Re: [Wireshark-dev] Npcap 0.03 call for test

2015-08-10 Thread Yang Luo
Hi Jim, Pascal,

This IRQL_NOT_LESS_OR_EQUAL (a) BSoD seems to be caused by
NdisAcquireSpinLock call in function NPF_StartUsingOpenInstance has
referred to freed Open struct memory, I have tried to fix it in latest
installer, you may try it at:
https://svn.nmap.org/nmap-exp/yang/NPcap-LWF/npcap-nmap-0.03-r6.exe

Cheers,
Yang


On Fri, Aug 7, 2015 at 9:51 AM, Jim Young  wrote:

> Hello Yang,
>
>
> After installing 0.03-r5 on my Windows 8.1 system I too am see a BSOD when
> starting Wireshark, tshark or dumpcap.
>
> Like Pascal's Bugcheck Analysis my crashes are also reporting bug check
> string: IRQL_NOT_LESS_OR_EQUAL (a)
>
> 2: kd> .symfix C:\Symbols
>
> 2: kd> .reload
>
> Loading Kernel Symbols
>
> ...
>
> 
>
> ...
>
> Loading User Symbols
>
> .
>
> Loading unloaded module list
>
> 
>
> 2: kd> !analyze -v
>
>
> ***
>
> *
> *
>
> *Bugcheck Analysis
> *
>
> *
> *
>
>
> ***
>
>
> IRQL_NOT_LESS_OR_EQUAL (a)
>
> An attempt was made to access a pageable (or completely invalid) address
> at an
>
> interrupt request level (IRQL) that is too high.  This is usually
>
> caused by drivers using improper addresses.
>
> If a kernel debugger is available get the stack backtrace.
>
> Arguments:
>
> Arg1: a620, memory referenced
>
> Arg2: 0002, IRQL
>
> Arg3: 0001, bitfield :
>
> bit 0 : value 0 = read operation, 1 = write operation
>
> bit 3 : value 0 = not an execute operation, 1 = execute operation (only on
> chips which support this level of status)
>
> Arg4: f802a914e0cc, address which referenced memory
>
>
> Debugging Details:
>
> --
>
>
> *** ERROR: Module load completed but symbols could not be loaded for
> npf.sys
>
> *** ERROR: Symbol file could not be found.  Defaulted to export symbols
> for packet.dll -
>
>
> WRITE_ADDRESS: unable to get nt!MmNonPagedPoolStart
>
> unable to get nt!MmSizeOfNonPagedPoolInBytes
>
>  a620
>
>
> CURRENT_IRQL:  2
>
>
> FAULTING_IP:
>
> nt!KeAcquireSpinLockRaiseToDpc+1c
>
> f802`a914e0cc f0480fba2900lock bts qword ptr [rcx],0
>
>
> DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
>
>
> BUGCHECK_STR:  AV
>
>
> PROCESS_NAME:  dumpcap.exe
>
>
> ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
>
>
> TRAP_FRAME:  d0009e22a600 -- (.trap 0xd0009e22a600)
>
> NOTE: The trap frame does not contain all registers.
>
> Some register values may be zeroed or incorrect.
>
> rax=0002 rbx= rcx=a620
>
> rdx=e00024ae9a70 rsi= rdi=
>
> rip=f802a914e0cc rsp=d0009e22a790 rbp=d0009e22ab80
>
>  r8=e00022bf3610  r9=000e r10=0801
>
> r11=e00025387040 r12= r13=
>
> r14= r15=
>
> iopl=0 nv up ei pl zr na po nc
>
> nt!KeAcquireSpinLockRaiseToDpc+0x1c:
>
> f802`a914e0cc f0480fba2900lock bts qword ptr [rcx],0
> ds:`a620=
>
> Resetting default scope
>
>
> LAST_CONTROL_TRANSFER:  from f802a91d27e9 to f802a91c6ca0
>
>
> STACK_TEXT:
>
> d000`9e22a4b8 f802`a91d27e9 : `000a `a620
> `0002 `0001 : nt!KeBugCheckEx
>
> d000`9e22a4c0 f802`a91d103a : `0001 `
> ` d000`9e22a730 : nt!KiBugCheckDispatch+0x69
>
> d000`9e22a600 f802`a914e0cc : `0001 c001`
> c001`6f840a01 ` : nt!KiPageFault+0x23a
>
> d000`9e22a790 f801`c221b19a : ` e000`2529b080
> `0001 d000`9e22ab80 : nt!KeAcquireSpinLockRaiseToDpc+0x1c
>
> d000`9e22a7c0 f801`c221ba38 : `1ef0 e000`24ae9a00
> ` d000` : npf+0x319a
>
> d000`9e22a7f0 f802`a949b77f : `0001 e000`24ae9a70
> e000`24ae9a70 `0001 : npf+0x3a38
>
> d000`9e22a880 f802`a949ad22 : d000`9e22aa38 `
> ` ` : nt!IopXxxControlFile+0xa4f
>
> d000`9e22aa20 f802`a91d24b3 : e000`25299080 d000`001f0003
> 0004`a71ecc08 0004` : nt!NtDeviceIoControlFile+0x56
>
> d000`9e22aa90 7fff`16ff123a : 7fff`14375fe3 7f71`9a924c5b
> `0003 ` : nt!KiSystemServiceCopyEnd+0x13
>
> 0004`a71ecbb8 7fff`14375fe3 : 7f71`9a924c5b `0003
> ` `0013 : ntdll!NtDeviceIoControlFile+0xa
>
> 0004`a71ecbc0 7fff`16b01bb0 : `1ef0 7fff`16f9713a
> 000

[Wireshark-dev] Crash during fuzzing

2015-08-10 Thread Dario Lombardo
Hi list
II was fuzzing a protocol, and I experienced a crash. The fuzz-test.sh gave
me this output

$ ../tools/fuzz-test.sh -b run ../data/hpfeed_all_packets_sample.pcap
[...]
Starting pass 130:
../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
Starting pass 131:
../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
Starting pass 132:
../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
Starting pass 133:
../data/hpfeeds_all_packets_sample.pcap: (-nVxr) ../tools/fuzz-test.sh:
line 189:  8725 Segmentation fault  (core dumped) "$RUNNER"
$COMMON_ARGS $ARGS $TMP_DIR/$TMP_FILE > /dev/null 2>> $TMP_DIR/$ERR_FILE

 ERROR
Processing failed. Capture info follows:

  Input file: ../data/hpfeed_all_packets_sample.pcap
  Output file: /tmp/fuzz-2015-08-10-7120.pcap

stderr follows:

Input file: ../data/hpfeed_all_packets_sample.pcap

Build host information:
Linux hardcore 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34 UTC
2015 x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description: Ubuntu 14.04.3 LTS
Release: 14.04
Codename: trusty

Return value:  139

Dissector bug:  0

Valgrind error count:  0




Command and args: run/tshark -nVxr

**
ERROR:../epan/wmem/wmem_allocator_strict.c:77:wmem_strict_block_check_canaries:
assertion failed: (canary[i] == WMEM_CANARY_VALUE)

So I tried to reproduce the error, but when I issued

run/tshark -nVxr /tmp/fuzz-2015-08-10-7120.pcap

no crash happened. Is this the right way to reproduce a bug the fuzzer
found? If yes, why it is not crashing?
Thanks for your suggestions.
Dario.
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] Crash during fuzzing

2015-08-10 Thread Evan Huus
The best way to reproduce fuzzer bugs is with ./tools/test-captures.sh
which sets all the same environment variables and flags as the main
fuzz script.

Since the error was in a memory canary, valgrind and/or ASAN may also
prove useful.

Evan

On Mon, Aug 10, 2015 at 3:52 PM, Dario Lombardo
 wrote:
> Hi list
> II was fuzzing a protocol, and I experienced a crash. The fuzz-test.sh gave
> me this output
>
> $ ../tools/fuzz-test.sh -b run ../data/hpfeed_all_packets_sample.pcap
> [...]
> Starting pass 130:
> ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> Starting pass 131:
> ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> Starting pass 132:
> ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> Starting pass 133:
> ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) ../tools/fuzz-test.sh:
> line 189:  8725 Segmentation fault  (core dumped) "$RUNNER" $COMMON_ARGS
> $ARGS $TMP_DIR/$TMP_FILE > /dev/null 2>> $TMP_DIR/$ERR_FILE
>
>  ERROR
> Processing failed. Capture info follows:
>
>   Input file: ../data/hpfeed_all_packets_sample.pcap
>   Output file: /tmp/fuzz-2015-08-10-7120.pcap
>
> stderr follows:
>
> Input file: ../data/hpfeed_all_packets_sample.pcap
>
> Build host information:
> Linux hardcore 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34 UTC
> 2015 x86_64 x86_64 x86_64 GNU/Linux
> Distributor ID: Ubuntu
> Description: Ubuntu 14.04.3 LTS
> Release: 14.04
> Codename: trusty
>
> Return value:  139
>
> Dissector bug:  0
>
> Valgrind error count:  0
>
>
>
>
> Command and args: run/tshark -nVxr
>
> **
> ERROR:../epan/wmem/wmem_allocator_strict.c:77:wmem_strict_block_check_canaries:
> assertion failed: (canary[i] == WMEM_CANARY_VALUE)
>
> So I tried to reproduce the error, but when I issued
>
> run/tshark -nVxr /tmp/fuzz-2015-08-10-7120.pcap
>
> no crash happened. Is this the right way to reproduce a bug the fuzzer
> found? If yes, why it is not crashing?
> Thanks for your suggestions.
> Dario.
>
> ___
> Sent via:Wireshark-dev mailing list 
> Archives:https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>  mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe


Re: [Wireshark-dev] Crash during fuzzing

2015-08-10 Thread Dario Lombardo
No crash still happening...

$ ../tools/test-captures.sh -b run ../data/hpfeeds_all_packets_sample.pcap
Testing file ../data/hpfeeds_all_packets_sample.pcap...
 - with tree... OK
 - without tree... OK
 - without tree but with a read filter... OK
$

On Mon, Aug 10, 2015 at 10:09 PM, Evan Huus  wrote:

> The best way to reproduce fuzzer bugs is with ./tools/test-captures.sh
> which sets all the same environment variables and flags as the main
> fuzz script.
>
> Since the error was in a memory canary, valgrind and/or ASAN may also
> prove useful.
>
> Evan
>
> On Mon, Aug 10, 2015 at 3:52 PM, Dario Lombardo
>  wrote:
> > Hi list
> > II was fuzzing a protocol, and I experienced a crash. The fuzz-test.sh
> gave
> > me this output
> >
> > $ ../tools/fuzz-test.sh -b run ../data/hpfeed_all_packets_sample.pcap
> > [...]
> > Starting pass 130:
> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> > Starting pass 131:
> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> > Starting pass 132:
> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
> > Starting pass 133:
> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr)
> ../tools/fuzz-test.sh:
> > line 189:  8725 Segmentation fault  (core dumped) "$RUNNER"
> $COMMON_ARGS
> > $ARGS $TMP_DIR/$TMP_FILE > /dev/null 2>> $TMP_DIR/$ERR_FILE
> >
> >  ERROR
> > Processing failed. Capture info follows:
> >
> >   Input file: ../data/hpfeed_all_packets_sample.pcap
> >   Output file: /tmp/fuzz-2015-08-10-7120.pcap
> >
> > stderr follows:
> >
> > Input file: ../data/hpfeed_all_packets_sample.pcap
> >
> > Build host information:
> > Linux hardcore 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34 UTC
> > 2015 x86_64 x86_64 x86_64 GNU/Linux
> > Distributor ID: Ubuntu
> > Description: Ubuntu 14.04.3 LTS
> > Release: 14.04
> > Codename: trusty
> >
> > Return value:  139
> >
> > Dissector bug:  0
> >
> > Valgrind error count:  0
> >
> >
> >
> >
> > Command and args: run/tshark -nVxr
> >
> > **
> >
> ERROR:../epan/wmem/wmem_allocator_strict.c:77:wmem_strict_block_check_canaries:
> > assertion failed: (canary[i] == WMEM_CANARY_VALUE)
> >
> > So I tried to reproduce the error, but when I issued
> >
> > run/tshark -nVxr /tmp/fuzz-2015-08-10-7120.pcap
> >
> > no crash happened. Is this the right way to reproduce a bug the fuzzer
> > found? If yes, why it is not crashing?
> > Thanks for your suggestions.
> > Dario.
> >
> >
> ___
> > Sent via:Wireshark-dev mailing list 
> > Archives:https://www.wireshark.org/lists/wireshark-dev
> > Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
> >  mailto:wireshark-dev-requ...@wireshark.org
> ?subject=unsubscribe
> ___
> Sent via:Wireshark-dev mailing list 
> Archives:https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>  mailto:wireshark-dev-requ...@wireshark.org
> ?subject=unsubscribe
>
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] Crash during fuzzing

2015-08-10 Thread Pascal Quantin
Hi Dario,

Le 10 août 2015 10:27 PM, "Dario Lombardo"  a
écrit :
>
> No crash still happening...
>
> $ ../tools/test-captures.sh -b run
../data/hpfeeds_all_packets_sample.pcap
> Testing file ../data/hpfeeds_all_packets_sample.pcap...
>  - with tree... OK
>  - without tree... OK
>  - without tree but with a read filter... OK
> $

You need to run it on the fuzzed capture (/tmp/fuzz-2015-08-10-7120.pcap),
not on the original one.

Pascal.

> On Mon, Aug 10, 2015 at 10:09 PM, Evan Huus  wrote:
>>
>> The best way to reproduce fuzzer bugs is with ./tools/test-captures.sh
>> which sets all the same environment variables and flags as the main
>> fuzz script.
>>
>> Since the error was in a memory canary, valgrind and/or ASAN may also
>> prove useful.
>>
>> Evan
>>
>> On Mon, Aug 10, 2015 at 3:52 PM, Dario Lombardo
>>  wrote:
>> > Hi list
>> > II was fuzzing a protocol, and I experienced a crash. The fuzz-test.sh
gave
>> > me this output
>> >
>> > $ ../tools/fuzz-test.sh -b run ../data/hpfeed_all_packets_sample.pcap
>> > [...]
>> > Starting pass 130:
>> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
>> > Starting pass 131:
>> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
>> > Starting pass 132:
>> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr) (-nr)  OK
>> > Starting pass 133:
>> > ../data/hpfeeds_all_packets_sample.pcap: (-nVxr)
../tools/fuzz-test.sh:
>> > line 189:  8725 Segmentation fault  (core dumped) "$RUNNER"
$COMMON_ARGS
>> > $ARGS $TMP_DIR/$TMP_FILE > /dev/null 2>> $TMP_DIR/$ERR_FILE
>> >
>> >  ERROR
>> > Processing failed. Capture info follows:
>> >
>> >   Input file: ../data/hpfeed_all_packets_sample.pcap
>> >   Output file: /tmp/fuzz-2015-08-10-7120.pcap
>> >
>> > stderr follows:
>> >
>> > Input file: ../data/hpfeed_all_packets_sample.pcap
>> >
>> > Build host information:
>> > Linux hardcore 3.13.0-61-generic #100-Ubuntu SMP Wed Jul 29 11:21:34
UTC
>> > 2015 x86_64 x86_64 x86_64 GNU/Linux
>> > Distributor ID: Ubuntu
>> > Description: Ubuntu 14.04.3 LTS
>> > Release: 14.04
>> > Codename: trusty
>> >
>> > Return value:  139
>> >
>> > Dissector bug:  0
>> >
>> > Valgrind error count:  0
>> >
>> >
>> >
>> >
>> > Command and args: run/tshark -nVxr
>> >
>> > **
>> >
ERROR:../epan/wmem/wmem_allocator_strict.c:77:wmem_strict_block_check_canaries:
>> > assertion failed: (canary[i] == WMEM_CANARY_VALUE)
>> >
>> > So I tried to reproduce the error, but when I issued
>> >
>> > run/tshark -nVxr /tmp/fuzz-2015-08-10-7120.pcap
>> >
>> > no crash happened. Is this the right way to reproduce a bug the fuzzer
>> > found? If yes, why it is not crashing?
>> > Thanks for your suggestions.
>> > Dario.
>> >
>> >
___
>> > Sent via:Wireshark-dev mailing list 
>> > Archives:https://www.wireshark.org/lists/wireshark-dev
>> > Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>> >  mailto:wireshark-dev-requ...@wireshark.org
?subject=unsubscribe
>>
___
>> Sent via:Wireshark-dev mailing list 
>> Archives:https://www.wireshark.org/lists/wireshark-dev
>> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>>  mailto:wireshark-dev-requ...@wireshark.org
?subject=unsubscribe
>
>
>
>
___
> Sent via:Wireshark-dev mailing list 
> Archives:https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>  mailto:wireshark-dev-requ...@wireshark.org
?subject=unsubscribe
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] Crash during fuzzing

2015-08-10 Thread Dario Lombardo
On Mon, Aug 10, 2015 at 10:39 PM, Pascal Quantin 
wrote:

> Hi Dario,
>
> Le 10 août 2015 10:27 PM, "Dario Lombardo" 
> a écrit :
> >
> > No crash still happening...
> >
> > $ ../tools/test-captures.sh -b run
> ../data/hpfeeds_all_packets_sample.pcap
> > Testing file ../data/hpfeeds_all_packets_sample.pcap...
> >  - with tree... OK
> >  - without tree... OK
> >  - without tree but with a read filter... OK
> > $
>
> You need to run it on the fuzzed capture (/tmp/fuzz-2015-08-10-7120.pcap),
> not on the original one.
>
> Pascal.
>
>
> Of course, I got it just after I sent my email. Actually the crash happens.
Thank you.
___
Sent via:Wireshark-dev mailing list 
Archives:https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
 mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Re: [Wireshark-dev] Npcap 0.03 call for test

2015-08-10 Thread Jim Young
Hello Yang,


I installed npcap-nmap-0.03-r6.exe but am still getting the 
IRQL_NOT_LESS_OR_EQUAL (a) BSoD on my Windows 8.1. system immediately when I 
start Wireshark.


I went back retested 0.03-r3, 0.03-r4 and 0.03-r5 to confirm that its only r5 
and r6 that trigger the immediate BSoD on my system.


Here's the last BSoD WinDbg output when using Npcap 0.03-r6.


-


2: kd> .symfix C:\Symbols

2: kd> .reload

Loading Kernel Symbols

...





Loading User Symbols

.

Loading unloaded module list



2: kd> !analyze -v

***

* *

*Bugcheck Analysis*

* *

***


IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: a620, memory referenced

Arg2: 0002, IRQL

Arg3: 0001, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on 
chips which support this level of status)

Arg4: f8013ff660cc, address which referenced memory


Debugging Details:

--


*** ERROR: Module load completed but symbols could not be loaded for npf.sys

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for 
packet.dll -


WRITE_ADDRESS: unable to get nt!MmNonPagedPoolStart

unable to get nt!MmSizeOfNonPagedPoolInBytes

 a620


CURRENT_IRQL:  2


FAULTING_IP:

nt!KeAcquireSpinLockRaiseToDpc+1c

f801`3ff660cc f0480fba2900lock bts qword ptr [rcx],0


DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT


BUGCHECK_STR:  AV


PROCESS_NAME:  dumpcap.exe


ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre


TRAP_FRAME:  d00035417600 -- (.trap 0xd00035417600)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0002 rbx= rcx=a620

rdx=e001230a2900 rsi= rdi=

rip=f8013ff660cc rsp=d00035417790 rbp=d00035417b80

 r8=e0011fed41a0  r9=000e r10=0801

r11=e00122517440 r12= r13=

r14= r15=

iopl=0 nv up ei pl zr na po nc

nt!KeAcquireSpinLockRaiseToDpc+0x1c:

f801`3ff660cc f0480fba2900lock bts qword ptr [rcx],0 
ds:`a620=

Resetting default scope


LAST_CONTROL_TRANSFER:  from f8013ffea7e9 to f8013ffdeca0


STACK_TEXT:

d000`354174b8 f801`3ffea7e9 : `000a `a620 
`0002 `0001 : nt!KeBugCheckEx

d000`354174c0 f801`3ffe903a : `0001 ` 
` d000`35417730 : nt!KiBugCheckDispatch+0x69

d000`35417600 f801`3ff660cc : `0001 c002` 
c002`018bf601 ` : nt!KiPageFault+0x23a

d000`35417790 f801`688d7186 : ` e001`230474c0 
`0001 d000`35417b80 : nt!KeAcquireSpinLockRaiseToDpc+0x1c

d000`354177c0 f801`688d7a24 : `1ef0 e001`230a2900 
` d000` : npf+0x3186

d000`354177f0 f801`402b377f : `0001 e001`230a2900 
e001`230a2900 `0001 : npf+0x3a24

d000`35417880 f801`402b2d22 : d000`35417a38 ` 
` ` : nt!IopXxxControlFile+0xa4f

d000`35417a20 f801`3ffea4b3 : e001`21d2c080 d000`001f0003 
0017`cb91ca98 0017` : nt!NtDeviceIoControlFile+0x56

d000`35417a90 7ffe`449c123a : 7ffe`41b65fe3 da4a`605d0f0d 
`0003 ` : nt!KiSystemServiceCopyEnd+0x13

0017`cb91ca48 7ffe`41b65fe3 : da4a`605d0f0d `0003 
` `0013 : ntdll!NtDeviceIoControlFile+0xa

0017`cb91ca50 7ffe`42151bb0 : `1ef0 7ffe`4496713a 
`0020 ` : KERNELBASE!DeviceIoControl+0x121

0017`cb91cac0 7ffe`399f3d65 : 0017`cba14960 0017`cb91cdb0 
` 0017`cb91cdb0 : 
KERNEL32!DeviceIoControlImplementation+0x80

0017`cb91cb10 0017`cba14960 : 0017`cb91cdb0 ` 
0017`cb91cdb0