New
#11
i was updated but then I have done a downgrade cause the bsod to test, that options in verifier I was already checked, but nothing worked.. in that memory.dmp that I have posted, can you see something of relevant?
i was updated but then I have done a downgrade cause the bsod to test, that options in verifier I was already checked, but nothing worked.. in that memory.dmp that I have posted, can you see something of relevant?
Unfortunately the same. You can still see this HIDCLASS.sys driver, that's why I ask you in Driver Verifier to enable all standard options and these 2 additional options (Force pending I / O requests and IRP Logging). Make sure you don't select Microsoft drivers when selecting drivers to detect
- - - Updated - - -
And yet it succeeded
So update:Code:Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\michal01\Downloads\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred SRV* Symbol search path is: SRV* Executable search path is: Windows 10 Kernel Version 17134 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 17134.1.amd64fre.rs4_release.180410-1804 Machine Name: Kernel base = 0xfffff802`aaa8d000 PsLoadedModuleList = 0xfffff802`aae3b150 Debug session time: Sat Oct 12 19:21:04.997 2019 (UTC + 2:00) System Uptime: 0 days 0:01:01.857 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ........ Loading User Symbols Loading unloaded module list ........... For analysis of this file, run !analyze -v 1: kd> !analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7E, {ffffffffc0000005, fffff802ab2a0915, ffff8a85fd68b0d8, ffff8a85fd68a920} Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff802ab2a0915, The address that the exception occurred at Arg3: ffff8a85fd68b0d8, Exception Record Address Arg4: ffff8a85fd68a920, Context Record Address Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : AV.Fault Value: Read PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: To Be Filled By O.E.M. SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1408 BIOS_DATE: 09/21/2010 BASEBOARD_MANUFACTURER: ASUSTeK Computer INC. BASEBOARD_PRODUCT: P6T BASEBOARD_VERSION: Rev 1.xx DUMP_TYPE: 1 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff802ab2a0915 BUGCHECK_P3: ffff8a85fd68b0d8 BUGCHECK_P4: ffff8a85fd68a920 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!IovpValidateDeviceObject+5 fffff802`ab2a0915 66833903 cmp word ptr [rcx],3 EXCEPTION_RECORD: ffff8a85fd68b0d8 -- (.exr 0xffff8a85fd68b0d8) ExceptionAddress: fffff802ab2a0915 (nt!IovpValidateDeviceObject+0x0000000000000005) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 00000000046dc232 Attempt to read from address 00000000046dc232 CONTEXT: ffff8a85fd68a920 -- (.cxr 0xffff8a85fd68a920) rax=ffffd6075b953200 rbx=ffffd6075b953200 rcx=00000000046dc232 rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd6075f46d370 rip=fffff802ab2a0915 rsp=ffff8a85fd68b318 rbp=fffff802aabf4b0a r8=0000000000000000 r9=0000000000000000 r10=fffff802ab2d07c0 r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140 r14=0000000000000000 r15=0000000000400000 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!IovpValidateDeviceObject+0x5: fffff802`ab2a0915 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=???? Resetting default scope CPU_COUNT: 8 CPU_MHZ: c80 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 1a CPU_STEPPING: 5 CPU_MICROCODE: 6,1a,5,0 (F,M,S,R) SIG: 19'00000000 (cache) 19'00000000 (init) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXPNP: 1 (!blackboxpnp) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 FOLLOWUP_IP: HIDCLASS!HidpCallDriver+a2 fffff807`281476a2 488bcb mov rcx,rbx BUGCHECK_STR: AV READ_ADDRESS: 00000000046dc232 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 00000000046dc232 ANALYSIS_SESSION_HOST: MICHAL ANALYSIS_SESSION_TIME: 10-13-2019 19:06:16.0560 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LOCK_ADDRESS: fffff802aae55460 -- (!locks fffff802aae55460) Resource @ nt!PiEngineLock (0xfffff802aae55460) Exclusively owned Contention Count = 14 NumberOfExclusiveWaiters = 1 Threads: ffffd6075f603040-01<*> Threads Waiting On Exclusive Access: ffffd6075f2e0700 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff802aae55460 Thread Count : 1 Thread address: 0xffffd6075f603040 Thread wait : 0xf76 LAST_CONTROL_TRANSFER: from fffff802aac4e456 to fffff802aac370a0 STACK_TEXT: ffff8a85`fd68b318 fffff802`ab29fc1e : ffffd607`5b953200 fffff802`ab2aa7be ffffd607`5b953360 ffffd607`5b953360 : nt!IovpValidateDeviceObject+0x5 ffff8a85`fd68b320 fffff802`aaca2949 : ffffd607`5b953200 00000000`00000000 ffffd607`5f420b70 ffffd607`5f46d370 : nt!IovCallDriver+0x16a ffff8a85`fd68b360 fffff802`ab2ad638 : ffffd607`5f6270c8 00000000`00400000 00000000`00000000 fffff807`2815a140 : nt!IofCallDriverSpecifyReturn+0xadeb9 ffff8a85`fd68b390 fffff802`aabf4b0a : 00000000`00000000 fffff802`ab2ab800 ffffd607`00000000 ffffd607`00000000 : nt!VerifierIofCallDriver+0x28 ffff8a85`fd68b3d0 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f420b70 ffffd607`5f9261c8 fffff802`aabee12f : nt!IopfCallDriver+0x56 ffff8a85`fd68b410 fffff802`aac727bb : ffffd607`5f4241b0 00000000`00000017 ffffd607`5f424060 ffffd607`5dffbce0 : nt!IovCallDriver+0x275 ffff8a85`fd68b450 fffff807`281476a2 : 00000000`00000004 fffff802`aab4d2d2 ffff8a85`fd686000 fffff802`ab2b0c73 : nt!IofCallDriver+0x14c9ab ffff8a85`fd68b490 fffff807`28147872 : ffffd607`5b953200 ffffd607`5b953200 00000000`00000000 fffff802`ab2b101e : HIDCLASS!HidpCallDriver+0xa2 ffff8a85`fd68b500 fffff807`28165237 : ffffd607`5f4241b0 ffffd607`5f92c4b0 ffffd607`5f92c4b0 fffff802`ab2aa7be : HIDCLASS!HidpIrpMajorDefault+0x102 ffff8a85`fd68b560 fffff807`2814456d : ffffd607`00000002 ffffd607`5f4241d0 ffffd607`5f9261c8 ffffd607`5f4241b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b ffff8a85`fd68b590 fffff802`aabf4b0a : ffffd607`5b953200 00000000`00000000 ffffd607`5f92c4b0 ffffd607`00000001 : HIDCLASS!HidpMajorHandler+0x290d ffff8a85`fd68b620 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f424060 00000000`00000001 fffff802`ab2abcf9 : nt!IopfCallDriver+0x56 ffff8a85`fd68b660 fffff802`aac727bb : ffffd607`5b953200 ffffd607`5f424060 00000000`00000000 ffffd607`5f92c4b0 : nt!IovCallDriver+0x275 ffff8a85`fd68b6a0 fffff802`ab2abc55 : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000000 ffff8a85`00000000 : nt!IofCallDriver+0x14c9ab ffff8a85`fd68b6e0 fffff802`ab2bc12a : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfIrpSendSynchronousIrp+0x109 ffff8a85`fd68b750 fffff802`ab2b0ecc : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfWmiTestStartedPdoStack+0x5a ffff8a85`fd68b7f0 fffff802`aabd30cf : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58 ffff8a85`fd68b820 fffff802`ab054852 : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffff8a85`fd68b8c9 : nt!PpvUtilTestStartedPdoStack+0x17 ffff8a85`fd68b850 fffff802`ab057bd0 : ffffd607`5f4201d0 ffff8a85`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2 ffff8a85`fd68b930 fffff802`ab0542f2 : ffffd607`5db29390 fffff802`aab215a7 ffffd607`5f603040 ffffd607`5db293e0 : nt!PipProcessDevNodeTree+0x3d0 ffff8a85`fd68bbb0 fffff802`aabd2beb : ffffd601`00000003 ffffd607`58c02810 ffffd607`5db29390 00000000`00000000 : nt!PiProcessReenumeration+0x82 ffff8a85`fd68bc00 fffff802`aab42b05 : ffffd607`5f603040 ffffd607`57d21d20 fffff802`aae53d20 ffffd607`57d21d20 : nt!PnpDeviceActionWorker+0x1eb ffff8a85`fd68bcc0 fffff802`aabbd2d7 : ffffd607`5f603040 00000000`00000080 ffffd607`57c92440 ffffd607`5f603040 : nt!ExpWorkerThread+0xf5 ffff8a85`fd68bd50 fffff802`aac3e516 : ffffa181`96542180 ffffd607`5f603040 fffff802`aabbd290 8b8b8b8b`8b8b8b8b : nt!PspSystemThreadStartup+0x47 ffff8a85`fd68bda0 00000000`00000000 : ffff8a85`fd68c000 ffff8a85`fd686000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD_SHA1_HASH_MOD_FUNC: 9070b37be5cd7e15efad35dc2f3bc04a7ae20fad THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2fd6327681b4e44441d9716e7e7e9fbddfcafa68 THREAD_SHA1_HASH_MOD: 59ab819ed470f957edb7925a655e7a53a63b05da FAULT_INSTR_CODE: 8bcb8b48 SYMBOL_STACK_INDEX: 7 SYMBOL_NAME: HIDCLASS!HidpCallDriver+a2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: HIDCLASS IMAGE_NAME: HIDCLASS.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.17134.1 STACK_COMMAND: .cxr 0xffff8a85fd68a920 ; kb BUCKET_ID_FUNC_OFFSET: a2 FAILURE_BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver PRIMARY_PROBLEM_CLASS: AV_VRF_HIDCLASS!HidpCallDriver TARGET_TIME: 2019-10-12T17:21:04.000Z OSBUILD: 17134 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-01-01 07:44:13 BUILDDATESTAMP_STR: 180410-1804 BUILDLAB_STR: rs4_release BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804 ANALYSIS_SESSION_ELAPSED_TIME: 12a0 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_vrf_hidclass!hidpcalldriver FAILURE_ID_HASH: {25e71b60-36c1-fafe-99dd-4c12cfb82b8a} Followup: MachineOwner --------- 1: kd> .load pde ========================================================================================= PDE v11.3 - Copyright 2017 Andrew Richards ========================================================================================= 1: kd> !dpx Start memory scan : 0xffff8a85fd68a118 ($csp) End memory scan : 0xffff8a85fd68c000 (Kernel Stack Base) rax : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" rsp : 0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44 r14 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47 0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44 0xffff8a85fd68a130 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5 0xffff8a85fd68a140 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a158 : 0xfffff802aac13d5f : nt!_C_specific_handler+0x9f 0xffff8a85fd68a198 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a1a8 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)" 0xffff8a85fd68a1b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)" 0xffff8a85fd68a1b8 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47 0xffff8a85fd68a1c8 : 0xfffff802aac3f94d : nt!RtlpExecuteHandlerForException+0xd 0xffff8a85fd68a1f0 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47 0xffff8a85fd68a1f8 : 0xfffff802aab4bb16 : nt!RtlDispatchException+0x416 0xffff8a85fd68a230 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a248 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a298 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47 0xffff8a85fd68a2a8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a2b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)" 0xffff8a85fd68a2c0 : 0xffffd60757fc2798 : 0xfffff802ab29fde2 : nt!IovCompleteRequest+0x2e 0xffff8a85fd68a2d0 : 0xfffff802aac13cc0 : nt!_C_specific_handler 0xffff8a85fd68a318 : 0xfffff802aaf7c529 : nt!CmpWalkOneLevel+0x529 0xffff8a85fd68a348 : 0xfffff802aab1c7cc : nt!KiSetAddressPolicy+0xc 0xffff8a85fd68a378 : 0xfffff802aab1b59d : nt!KiSwapProcess+0x6d 0xffff8a85fd68a3b8 : 0xfffff802aab1b4bd : nt!KiUnstackDetachProcess+0x13d 0xffff8a85fd68a3e8 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16 0xffff8a85fd68a468 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)" 0xffff8a85fd68a5d0 : 0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)" 0xffff8a85fd68a5e0 : 0xffffe78186cf4696 : !du "{24daeb80-9823-4ff8-92a6-3a4c6189f82c}\0002" 0xffff8a85fd68a608 : 0xfffff802aad77543 : nt!ExAllocatePoolWithTag+0x133 0xffff8a85fd68a6a0 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)" 0xffff8a85fd68a6a8 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead 0xffff8a85fd68a6d0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)" 0xffff8a85fd68a6d8 : 0xfffff802aaf83800 : nt!CmpCallCallBacksEx+0x250 0xffff8a85fd68a6e0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)" 0xffff8a85fd68a710 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead 0xffff8a85fd68a728 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)" 0xffff8a85fd68a760 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)" 0xffff8a85fd68a7c8 : 0xfffff802aabf4ab4 : nt!IopfCallDriver 0xffff8a85fd68a7d0 : 0xfffff80728165258 : HIDCLASS!HidpIrpMajorSystemControl+0x7c 0xffff8a85fd68a7d8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a7e0 : 0xfffff802aaecf33c : "nt!Ports <PERF> (nt+0x44233c)" 0xffff8a85fd68a7e8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a7f0 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)" 0xffff8a85fd68a7f8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a800 : 0xfffff802aae9b880 : "nt!Ports <PERF> (nt+0x40e880)" 0xffff8a85fd68a808 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a810 : 0xfffff802aaed03ec : "nt!Ports <PERF> (nt+0x4433ec)" 0xffff8a85fd68a818 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a820 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)" 0xffff8a85fd68a828 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a830 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)" 0xffff8a85fd68a838 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a848 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)" 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)" 0xffff8a85fd68a858 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)" 0xffff8a85fd68a860 : 0xfffff807281613d8 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213d8)" 0xffff8a85fd68a868 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)" 0xffff8a85fd68a870 : 0xfffff80728162014 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x22014)" 0xffff8a85fd68a878 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)" 0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)" 0xffff8a85fd68a888 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)" 0xffff8a85fd68a898 : 0xfffff802ab2a0916 : nt!IovpValidateDeviceObject+0x6 0xffff8a85fd68a8a8 : 0xfffff802aab4d9d6 : nt!KdTrap+0x22 0xffff8a85fd68a8c0 : 0xfffff8072815a100 : HIDCLASS!HidFdoWmiGuidList 0xffff8a85fd68a8d8 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a8e8 : 0xfffff802aab4d613 : nt!KiDispatchException+0x1f3 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68a938 : 0xfffff802aaf88942 : nt!ObpReferenceObjectByHandleWithTag+0x272 0xffff8a85fd68a968 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b 0xffff8a85fd68a9b8 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a 0xffff8a85fd68a9c0 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56 0xffff8a85fd68a9e8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList 0xffff8a85fd68a9f8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68aa00 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68aa18 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5 0xffff8a85fd68aa98 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)" 0xffff8a85fd68aad8 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap 0xffff8a85fd68abe0 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68ac30 : 0xffffd607582b2c98 : 0xfffff802ab2b28b4 : nt!VfFreePoolNotification+0x74 0xffff8a85fd68ac38 : 0xfffff802aae7e000 : "nt!Ports <PERF> (nt+0x3f1000)" 0xffff8a85fd68ac40 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)" 0xffff8a85fd68ac68 : 0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58 0xffff8a85fd68acb8 : 0xffffd6075f425000 : !da "HID00000009" 0xffff8a85fd68acc0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68ace8 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b 0xffff8a85fd68ad00 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad08 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad10 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad18 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14 0xffff8a85fd68ad38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b 0xffff8a85fd68ad50 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad58 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad60 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ad68 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14 0xffff8a85fd68ada0 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ada8 : 0xfffff802aab4e00c : nt!RtlGetExtendedContextLength+0x34 0xffff8a85fd68adb8 : 0xfffff802aaaac8a8 : nt!MiInPagePageTable+0x178 0xffff8a85fd68ae38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b 0xffff8a85fd68ae48 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)" 0xffff8a85fd68ae80 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)" 0xffff8a85fd68aea8 : 0xfffff802aaae8c76 : nt!MiUnlockWorkingSetShared+0x56 0xffff8a85fd68af48 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)" 0xffff8a85fd68af70 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68af78 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68af98 : 0xfffff802aac47d42 : nt!KiExceptionDispatch+0xc2 0xffff8a85fd68afb8 : 0xfffff802aab19c61 : nt!ExFreeToNPagedLookasideList+0x15 0xffff8a85fd68b0b8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b0c0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b0e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5 0xffff8a85fd68b178 : 0xfffff802aac448bf : nt!KiPageFault+0x3ff 0xffff8a85fd68b180 : 0x0000000000400000 : Trap @ ffff8a85fd68b180 0xffff8a85fd68b188 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b190 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b1d8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList 0xffff8a85fd68b208 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap 0xffff8a85fd68b258 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b 0xffff8a85fd68b2b0 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList 0xffff8a85fd68b2b8 : 0xfffff802aaa9abf1 : nt!ExAllocateFromNPagedLookasideList+0x11 0xffff8a85fd68b2c8 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2 0xffff8a85fd68b2d8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56 0xffff8a85fd68b2e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5 0xffff8a85fd68b300 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a 0xffff8a85fd68b328 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506 0xffff8a85fd68b388 : 0xfffff802ab2ad638 : nt!VerifierIofCallDriver+0x28 0xffff8a85fd68b3a8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b3b0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids 0xffff8a85fd68b3c8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56 0xffff8a85fd68b3d8 : 0xfffff802ab2ab800 : nt!VfBeforeCallDriver+0x13c 0xffff8a85fd68b3f8 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2 0xffff8a85fd68b408 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275 0xffff8a85fd68b428 : 0xfffff802aabee12f : nt!ViAvlReleaseTableLockFromDpcLevel+0x2b 0xffff8a85fd68b478 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31 0xffff8a85fd68b488 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2 0xffff8a85fd68b498 : 0xfffff802aab4d2d2 : nt!RtlWalkFrameChain+0x72 0xffff8a85fd68b4a8 : 0xfffff802ab2b0c73 : nt!VfMajorBuildIrpLogEntry+0x33 0xffff8a85fd68b4c8 : 0xfffff802aab4d3c2 : nt!RtlCaptureStackBackTrace+0x42 0xffff8a85fd68b4d8 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31 0xffff8a85fd68b4e8 : 0xffffd6075f425000 : !da "HID00000009" 0xffff8a85fd68b4f8 : 0xfffff80728147872 : HIDCLASS!HidpIrpMajorDefault+0x102 0xffff8a85fd68b518 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2 0xffff8a85fd68b538 : 0xffffd6075f425000 : !da "HID00000009" 0xffff8a85fd68b558 : 0xfffff80728165237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b 0xffff8a85fd68b578 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506 0xffff8a85fd68b5d8 : 0xfffff802ab2ba5d3 : nt!VfPacketCreateAndLock+0xa7 0xffff8a85fd68b618 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56 0xffff8a85fd68b648 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109 0xffff8a85fd68b658 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275 0xffff8a85fd68b678 : 0xfffff802ab2abcf9 : nt!VfIrpWatermark+0x2d 0xffff8a85fd68b6d8 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109 0xffff8a85fd68b748 : 0xfffff802ab2bc12a : nt!VfWmiTestStartedPdoStack+0x5a 0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58 0xffff8a85fd68b818 : 0xfffff802aabd30cf : nt!PpvUtilTestStartedPdoStack+0x17 0xffff8a85fd68b848 : 0xfffff802ab054852 : nt!PipProcessStartPhase3+0xc2 0xffff8a85fd68b888 : 0xfffff802aabd3034 : nt!PpMarkDeviceStackExtensionFlag+0x54 0xffff8a85fd68b898 : 0xfffff802aae555e0 : nt!PnpRegistryDeviceResource+0x60 0xffff8a85fd68b8a8 : 0xfffff802aabd3634 : nt!PipSetDevNodeState+0xe0 0xffff8a85fd68b8b8 : 0xfffff802ab054430 : nt!IopDoDeferredSetInterfaceState+0x64 0xffff8a85fd68b8c8 : 0xfffff802aabd32b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b 0xffff8a85fd68b8d0 : 0xffffe7818188b7c0 : 0xfffff802aae54a30 : nt!PiPnpRtlActiveOperations 0xffff8a85fd68b8e8 : 0xfffff802ab054372 : nt!PipProcessStartPhase2+0x56 0xffff8a85fd68b928 : 0xfffff802ab057bd0 : nt!PipProcessDevNodeTree+0x3d0 0xffff8a85fd68b958 : 0xfffff802aac3e421 : nt!SwapContext+0x411 0xffff8a85fd68b9b8 : 0xffffd6075f9ed744 : !du "\WINDOWS\SYSTEM32\WINTRUST.DLL" 0xffff8a85fd68ba20 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock 0xffff8a85fd68ba28 : 0xfffff802aab1d82f : nt!ExpAcquireResourceSharedLite+0x19f 0xffff8a85fd68ba68 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60 0xffff8a85fd68baa0 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock 0xffff8a85fd68baa8 : 0xfffff802aab1feb8 : nt!ExReleaseResourceLite+0xc8 0xffff8a85fd68bac8 : 0xfffff802aab1d5d0 : nt!ExAcquireResourceSharedLite+0x40 0xffff8a85fd68bad8 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock 0xffff8a85fd68bae8 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60 0xffff8a85fd68bb08 : 0xfffff802aaff4391 : nt!PpDevNodeUnlockTree+0x19 0xffff8a85fd68bb28 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60 0xffff8a85fd68bb38 : 0xfffff802ab053cd0 : nt!PipForDeviceNodeSubtree+0x30 0xffff8a85fd68bb60 : 0xfffff802ab08d410 : nt!PiMarkDeviceTreeForReenumerationWorker 0xffff8a85fd68bb78 : 0xfffff802ab05425d : nt!PiMarkDeviceTreeForReenumeration+0x3d 0xffff8a85fd68bba8 : 0xfffff802ab0542f2 : nt!PiProcessReenumeration+0x82 0xffff8a85fd68bbb8 : 0xfffff802aab215a7 : nt!ExAcquirePushLockExclusiveEx+0xe7 0xffff8a85fd68bbf8 : 0xfffff802aabd2beb : nt!PnpDeviceActionWorker+0x1eb 0xffff8a85fd68bc48 : 0xfffff802aab42ea6 : nt!KeRemovePriQueue+0x186 0xffff8a85fd68bc80 : 0xfffff802aaef5240 : nt!ExNode0 0xffff8a85fd68bc90 : 0xfffff802aaef5240 : nt!ExNode0 0xffff8a85fd68bcb0 : 0xfffff802aabd2a00 : nt!PnpDeviceActionWorker 0xffff8a85fd68bcb8 : 0xfffff802aab42b05 : nt!ExpWorkerThread+0xf5 0xffff8a85fd68bcd0 : 0xfffff802aae53d20 : nt!PnpDeviceEnumerationWorkItem 0xffff8a85fd68bcf8 : 0xffffd60757c740e0 : 0xffffd60757c84260 : 0xfffff802aae5bf40 : nt!MiSystemPartition 0xffff8a85fd68bd18 : 0xfffff802aaf426f7 : nt!PspDisablePrimaryTokenExchange+0x27 0xffff8a85fd68bd40 : 0xfffff802aab42a10 : nt!ExpWorkerThread 0xffff8a85fd68bd48 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47 0xffff8a85fd68bd98 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16 0xffff8a85fd68bdb0 : 0xfffff802aabbd290 : nt!PspSystemThreadStartup 1: kd> knL # Child-SP RetAddr Call Site 00 ffff8a85`fd68a118 fffff802`aac4e456 nt!KeBugCheckEx 01 ffff8a85`fd68a120 fffff802`aac13d5f nt!PspSystemThreadStartup$filt$0+0x44 02 ffff8a85`fd68a160 fffff802`aac3f94d nt!_C_specific_handler+0x9f 03 ffff8a85`fd68a1d0 fffff802`aab4bb16 nt!RtlpExecuteHandlerForException+0xd 04 ffff8a85`fd68a200 fffff802`aab4d613 nt!RtlDispatchException+0x416 05 ffff8a85`fd68a8f0 fffff802`aac47d42 nt!KiDispatchException+0x1f3 06 ffff8a85`fd68afa0 fffff802`aac448bf nt!KiExceptionDispatch+0xc2 07 ffff8a85`fd68b180 fffff802`ab2a0915 nt!KiPageFault+0x3ff 08 ffff8a85`fd68b318 fffff802`ab29fc1e nt!IovpValidateDeviceObject+0x5 09 ffff8a85`fd68b320 fffff802`aaca2949 nt!IovCallDriver+0x16a 0a ffff8a85`fd68b360 fffff802`ab2ad638 nt!IofCallDriverSpecifyReturn+0xadeb9 0b ffff8a85`fd68b390 fffff802`aabf4b0a nt!VerifierIofCallDriver+0x28 0c ffff8a85`fd68b3d0 fffff802`ab29fd29 nt!IopfCallDriver+0x56 0d ffff8a85`fd68b410 fffff802`aac727bb nt!IovCallDriver+0x275 0e ffff8a85`fd68b450 fffff807`281476a2 nt!IofCallDriver+0x14c9ab 0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2 10 ffff8a85`fd68b500 fffff807`28165237 HIDCLASS!HidpIrpMajorDefault+0x102 11 ffff8a85`fd68b560 fffff807`2814456d HIDCLASS!HidpIrpMajorSystemControl+0x5b 12 ffff8a85`fd68b590 fffff802`aabf4b0a HIDCLASS!HidpMajorHandler+0x290d 13 ffff8a85`fd68b620 fffff802`ab29fd29 nt!IopfCallDriver+0x56 14 ffff8a85`fd68b660 fffff802`aac727bb nt!IovCallDriver+0x275 15 ffff8a85`fd68b6a0 fffff802`ab2abc55 nt!IofCallDriver+0x14c9ab 16 ffff8a85`fd68b6e0 fffff802`ab2bc12a nt!VfIrpSendSynchronousIrp+0x109 17 ffff8a85`fd68b750 fffff802`ab2b0ecc nt!VfWmiTestStartedPdoStack+0x5a 18 ffff8a85`fd68b7f0 fffff802`aabd30cf nt!VfMajorTestStartedPdoStack+0x58 19 ffff8a85`fd68b820 fffff802`ab054852 nt!PpvUtilTestStartedPdoStack+0x17 1a ffff8a85`fd68b850 fffff802`ab057bd0 nt!PipProcessStartPhase3+0xc2 1b ffff8a85`fd68b930 fffff802`ab0542f2 nt!PipProcessDevNodeTree+0x3d0 1c ffff8a85`fd68bbb0 fffff802`aabd2beb nt!PiProcessReenumeration+0x82 1d ffff8a85`fd68bc00 fffff802`aab42b05 nt!PnpDeviceActionWorker+0x1eb 1e ffff8a85`fd68bcc0 fffff802`aabbd2d7 nt!ExpWorkerThread+0xf5 1f ffff8a85`fd68bd50 fffff802`aac3e516 nt!PspSystemThreadStartup+0x47 20 ffff8a85`fd68bda0 00000000`00000000 nt!KiStartSystemThread+0x16 1: kd> .frame /r 0f 0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2 rax=ffffd6075b953200 rbx=ffffd6075f4241b0 rcx=00000000046dc232 rdx=0000000000000000 rsi=ffffd6075f424060 rdi=ffffd6075b953200 rip=fffff807281476a2 rsp=ffff8a85fd68b490 rbp=0000000000000017 r8=0000000000000000 r9=0000000000000000 r10=fffff802ab2d07c0 r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282 HIDCLASS!HidpCallDriver+0xa2: fffff807`281476a2 488bcb mov rcx,rbx 1: kd> !irp ffffd6075b953200 Irp is active with 3 stacks 3 is current (= 0xffffd6075b953360) No Mdl: No System Buffer: Thread 00000000: Irp stack trace. cmd flg cl Device File Completion-Context [N/A(0), N/A(0)] 0 10 00000000 00000000 00000000-00000000 Args: 00000000 00000000 00000000 00000000 [IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)] 0 e0 ffffd6075f420b70 00000000 fffff802ab2ab300-ffffd6075b953360 Success Error Cancel \Driver\LGBusEnum nt!IovpInternalCompletionTrap Args: ffffd6075f420b70 00000000 00000000 00000000 >[IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)] 0 e0 ffffd6075f424060 00000000 fffff802ab2abf40-ffff8a85fd68b710 Success Error Cancel \Driver\LGVirHid nt!ViIrpSynchronousCompletionRoutine Args: ffffd6075f420b70 00000000 00000000 00000000 Irp Extension present at 0xffffd6075b9533a8: 1: kd> !devobj ffffd6075f420b70 Device object (ffffd6075f420b70) is for: 0000008c \Driver\LGBusEnum DriverObject ffffd6075ae6e790 Current Irp 00000000 RefCount 0 Type 0000002a Flags 00003040 SecurityDescriptor ffffe781870c6f20 DevExt ffffd6075f420cc0 DevObjExt ffffd6075f420de0 DevNode ffffd6075f4201d0 ExtensionFlags (0xc1000000) DOE_BOTTOM_OF_FDO_STACK, DOE_DESIGNATED_FDO Unknown flags 0x01000000 Characteristics (0x00000080) FILE_AUTOGENERATED_DEVICE_NAME AttachedDevice (Upper) ffffd6075f424060 \Driver\LGVirHid Device queue is not busy. 1: kd> !devnode ffffd6075f4201d0 DevNode 0xffffd6075f4201d0 for PDO 0xffffd6075f420b70 Parent 0xffffd60758c02810 Sibling 0000000000 Child 0000000000 InstancePath is "LogiDevice\VID_046D&PID_C232\1&79f5d87&0&01" ServiceName is "LGVirHid" State = DeviceNodeStartPostWork (0x307) Previous State = DeviceNodeStartCompletion (0x306) StateHistory[05] = DeviceNodeStartCompletion (0x306) StateHistory[04] = DeviceNodeStartPending (0x305) StateHistory[03] = DeviceNodeResourcesAssigned (0x304) StateHistory[02] = DeviceNodeDriversAdded (0x303) StateHistory[01] = DeviceNodeInitialized (0x302) StateHistory[00] = DeviceNodeUninitialized (0x301) StateHistory[19] = Unknown State (0x0) StateHistory[18] = Unknown State (0x0) StateHistory[17] = Unknown State (0x0) StateHistory[16] = Unknown State (0x0) StateHistory[15] = Unknown State (0x0) StateHistory[14] = Unknown State (0x0) StateHistory[13] = Unknown State (0x0) StateHistory[12] = Unknown State (0x0) StateHistory[11] = Unknown State (0x0) StateHistory[10] = Unknown State (0x0) StateHistory[09] = Unknown State (0x0) StateHistory[08] = Unknown State (0x0) StateHistory[07] = Unknown State (0x0) StateHistory[06] = Unknown State (0x0) Flags (0x6c000138) DNF_REENUMERATE, DNF_ENUMERATED, DNF_IDS_QUERIED, DNF_NO_RESOURCE_REQUIRED, DNF_NO_LOWER_DEVICE_FILTERS, DNF_NO_LOWER_CLASS_FILTERS, DNF_NO_UPPER_DEVICE_FILTERS, DNF_NO_UPPER_CLASS_FILTERS CapabilityFlags (0x00000290) Removable, SilentInstall, SurpriseRemovalOK 1: kd> lmvm LGBusEnum Browse full module list start end module name fffff807`261a0000 fffff807`261a4e00 LGBusEnum (no symbols) Loaded symbol image file: LGBusEnum.sys Image path: \SystemRoot\system32\drivers\LGBusEnum.sys Image name: LGBusEnum.sys Browse all global symbols functions data Timestamp: Mon Jun 13 11:47:08 2016 (575EFFAC) CheckSum: 00012B72 ImageSize: 00004E00 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables: 1: kd> lmvm LGVirHid Browse full module list start end module name fffff807`27700000 fffff807`27702500 LGVirHid (no symbols) Loaded symbol image file: LGVirHid.sys Image path: \SystemRoot\system32\drivers\LGVirHid.sys Image name: LGVirHid.sys Browse all global symbols functions data Timestamp: Mon Jun 13 11:47:03 2016 (575EFFA7) CheckSum: 0000BE50 ImageSize: 00002500 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
Logitech SetPoint (check updates in program or visit SetPoint – Logitech Support + Download)
Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.
thanks master, this is the dmp without microsoft drivers...strange; it still gives me that hidclass, for i can see in "whocrashed"
- for logitech; i have only installed logitech gaming software...for the headphones..checked now and the firmware and version of the software seem be all updated (64bit)
One of the reasons I requested a kernel memory dump is this, to see which options were checked in driver verifier.Code:Verify Flags Level 0x00000610 STANDARD FLAGS: [X] (0x00000000) Automatic Checks [ ] (0x00000001) Special pool [ ] (0x00000002) Force IRQL checking [ ] (0x00000008) Pool tracking [X] (0x00000010) I/O verification [ ] (0x00000020) Deadlock detection [ ] (0x00000080) DMA checking [ ] (0x00000100) Security checks [ ] (0x00000800) Miscellaneous checks [ ] (0x00020000) DDI compliance checking ADDITIONAL FLAGS: [ ] (0x00000004) Randomized low resources simulation [X] (0x00000200) Force pending I/O requests [X] (0x00000400) IRP logging [ ] (0x00002000) Invariant MDL checking for stack [ ] (0x00004000) Invariant MDL checking for driver [ ] (0x00008000) Power framework delay fuzzing [ ] (0x00010000) Port/miniport interface checking [ ] (0x00040000) Systematic low resources simulation [ ] (0x00080000) DDI compliance checking (additional) [ ] (0x00200000) NDIS/WIFI verification [ ] (0x00800000) Kernel synchronization delay fuzzing [ ] (0x01000000) VM switch verification [ ] (0x02000000) Code integrity checks [X] Indicates flag is enabled Summary of All Verifier Statistics RaiseIrqls 0x4 AcquireSpinLocks 0xfd8 Synch Executions 0x0 Trims 0x0 Pool Allocations Attempted 0x67d1a Pool Allocations Succeeded 0x67d1a Pool Allocations Succeeded SpecialPool 0x11 Pool Allocations With NO TAG 0x98 Pool Allocations Failed 0x0 Current paged pool allocations 0x0 for 00000000 bytes Peak paged pool allocations 0x0 for 00000000 bytes Current nonpaged pool allocations 0x0 for 00000000 bytes Peak nonpaged pool allocations 0x0 for 00000000 bytes
Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.
dmp with logitech updated, always the same hidclass damned
update:
Thank you a lot Mr.
i have updated at the last version the G-hub..but then the bsod still occurs, the only way is been remove totaly the g-hub software+syss, i hope that with future versions Logitech can fix the problem, but i have read around that this kind of problem still there was on the previous version of windows...bah ! :)