FC925ED70B71B78BC81\wanarp.pdb


ba598000 ba5a6000   msgpc      (pdb symbols)          F:\SymbolsPub\msgpc.pdb\14067A1904E94FE0B4A4B31B7FDD68021\msgpc.pdb


ba5a8000 ba5b5000   Npfs       (pdb symbols)          F:\SymbolsPub\npfs.pdb\0EB5780ED0A743A784EA2905F520FFBA1\npfs.pdb


ba5b8000 ba5c3000   Msfs       (pdb symbols)          F:\SymbolsPub\msfs.pdb\0A946EF7249C40FCBDA787C46FC201531\msfs.pdb


ba5c8000 ba5e3600   hpqilo2    (no symbols)          


ba5e4000 ba600000   VIDEOPRT   (pdb symbols)          F:\SymbolsPub\videoprt.pdb\29B14447FED6419C834515565167DDDE1\videoprt.pdb


ba600000 ba75e000   ati2mtag   (no symbols)          


ba75e000 ba788000   USBPORT    (pdb symbols)          F:\SymbolsPub\usbport.pdb\8A87CD9FE4234E4DBABFF30842FD3E761\usbport.pdb


ba788000 ba79b000   bxnd52x    (no symbols)           


ba79b000 ba7ad800   speed      (no symbols)          


ba7ae000 ba7eb000   e1e5132    (no symbols)          


bf800000 bf9d1000   win32k     (pdb symbols)          F:\SymbolsPub\win32k.pdb\73E7CBCC75964FAEB4D0AB689120F9EF2\win32k.pdb


bf9d1000 bf9e8000   dxg        (pdb symbols)          F:\SymbolsPub\dxg.pdb\8A5D0F9CC1F34C4F8D567056B62A271B1\dxg.pdb


bf9e8000 bfa28000   ati2dvag   (no symbols)          


bfa28000 bfa62000   ati2cqag   (export symbols)       ati2cqag.dll


bfa62000 bfa98000   atikvmag   (export symbols)       atikvmag.dll


bffa0000 bffea000   ATMFD    T (no symbols)          


f7109000 f7128000   Mup        (pdb symbols)          F:\SymbolsPub\mup.pdb\D1EB3084BA214384B224969400033F2B2\mup.pdb


f7128000 f7167000   NDIS       (pdb symbols)          F:\SymbolsPub\ndis.pdb\A14D4209157649C29C2B53ACB7C24C122\ndis.pdb


f7167000 f71fc000   Ntfs       (pdb symbols)          F:\SymbolsPub\ntfs.pdb\DF8CD23355324E71824D94ED509B922B2\ntfs.pdb


f71fc000 f726e000   bxvbdx     (no symbols)          


f726e000 f7294000   KSecDD     (pdb symbols)          F:\SymbolsPub\ksecdd.pdb\97DD9A8843E144AF82946CEA0D39912D1\ksecdd.pdb


f7294000 f72b9000   fltmgr     (pdb symbols)          F:\SymbolsPub\fltMgr.pdb\89680A31E23A42F8B81765B0CCF6AC7B1\fltMgr.pdb


f72b9000 f72cc000   CLASSPNP   (pdb symbols)          F:\SymbolsPub\classpnp.pdb\7A500B223916422893BA4BE476B22FE82\classpnp.pdb


f72cc000 f72ea000   storport   (pdb symbols)          F:\SymbolsPub\storport.pdb\C52B0EA7F7574A9AB0D5961C3E61C5021\storport.pdb


f72ea000 f7306000   HpCISSs2   (no symbols)          


f7306000 f7323000   atapi      (pdb symbols)          F:\SymbolsPub\atapi.pdb\D28555240C3F4860B53C1CB1F6FB6BE01\atapi.pdb


f7323000 f734d000   volsnap    (pdb symbols)          F:\SymbolsPub\volsnap.pdb\7DF5DBDD4B744321952CA20C41C092421\volsnap.pdb


f734d000 f7379000   dmio       (pdb symbols)          F:\SymbolsPub\dmio.pdb\FD474E74B14F40AEB147FB0399D67BDB1\dmio.pdb


f7379000 f73a0000   ftdisk     (pdb symbols)          F:\SymbolsPub\ftdisk.pdb\A35F2DA3D87F4FEBAD01015FB3D84FCE1\ftdisk.pdb


f73a0000 f741c000   Wdf01000   (pdb symbols)          F:\SymbolsPub\Wdf01000.pdb\0E5C347DFB5A4B1DB1606D336048C5D11\Wdf01000.pdb


f741c000 f7432000   pci        (pdb symbols)          F:\SymbolsPub\pci.pdb\19C18EEF2357412DA2D507D00DFDBD021\pci.pdb


f7432000 f7466000   ACPI       (pdb symbols)          F:\SymbolsPub\acpi.pdb\FBB7E7F76E2D4337B34F0D037397A1F91\acpi.pdb


f7487000 f7490000   WMILIB     (pdb symbols)          F:\SymbolsPub\wmilib.pdb\12857EA639DF4B4886C59A41723B52101\wmilib.pdb


f7497000 f74a6000   isapnp     (pdb symbols)          F:\SymbolsPub\isapnp.pdb\126F8C9AD41142309A3D9E6E109719CC1\isapnp.pdb


f74a7000 f74b4000   WDFLDR     (pdb symbols)          F:\SymbolsPub\wdfldr.pdb\43C2BA1CD34C49D6BA4C5DDF7582AFDE1\wdfldr.pdb


f74b7000 f74c4000   PCIIDEX    (pdb symbols)          F:\SymbolsPub\pciidex.pdb\70C5240A95584B429B1003B33A658A411\pciidex.pdb


f74c7000 f74d7000   MountMgr   (pdb symbols)          F:\SymbolsPub\mountmgr.pdb\5C581012D23247898DCE1121BB49C9591\mountmgr.pdb


f74d7000 f74e2000   PartMgr    (pdb symbols)          F:\SymbolsPub\partmgr.pdb\553D05ACC6B74F7A96205455C0FDC0612\partmgr.pdb


f74e7000 f74f7000   disk       (pdb symbols)          F:\SymbolsPub\disk.pdb\3DA44D56F4CF49678E6E538BEA9F55311\disk.pdb


f74f7000 f7503000   Dfs        (pdb symbols)          F:\SymbolsPub\dfs.pdb\E9ECFFE65B694263B16AF5284A76B7781\dfs.pdb


f7507000 f7511000   crcdisk    (pdb symbols)          F:\SymbolsPub\crcdisk.pdb\ECA72D45092A44938120B985ED028F501\crcdisk.pdb


f7547000 f7551000   mouclass   (pdb symbols)          F:\SymbolsPub\mouclass.pdb\4B24438EF11E4AA9BAAB1B922FF2BC121\mouclass.pdb


f7557000 f7566000   intelppm   (pdb symbols)          F:\SymbolsPub\intelppm.pdb\1D52238AE4AE49FCBD2A8EAC319ACED61\intelppm.pdb


f7567000 f7575000   NDProxy    (pdb symbols)          F:\SymbolsPub\ndproxy.pdb\77302E5EAF7A49A4B9F73812034D64C71\ndproxy.pdb


f7577000 f7581000   serenum    (pdb symbols)          F:\SymbolsPub\SerEnum.pdb\FE31D81794834D0E849795D9DEBA10301\SerEnum.pdb


f7587000 f7590000   raspti     (pdb symbols)          F:\SymbolsPub\raspti.pdb\C8CA04E9714C4C28B72736651219753C1\raspti.pdb


f7597000 f75a2000   ptilink    (pdb symbols)          F:\SymbolsPub\ptilink.pdb\8C99481FF12B4CE0A314836D0BFDFF541\ptilink.pdb


f75a7000 f75b6000   termdd     (pdb symbols)          F:\SymbolsPub\termdd.pdb\AD7D318B739B4975A1413478D74ADD2F1\termdd.pdb


f75b7000 f75c2000   TDI        (pdb symbols)          F:\SymbolsPub\tdi.pdb\0A6B164853FB4C3CA35A39F06BCF263B1\tdi.pdb


f7607000 f7612000   kbdclass   (pdb symbols)          F:\SymbolsPub\kbdclass.pdb\D89740D4F8B24AC994B9F73E7D52BA2A1\kbdclass.pdb


f7617000 f7623000   vga        (pdb symbols)          F:\SymbolsPub\vga.pdb\AE1F18524D5A4C4091E78CD12096C26B1\vga.pdb


f7637000 f7640000   mssmbios   (pdb symbols)          F:\SymbolsPub\mssmbios.pdb\DD4D360AB16648F8B4985A9734CFA0201\mssmbios.pdb


f7647000 f7650000   ndistapi   (pdb symbols)          F:\SymbolsPub\ndistapi.pdb\6AA8C8C3CC6F44AA95D41F674C66DAE31\ndistapi.pdb


f7667000 f7670000   watchdog   (pdb symbols)          F:\SymbolsPub\watchdog.pdb\7C54E285D9D847918F46360629BD10E11\watchdog.pdb


f76a7000 f76b2000   cpqcidrv   (no symbols)          


f76b7000 f76c6000   raspppoe   (pdb symbols)          F:\SymbolsPub\raspppoe.pdb\0D3511AF68AE4E3EAB560AAB7A5C3B841\raspppoe.pdb


f7707000 f770f000   kdcom      (pdb symbols)          F:\SymbolsPub\kdcom.pdb\D2DF9C86F6194ED680A7DD270076F7281\kdcom.pdb


f770f000 f7717000   BOOTVID    (pdb symbols)          F:\SymbolsPub\bootvid.pdb\8D00A98A20CF4EE0B3609CB593AD6B2B1\bootvid.pdb


f7717000 f771e000   pciide     (pdb symbols)          F:\SymbolsPub\pciide.pdb\432C26B572F0435A9570629D6D2DFC6A1\pciide.pdb


f771f000 f7726000   dmload     (pdb symbols)          F:\SymbolsPub\dmload.pdb\CF29F13A227D435D9215BD7E0064AAE21\dmload.pdb


f773f000 f7745300   HIDPARSE   (pdb symbols)          F:\SymbolsPub\hidparse.pdb\168DA5EBED074018AE53EFEAA44C5D131\hidparse.pdb


f775f000 f7767000   mnmdd      (pdb symbols)          F:\SymbolsPub\mnmdd.pdb\6E7B24987F6544B395CE03910BA9B1331\mnmdd.pdb


f7767000 f776f000   RDPCDD     (pdb symbols)          F:\SymbolsPub\RDPCDD.pdb\EE64C3AA62364E13BD4A32C8A16F8C201\RDPCDD.pdb


f776f000 f7777000   rasacd     (pdb symbols)          F:\SymbolsPub\rasacd.pdb\1B61FBD6F931427DBF2E82BA4D54E9471\rasacd.pdb


f77cf000 f77d6d80   usbccgp    (pdb symbols)          F:\SymbolsPub\usbccgp.pdb\91512AFAB385436892FEBAEBC8D73E161\usbccgp.pdb


f77df000 f77e4180   usbuhci    (pdb symbols)          F:\SymbolsPub\usbuhci.pdb\CA0AA1F5D3404F99BA02B344556720E61\usbuhci.pdb


f77e7000 f77edb80   usbehci    (pdb symbols)          F:\SymbolsPub\usbehci.pdb\02CCADF14C474631AF8FC8DDD63116331\usbehci.pdb


f77ef000 f77f7000   audstub    (pdb symbols)          F:\SymbolsPub\audstub.pdb\92AF0464295942BFAE368894C109C5331\audstub.pdb


f7807000 f780f000   mouhid     (pdb symbols)          F:\SymbolsPub\mouhid.pdb\F24F259F8DA548778D3EBD9BF17C2F711\mouhid.pdb


f780f000 f7817000   Fs_Rec     (pdb symbols)          F:\SymbolsPub\fs_rec.pdb\1190586148B845039CC8B5AA797BFB141\fs_rec.pdb


f7817000 f781e000   Null       (pdb symbols)          F:\SymbolsPub\null.pdb\ADB22E796C7C4B8AAAB67D2320C1A0321\null.pdb


f781f000 f7826000   Beep       (pdb symbols)          F:\SymbolsPub\beep.pdb\414379B62B904661988B3E7E7707F8C41\beep.pdb


f79a3000 f79a4280   swenum     (pdb symbols)          F:\SymbolsPub\swenum.pdb\43D2DC836ED549DDA233FF0D539B5F071\swenum.pdb


f79a5000 f79a6580   USBD       (pdb symbols)          F:\SymbolsPub\usbd.pdb\9F47B9915C294DDF913B6BB2EB77A80E1\usbd.pdb


 


Unloaded modules:


ba548000 ba556000   HIDCLASS.SYS


ba558000 ba561000   hidusb.sys


f7777000 f777f000   usbccgp.sys


ba538000 ba541000   kbdhid.sys


f777f000 f7787000   mouhid.sys


ba515000 ba528000   i8042prt.sys


ba568000 ba576000   imapi.sys


f75d7000 f75e0000   kbdhid.sys


f7807000 f780f000   Sfloppy.SYS


f7697000 f76a1000   Flpydisk.SYS


 


 


Comments (0)

Skip to main content