BSOD hidclass.syss with verifier enabled

Page 2 of 2 FirstFirst 12

  1. Posts : 8
    win10
    Thread Starter
       #11

    i was updated but then I have done a downgrade cause the bsod to test, that options in verifier I was already checked, but nothing worked.. in that memory.dmp that I have posted, can you see something of relevant?
      My Computer


  2. Posts : 1,480
    Windows 8.1 Enterprise x64
       #12

    Unfortunately the same. You can still see this HIDCLASS.sys driver, that's why I ask you in Driver Verifier to enable all standard options and these 2 additional options (Force pending I / O requests and IRP Logging). Make sure you don't select Microsoft drivers when selecting drivers to detect

    - - - Updated - - -

    And yet it succeeded
    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\michal01\Downloads\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff802`aaa8d000 PsLoadedModuleList = 0xfffff802`aae3b150
    Debug session time: Sat Oct 12 19:21:04.997 2019 (UTC + 2:00)
    System Uptime: 0 days 0:01:01.857
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ........
    Loading User Symbols
    
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    1: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7E, {ffffffffc0000005, fffff802ab2a0915, ffff8a85fd68b0d8, ffff8a85fd68a920}
    
    Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 )
    
    Followup:     MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff802ab2a0915, The address that the exception occurred at
    Arg3: ffff8a85fd68b0d8, Exception Record Address
    Arg4: ffff8a85fd68a920, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : AV.Fault
        Value: Read
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  To Be Filled By O.E.M.
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1408   
    
    BIOS_DATE:  09/21/2010
    
    BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.
    
    BASEBOARD_PRODUCT:  P6T
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: ffffffffc0000005
    
    BUGCHECK_P2: fffff802ab2a0915
    
    BUGCHECK_P3: ffff8a85fd68b0d8
    
    BUGCHECK_P4: ffff8a85fd68a920
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IovpValidateDeviceObject+5
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3
    
    EXCEPTION_RECORD:  ffff8a85fd68b0d8 -- (.exr 0xffff8a85fd68b0d8)
    ExceptionAddress: fffff802ab2a0915 (nt!IovpValidateDeviceObject+0x0000000000000005)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 00000000046dc232
    Attempt to read from address 00000000046dc232
    
    CONTEXT:  ffff8a85fd68a920 -- (.cxr 0xffff8a85fd68a920)
    rax=ffffd6075b953200 rbx=ffffd6075b953200 rcx=00000000046dc232
    rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd6075f46d370
    rip=fffff802ab2a0915 rsp=ffff8a85fd68b318 rbp=fffff802aabf4b0a
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000400000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IovpValidateDeviceObject+0x5:
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: c80
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 1a
    
    CPU_STEPPING: 5
    
    CPU_MICROCODE: 6,1a,5,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    FOLLOWUP_IP: 
    HIDCLASS!HidpCallDriver+a2
    fffff807`281476a2 488bcb          mov     rcx,rbx
    
    BUGCHECK_STR:  AV
    
    READ_ADDRESS:  00000000046dc232 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE_STR:  c0000005
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  00000000046dc232
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  10-13-2019 19:06:16.0560
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    LOCK_ADDRESS:  fffff802aae55460 -- (!locks fffff802aae55460)
    
    Resource @ nt!PiEngineLock (0xfffff802aae55460)    Exclusively owned
        Contention Count = 14
        NumberOfExclusiveWaiters = 1
         Threads: ffffd6075f603040-01<*> 
    
         Threads Waiting On Exclusive Access:
                  ffffd6075f2e0700       
    1 total locks
    
    PNP_TRIAGE_DATA: 
    	Lock address  : 0xfffff802aae55460
    	Thread Count  : 1
    	Thread address: 0xffffd6075f603040
    	Thread wait   : 0xf76
    
    LAST_CONTROL_TRANSFER:  from fffff802aac4e456 to fffff802aac370a0
    
    STACK_TEXT:  
    ffff8a85`fd68b318 fffff802`ab29fc1e : ffffd607`5b953200 fffff802`ab2aa7be ffffd607`5b953360 ffffd607`5b953360 : nt!IovpValidateDeviceObject+0x5
    ffff8a85`fd68b320 fffff802`aaca2949 : ffffd607`5b953200 00000000`00000000 ffffd607`5f420b70 ffffd607`5f46d370 : nt!IovCallDriver+0x16a
    ffff8a85`fd68b360 fffff802`ab2ad638 : ffffd607`5f6270c8 00000000`00400000 00000000`00000000 fffff807`2815a140 : nt!IofCallDriverSpecifyReturn+0xadeb9
    ffff8a85`fd68b390 fffff802`aabf4b0a : 00000000`00000000 fffff802`ab2ab800 ffffd607`00000000 ffffd607`00000000 : nt!VerifierIofCallDriver+0x28
    ffff8a85`fd68b3d0 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f420b70 ffffd607`5f9261c8 fffff802`aabee12f : nt!IopfCallDriver+0x56
    ffff8a85`fd68b410 fffff802`aac727bb : ffffd607`5f4241b0 00000000`00000017 ffffd607`5f424060 ffffd607`5dffbce0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b450 fffff807`281476a2 : 00000000`00000004 fffff802`aab4d2d2 ffff8a85`fd686000 fffff802`ab2b0c73 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b490 fffff807`28147872 : ffffd607`5b953200 ffffd607`5b953200 00000000`00000000 fffff802`ab2b101e : HIDCLASS!HidpCallDriver+0xa2
    ffff8a85`fd68b500 fffff807`28165237 : ffffd607`5f4241b0 ffffd607`5f92c4b0 ffffd607`5f92c4b0 fffff802`ab2aa7be : HIDCLASS!HidpIrpMajorDefault+0x102
    ffff8a85`fd68b560 fffff807`2814456d : ffffd607`00000002 ffffd607`5f4241d0 ffffd607`5f9261c8 ffffd607`5f4241b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    ffff8a85`fd68b590 fffff802`aabf4b0a : ffffd607`5b953200 00000000`00000000 ffffd607`5f92c4b0 ffffd607`00000001 : HIDCLASS!HidpMajorHandler+0x290d
    ffff8a85`fd68b620 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f424060 00000000`00000001 fffff802`ab2abcf9 : nt!IopfCallDriver+0x56
    ffff8a85`fd68b660 fffff802`aac727bb : ffffd607`5b953200 ffffd607`5f424060 00000000`00000000 ffffd607`5f92c4b0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b6a0 fffff802`ab2abc55 : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000000 ffff8a85`00000000 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b6e0 fffff802`ab2bc12a : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfIrpSendSynchronousIrp+0x109
    ffff8a85`fd68b750 fffff802`ab2b0ecc : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfWmiTestStartedPdoStack+0x5a
    ffff8a85`fd68b7f0 fffff802`aabd30cf : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58
    ffff8a85`fd68b820 fffff802`ab054852 : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffff8a85`fd68b8c9 : nt!PpvUtilTestStartedPdoStack+0x17
    ffff8a85`fd68b850 fffff802`ab057bd0 : ffffd607`5f4201d0 ffff8a85`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2
    ffff8a85`fd68b930 fffff802`ab0542f2 : ffffd607`5db29390 fffff802`aab215a7 ffffd607`5f603040 ffffd607`5db293e0 : nt!PipProcessDevNodeTree+0x3d0
    ffff8a85`fd68bbb0 fffff802`aabd2beb : ffffd601`00000003 ffffd607`58c02810 ffffd607`5db29390 00000000`00000000 : nt!PiProcessReenumeration+0x82
    ffff8a85`fd68bc00 fffff802`aab42b05 : ffffd607`5f603040 ffffd607`57d21d20 fffff802`aae53d20 ffffd607`57d21d20 : nt!PnpDeviceActionWorker+0x1eb
    ffff8a85`fd68bcc0 fffff802`aabbd2d7 : ffffd607`5f603040 00000000`00000080 ffffd607`57c92440 ffffd607`5f603040 : nt!ExpWorkerThread+0xf5
    ffff8a85`fd68bd50 fffff802`aac3e516 : ffffa181`96542180 ffffd607`5f603040 fffff802`aabbd290 8b8b8b8b`8b8b8b8b : nt!PspSystemThreadStartup+0x47
    ffff8a85`fd68bda0 00000000`00000000 : ffff8a85`fd68c000 ffff8a85`fd686000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  9070b37be5cd7e15efad35dc2f3bc04a7ae20fad
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2fd6327681b4e44441d9716e7e7e9fbddfcafa68
    
    THREAD_SHA1_HASH_MOD:  59ab819ed470f957edb7925a655e7a53a63b05da
    
    FAULT_INSTR_CODE:  8bcb8b48
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  HIDCLASS!HidpCallDriver+a2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: HIDCLASS
    
    IMAGE_NAME:  HIDCLASS.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.1
    
    STACK_COMMAND:  .cxr 0xffff8a85fd68a920 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  a2
    
    FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver
    
    TARGET_TIME:  2019-10-12T17:21:04.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  12a0
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver
    
    FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}
    
    Followup:     MachineOwner
    ---------
    
    1: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    1: kd> !dpx
    Start memory scan  : 0xffff8a85fd68a118 ($csp)
    End memory scan    : 0xffff8a85fd68c000 (Kernel Stack Base)
    
                   rax : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
                   rsp : 0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
                   r14 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
    0xffff8a85fd68a130 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68a140 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a158 : 0xfffff802aac13d5f : nt!_C_specific_handler+0x9f
    0xffff8a85fd68a198 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a1a8 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b8 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1c8 : 0xfffff802aac3f94d : nt!RtlpExecuteHandlerForException+0xd
    0xffff8a85fd68a1f0 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1f8 : 0xfffff802aab4bb16 : nt!RtlDispatchException+0x416
    0xffff8a85fd68a230 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a248 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a298 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a2a8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a2b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a2c0 : 0xffffd60757fc2798 : 0xfffff802ab29fde2 : nt!IovCompleteRequest+0x2e
    0xffff8a85fd68a2d0 : 0xfffff802aac13cc0 : nt!_C_specific_handler
    0xffff8a85fd68a318 : 0xfffff802aaf7c529 : nt!CmpWalkOneLevel+0x529
    0xffff8a85fd68a348 : 0xfffff802aab1c7cc : nt!KiSetAddressPolicy+0xc
    0xffff8a85fd68a378 : 0xfffff802aab1b59d : nt!KiSwapProcess+0x6d
    0xffff8a85fd68a3b8 : 0xfffff802aab1b4bd : nt!KiUnstackDetachProcess+0x13d
    0xffff8a85fd68a3e8 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68a468 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68a5d0 : 0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a5e0 : 0xffffe78186cf4696 :  !du "{24daeb80-9823-4ff8-92a6-3a4c6189f82c}\0002"
    0xffff8a85fd68a608 : 0xfffff802aad77543 : nt!ExAllocatePoolWithTag+0x133
    0xffff8a85fd68a6a0 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a6a8 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a6d0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a6d8 : 0xfffff802aaf83800 : nt!CmpCallCallBacksEx+0x250
    0xffff8a85fd68a6e0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a710 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a728 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a760 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a7c8 : 0xfffff802aabf4ab4 : nt!IopfCallDriver
    0xffff8a85fd68a7d0 : 0xfffff80728165258 : HIDCLASS!HidpIrpMajorSystemControl+0x7c
    0xffff8a85fd68a7d8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7e0 : 0xfffff802aaecf33c : "nt!Ports <PERF> (nt+0x44233c)"
    0xffff8a85fd68a7e8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7f0 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a7f8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a800 : 0xfffff802aae9b880 : "nt!Ports <PERF> (nt+0x40e880)"
    0xffff8a85fd68a808 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a810 : 0xfffff802aaed03ec : "nt!Ports <PERF> (nt+0x4433ec)"
    0xffff8a85fd68a818 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a820 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a828 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a830 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a838 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a848 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a858 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a860 : 0xfffff807281613d8 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213d8)"
    0xffff8a85fd68a868 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a870 : 0xfffff80728162014 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x22014)"
    0xffff8a85fd68a878 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a888 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a898 : 0xfffff802ab2a0916 : nt!IovpValidateDeviceObject+0x6
    0xffff8a85fd68a8a8 : 0xfffff802aab4d9d6 : nt!KdTrap+0x22
    0xffff8a85fd68a8c0 : 0xfffff8072815a100 : HIDCLASS!HidFdoWmiGuidList
    0xffff8a85fd68a8d8 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a8e8 : 0xfffff802aab4d613 : nt!KiDispatchException+0x1f3
    0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a938 : 0xfffff802aaf88942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffff8a85fd68a968 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68a9b8 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68a9c0 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68a9e8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68a9f8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa00 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa18 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68aa98 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68aad8 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68abe0 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac30 : 0xffffd607582b2c98 : 0xfffff802ab2b28b4 : nt!VfFreePoolNotification+0x74
    0xffff8a85fd68ac38 : 0xfffff802aae7e000 : "nt!Ports <PERF> (nt+0x3f1000)"
    0xffff8a85fd68ac40 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac68 : 0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68acb8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68acc0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68ace8 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad00 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad08 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad10 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad18 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ad38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad50 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad58 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad60 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad68 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ada0 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ada8 : 0xfffff802aab4e00c : nt!RtlGetExtendedContextLength+0x34
    0xffff8a85fd68adb8 : 0xfffff802aaaac8a8 : nt!MiInPagePageTable+0x178
    0xffff8a85fd68ae38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ae48 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ae80 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68aea8 : 0xfffff802aaae8c76 : nt!MiUnlockWorkingSetShared+0x56
    0xffff8a85fd68af48 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68af70 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af78 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af98 : 0xfffff802aac47d42 : nt!KiExceptionDispatch+0xc2
    0xffff8a85fd68afb8 : 0xfffff802aab19c61 : nt!ExFreeToNPagedLookasideList+0x15
    0xffff8a85fd68b0b8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0c0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b178 : 0xfffff802aac448bf : nt!KiPageFault+0x3ff
    0xffff8a85fd68b180 : 0x0000000000400000 :  Trap @ ffff8a85fd68b180
    0xffff8a85fd68b188 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b190 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b1d8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b208 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68b258 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68b2b0 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b2b8 : 0xfffff802aaa9abf1 : nt!ExAllocateFromNPagedLookasideList+0x11
    0xffff8a85fd68b2c8 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b2d8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b2e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b300 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b328 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b388 : 0xfffff802ab2ad638 : nt!VerifierIofCallDriver+0x28
    0xffff8a85fd68b3a8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3b0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3c8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b3d8 : 0xfffff802ab2ab800 : nt!VfBeforeCallDriver+0x13c
    0xffff8a85fd68b3f8 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b408 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b428 : 0xfffff802aabee12f : nt!ViAvlReleaseTableLockFromDpcLevel+0x2b
    0xffff8a85fd68b478 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b488 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b498 : 0xfffff802aab4d2d2 : nt!RtlWalkFrameChain+0x72
    0xffff8a85fd68b4a8 : 0xfffff802ab2b0c73 : nt!VfMajorBuildIrpLogEntry+0x33
    0xffff8a85fd68b4c8 : 0xfffff802aab4d3c2 : nt!RtlCaptureStackBackTrace+0x42
    0xffff8a85fd68b4d8 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b4e8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b4f8 : 0xfffff80728147872 : HIDCLASS!HidpIrpMajorDefault+0x102
    0xffff8a85fd68b518 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b538 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b558 : 0xfffff80728165237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    0xffff8a85fd68b578 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b5d8 : 0xfffff802ab2ba5d3 : nt!VfPacketCreateAndLock+0xa7
    0xffff8a85fd68b618 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b648 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b658 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b678 : 0xfffff802ab2abcf9 : nt!VfIrpWatermark+0x2d
    0xffff8a85fd68b6d8 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b748 : 0xfffff802ab2bc12a : nt!VfWmiTestStartedPdoStack+0x5a
    0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68b818 : 0xfffff802aabd30cf : nt!PpvUtilTestStartedPdoStack+0x17
    0xffff8a85fd68b848 : 0xfffff802ab054852 : nt!PipProcessStartPhase3+0xc2
    0xffff8a85fd68b888 : 0xfffff802aabd3034 : nt!PpMarkDeviceStackExtensionFlag+0x54
    0xffff8a85fd68b898 : 0xfffff802aae555e0 : nt!PnpRegistryDeviceResource+0x60
    0xffff8a85fd68b8a8 : 0xfffff802aabd3634 : nt!PipSetDevNodeState+0xe0
    0xffff8a85fd68b8b8 : 0xfffff802ab054430 : nt!IopDoDeferredSetInterfaceState+0x64
    0xffff8a85fd68b8c8 : 0xfffff802aabd32b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b
    0xffff8a85fd68b8d0 : 0xffffe7818188b7c0 : 0xfffff802aae54a30 : nt!PiPnpRtlActiveOperations
    0xffff8a85fd68b8e8 : 0xfffff802ab054372 : nt!PipProcessStartPhase2+0x56
    0xffff8a85fd68b928 : 0xfffff802ab057bd0 : nt!PipProcessDevNodeTree+0x3d0
    0xffff8a85fd68b958 : 0xfffff802aac3e421 : nt!SwapContext+0x411
    0xffff8a85fd68b9b8 : 0xffffd6075f9ed744 :  !du "\WINDOWS\SYSTEM32\WINTRUST.DLL"
    0xffff8a85fd68ba20 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68ba28 : 0xfffff802aab1d82f : nt!ExpAcquireResourceSharedLite+0x19f
    0xffff8a85fd68ba68 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68baa0 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68baa8 : 0xfffff802aab1feb8 : nt!ExReleaseResourceLite+0xc8
    0xffff8a85fd68bac8 : 0xfffff802aab1d5d0 : nt!ExAcquireResourceSharedLite+0x40
    0xffff8a85fd68bad8 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68bae8 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb08 : 0xfffff802aaff4391 : nt!PpDevNodeUnlockTree+0x19
    0xffff8a85fd68bb28 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb38 : 0xfffff802ab053cd0 : nt!PipForDeviceNodeSubtree+0x30
    0xffff8a85fd68bb60 : 0xfffff802ab08d410 : nt!PiMarkDeviceTreeForReenumerationWorker
    0xffff8a85fd68bb78 : 0xfffff802ab05425d : nt!PiMarkDeviceTreeForReenumeration+0x3d
    0xffff8a85fd68bba8 : 0xfffff802ab0542f2 : nt!PiProcessReenumeration+0x82
    0xffff8a85fd68bbb8 : 0xfffff802aab215a7 : nt!ExAcquirePushLockExclusiveEx+0xe7
    0xffff8a85fd68bbf8 : 0xfffff802aabd2beb : nt!PnpDeviceActionWorker+0x1eb
    0xffff8a85fd68bc48 : 0xfffff802aab42ea6 : nt!KeRemovePriQueue+0x186
    0xffff8a85fd68bc80 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bc90 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bcb0 : 0xfffff802aabd2a00 : nt!PnpDeviceActionWorker
    0xffff8a85fd68bcb8 : 0xfffff802aab42b05 : nt!ExpWorkerThread+0xf5
    0xffff8a85fd68bcd0 : 0xfffff802aae53d20 : nt!PnpDeviceEnumerationWorkItem
    0xffff8a85fd68bcf8 : 0xffffd60757c740e0 : 0xffffd60757c84260 : 0xfffff802aae5bf40 : nt!MiSystemPartition
    0xffff8a85fd68bd18 : 0xfffff802aaf426f7 : nt!PspDisablePrimaryTokenExchange+0x27
    0xffff8a85fd68bd40 : 0xfffff802aab42a10 : nt!ExpWorkerThread
    0xffff8a85fd68bd48 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68bd98 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68bdb0 : 0xfffff802aabbd290 : nt!PspSystemThreadStartup
    
    1: kd> knL
     # Child-SP          RetAddr           Call Site
    00 ffff8a85`fd68a118 fffff802`aac4e456 nt!KeBugCheckEx
    01 ffff8a85`fd68a120 fffff802`aac13d5f nt!PspSystemThreadStartup$filt$0+0x44
    02 ffff8a85`fd68a160 fffff802`aac3f94d nt!_C_specific_handler+0x9f
    03 ffff8a85`fd68a1d0 fffff802`aab4bb16 nt!RtlpExecuteHandlerForException+0xd
    04 ffff8a85`fd68a200 fffff802`aab4d613 nt!RtlDispatchException+0x416
    05 ffff8a85`fd68a8f0 fffff802`aac47d42 nt!KiDispatchException+0x1f3
    06 ffff8a85`fd68afa0 fffff802`aac448bf nt!KiExceptionDispatch+0xc2
    07 ffff8a85`fd68b180 fffff802`ab2a0915 nt!KiPageFault+0x3ff
    08 ffff8a85`fd68b318 fffff802`ab29fc1e nt!IovpValidateDeviceObject+0x5
    09 ffff8a85`fd68b320 fffff802`aaca2949 nt!IovCallDriver+0x16a
    0a ffff8a85`fd68b360 fffff802`ab2ad638 nt!IofCallDriverSpecifyReturn+0xadeb9
    0b ffff8a85`fd68b390 fffff802`aabf4b0a nt!VerifierIofCallDriver+0x28
    0c ffff8a85`fd68b3d0 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    0d ffff8a85`fd68b410 fffff802`aac727bb nt!IovCallDriver+0x275
    0e ffff8a85`fd68b450 fffff807`281476a2 nt!IofCallDriver+0x14c9ab
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    10 ffff8a85`fd68b500 fffff807`28165237 HIDCLASS!HidpIrpMajorDefault+0x102
    11 ffff8a85`fd68b560 fffff807`2814456d HIDCLASS!HidpIrpMajorSystemControl+0x5b
    12 ffff8a85`fd68b590 fffff802`aabf4b0a HIDCLASS!HidpMajorHandler+0x290d
    13 ffff8a85`fd68b620 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    14 ffff8a85`fd68b660 fffff802`aac727bb nt!IovCallDriver+0x275
    15 ffff8a85`fd68b6a0 fffff802`ab2abc55 nt!IofCallDriver+0x14c9ab
    16 ffff8a85`fd68b6e0 fffff802`ab2bc12a nt!VfIrpSendSynchronousIrp+0x109
    17 ffff8a85`fd68b750 fffff802`ab2b0ecc nt!VfWmiTestStartedPdoStack+0x5a
    18 ffff8a85`fd68b7f0 fffff802`aabd30cf nt!VfMajorTestStartedPdoStack+0x58
    19 ffff8a85`fd68b820 fffff802`ab054852 nt!PpvUtilTestStartedPdoStack+0x17
    1a ffff8a85`fd68b850 fffff802`ab057bd0 nt!PipProcessStartPhase3+0xc2
    1b ffff8a85`fd68b930 fffff802`ab0542f2 nt!PipProcessDevNodeTree+0x3d0
    1c ffff8a85`fd68bbb0 fffff802`aabd2beb nt!PiProcessReenumeration+0x82
    1d ffff8a85`fd68bc00 fffff802`aab42b05 nt!PnpDeviceActionWorker+0x1eb
    1e ffff8a85`fd68bcc0 fffff802`aabbd2d7 nt!ExpWorkerThread+0xf5
    1f ffff8a85`fd68bd50 fffff802`aac3e516 nt!PspSystemThreadStartup+0x47
    20 ffff8a85`fd68bda0 00000000`00000000 nt!KiStartSystemThread+0x16
    1: kd> .frame /r 0f
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    rax=ffffd6075b953200 rbx=ffffd6075f4241b0 rcx=00000000046dc232
    rdx=0000000000000000 rsi=ffffd6075f424060 rdi=ffffd6075b953200
    rip=fffff807281476a2 rsp=ffff8a85fd68b490 rbp=0000000000000017
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
    HIDCLASS!HidpCallDriver+0xa2:
    fffff807`281476a2 488bcb          mov     rcx,rbx
    1: kd> !irp ffffd6075b953200
    Irp is active with 3 stacks 3 is current (= 0xffffd6075b953360)
     No Mdl: No System Buffer: Thread 00000000:  Irp stack trace.  
         cmd  flg cl Device   File     Completion-Context
     [N/A(0), N/A(0)]
                0 10 00000000 00000000 00000000-00000000    
    
    			Args: 00000000 00000000 00000000 00000000
     [IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f420b70 00000000 fffff802ab2ab300-ffffd6075b953360 Success Error Cancel 
    	       \Driver\LGBusEnum	nt!IovpInternalCompletionTrap
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    >[IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f424060 00000000 fffff802ab2abf40-ffff8a85fd68b710 Success Error Cancel 
    	       \Driver\LGVirHid	nt!ViIrpSynchronousCompletionRoutine
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    
    Irp Extension present at 0xffffd6075b9533a8:
    1: kd> !devobj ffffd6075f420b70
    Device object (ffffd6075f420b70) is for:
     0000008c \Driver\LGBusEnum DriverObject ffffd6075ae6e790
    Current Irp 00000000 RefCount 0 Type 0000002a Flags 00003040
    SecurityDescriptor ffffe781870c6f20 DevExt ffffd6075f420cc0 DevObjExt ffffd6075f420de0 DevNode ffffd6075f4201d0 
    ExtensionFlags (0xc1000000)  DOE_BOTTOM_OF_FDO_STACK, DOE_DESIGNATED_FDO
                                 Unknown flags 0x01000000
    Characteristics (0x00000080)  FILE_AUTOGENERATED_DEVICE_NAME
    AttachedDevice (Upper) ffffd6075f424060 \Driver\LGVirHid
    Device queue is not busy.
    1: kd> !devnode ffffd6075f4201d0
    DevNode 0xffffd6075f4201d0 for PDO 0xffffd6075f420b70
      Parent 0xffffd60758c02810   Sibling 0000000000   Child 0000000000   
      InstancePath is "LogiDevice\VID_046D&PID_C232\1&79f5d87&0&01"
      ServiceName is "LGVirHid"
      State = DeviceNodeStartPostWork (0x307)
      Previous State = DeviceNodeStartCompletion (0x306)
      StateHistory[05] = DeviceNodeStartCompletion (0x306)
      StateHistory[04] = DeviceNodeStartPending (0x305)
      StateHistory[03] = DeviceNodeResourcesAssigned (0x304)
      StateHistory[02] = DeviceNodeDriversAdded (0x303)
      StateHistory[01] = DeviceNodeInitialized (0x302)
      StateHistory[00] = DeviceNodeUninitialized (0x301)
      StateHistory[19] = Unknown State (0x0)
      StateHistory[18] = Unknown State (0x0)
      StateHistory[17] = Unknown State (0x0)
      StateHistory[16] = Unknown State (0x0)
      StateHistory[15] = Unknown State (0x0)
      StateHistory[14] = Unknown State (0x0)
      StateHistory[13] = Unknown State (0x0)
      StateHistory[12] = Unknown State (0x0)
      StateHistory[11] = Unknown State (0x0)
      StateHistory[10] = Unknown State (0x0)
      StateHistory[09] = Unknown State (0x0)
      StateHistory[08] = Unknown State (0x0)
      StateHistory[07] = Unknown State (0x0)
      StateHistory[06] = Unknown State (0x0)
      Flags (0x6c000138)  DNF_REENUMERATE, DNF_ENUMERATED, 
                          DNF_IDS_QUERIED, DNF_NO_RESOURCE_REQUIRED, 
                          DNF_NO_LOWER_DEVICE_FILTERS, DNF_NO_LOWER_CLASS_FILTERS, 
                          DNF_NO_UPPER_DEVICE_FILTERS, DNF_NO_UPPER_CLASS_FILTERS
      CapabilityFlags (0x00000290)  Removable, SilentInstall, 
                                    SurpriseRemovalOK
    1: kd> lmvm LGBusEnum
    Browse full module list
    start             end                 module name
    fffff807`261a0000 fffff807`261a4e00   LGBusEnum   (no symbols)           
        Loaded symbol image file: LGBusEnum.sys
        Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
        Image name: LGBusEnum.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:08 2016 (575EFFAC)
        CheckSum:         00012B72
        ImageSize:        00004E00
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    1: kd> lmvm LGVirHid
    Browse full module list
    start             end                 module name
    fffff807`27700000 fffff807`27702500   LGVirHid   (no symbols)           
        Loaded symbol image file: LGVirHid.sys
        Image path: \SystemRoot\system32\drivers\LGVirHid.sys
        Image name: LGVirHid.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:03 2016 (575EFFA7)
        CheckSum:         0000BE50
        ImageSize:        00002500
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    So update:
    Logitech SetPoint (check updates in program or visit SetPoint – Logitech Support + Download)
      My Computer


  3. Posts : 8
    win10
    Thread Starter
       #13

    MrPepka said:
    Unfortunately the same. You can still see this HIDCLASS.sys driver, that's why I ask you in Driver Verifier to enable all standard options and these 2 additional options (Force pending I / O requests and IRP Logging). Make sure you don't select Microsoft drivers when selecting drivers to detect

    - - - Updated - - -

    And yet it succeeded
    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\michal01\Downloads\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff802`aaa8d000 PsLoadedModuleList = 0xfffff802`aae3b150
    Debug session time: Sat Oct 12 19:21:04.997 2019 (UTC + 2:00)
    System Uptime: 0 days 0:01:01.857
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ........
    Loading User Symbols
    
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    1: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7E, {ffffffffc0000005, fffff802ab2a0915, ffff8a85fd68b0d8, ffff8a85fd68a920}
    
    Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 )
    
    Followup:     MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff802ab2a0915, The address that the exception occurred at
    Arg3: ffff8a85fd68b0d8, Exception Record Address
    Arg4: ffff8a85fd68a920, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : AV.Fault
        Value: Read
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  To Be Filled By O.E.M.
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1408   
    
    BIOS_DATE:  09/21/2010
    
    BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.
    
    BASEBOARD_PRODUCT:  P6T
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: ffffffffc0000005
    
    BUGCHECK_P2: fffff802ab2a0915
    
    BUGCHECK_P3: ffff8a85fd68b0d8
    
    BUGCHECK_P4: ffff8a85fd68a920
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IovpValidateDeviceObject+5
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3
    
    EXCEPTION_RECORD:  ffff8a85fd68b0d8 -- (.exr 0xffff8a85fd68b0d8)
    ExceptionAddress: fffff802ab2a0915 (nt!IovpValidateDeviceObject+0x0000000000000005)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 00000000046dc232
    Attempt to read from address 00000000046dc232
    
    CONTEXT:  ffff8a85fd68a920 -- (.cxr 0xffff8a85fd68a920)
    rax=ffffd6075b953200 rbx=ffffd6075b953200 rcx=00000000046dc232
    rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd6075f46d370
    rip=fffff802ab2a0915 rsp=ffff8a85fd68b318 rbp=fffff802aabf4b0a
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000400000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IovpValidateDeviceObject+0x5:
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: c80
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 1a
    
    CPU_STEPPING: 5
    
    CPU_MICROCODE: 6,1a,5,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    FOLLOWUP_IP: 
    HIDCLASS!HidpCallDriver+a2
    fffff807`281476a2 488bcb          mov     rcx,rbx
    
    BUGCHECK_STR:  AV
    
    READ_ADDRESS:  00000000046dc232 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE_STR:  c0000005
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  00000000046dc232
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  10-13-2019 19:06:16.0560
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    LOCK_ADDRESS:  fffff802aae55460 -- (!locks fffff802aae55460)
    
    Resource @ nt!PiEngineLock (0xfffff802aae55460)    Exclusively owned
        Contention Count = 14
        NumberOfExclusiveWaiters = 1
         Threads: ffffd6075f603040-01<*> 
    
         Threads Waiting On Exclusive Access:
                  ffffd6075f2e0700       
    1 total locks
    
    PNP_TRIAGE_DATA: 
    	Lock address  : 0xfffff802aae55460
    	Thread Count  : 1
    	Thread address: 0xffffd6075f603040
    	Thread wait   : 0xf76
    
    LAST_CONTROL_TRANSFER:  from fffff802aac4e456 to fffff802aac370a0
    
    STACK_TEXT:  
    ffff8a85`fd68b318 fffff802`ab29fc1e : ffffd607`5b953200 fffff802`ab2aa7be ffffd607`5b953360 ffffd607`5b953360 : nt!IovpValidateDeviceObject+0x5
    ffff8a85`fd68b320 fffff802`aaca2949 : ffffd607`5b953200 00000000`00000000 ffffd607`5f420b70 ffffd607`5f46d370 : nt!IovCallDriver+0x16a
    ffff8a85`fd68b360 fffff802`ab2ad638 : ffffd607`5f6270c8 00000000`00400000 00000000`00000000 fffff807`2815a140 : nt!IofCallDriverSpecifyReturn+0xadeb9
    ffff8a85`fd68b390 fffff802`aabf4b0a : 00000000`00000000 fffff802`ab2ab800 ffffd607`00000000 ffffd607`00000000 : nt!VerifierIofCallDriver+0x28
    ffff8a85`fd68b3d0 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f420b70 ffffd607`5f9261c8 fffff802`aabee12f : nt!IopfCallDriver+0x56
    ffff8a85`fd68b410 fffff802`aac727bb : ffffd607`5f4241b0 00000000`00000017 ffffd607`5f424060 ffffd607`5dffbce0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b450 fffff807`281476a2 : 00000000`00000004 fffff802`aab4d2d2 ffff8a85`fd686000 fffff802`ab2b0c73 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b490 fffff807`28147872 : ffffd607`5b953200 ffffd607`5b953200 00000000`00000000 fffff802`ab2b101e : HIDCLASS!HidpCallDriver+0xa2
    ffff8a85`fd68b500 fffff807`28165237 : ffffd607`5f4241b0 ffffd607`5f92c4b0 ffffd607`5f92c4b0 fffff802`ab2aa7be : HIDCLASS!HidpIrpMajorDefault+0x102
    ffff8a85`fd68b560 fffff807`2814456d : ffffd607`00000002 ffffd607`5f4241d0 ffffd607`5f9261c8 ffffd607`5f4241b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    ffff8a85`fd68b590 fffff802`aabf4b0a : ffffd607`5b953200 00000000`00000000 ffffd607`5f92c4b0 ffffd607`00000001 : HIDCLASS!HidpMajorHandler+0x290d
    ffff8a85`fd68b620 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f424060 00000000`00000001 fffff802`ab2abcf9 : nt!IopfCallDriver+0x56
    ffff8a85`fd68b660 fffff802`aac727bb : ffffd607`5b953200 ffffd607`5f424060 00000000`00000000 ffffd607`5f92c4b0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b6a0 fffff802`ab2abc55 : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000000 ffff8a85`00000000 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b6e0 fffff802`ab2bc12a : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfIrpSendSynchronousIrp+0x109
    ffff8a85`fd68b750 fffff802`ab2b0ecc : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfWmiTestStartedPdoStack+0x5a
    ffff8a85`fd68b7f0 fffff802`aabd30cf : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58
    ffff8a85`fd68b820 fffff802`ab054852 : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffff8a85`fd68b8c9 : nt!PpvUtilTestStartedPdoStack+0x17
    ffff8a85`fd68b850 fffff802`ab057bd0 : ffffd607`5f4201d0 ffff8a85`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2
    ffff8a85`fd68b930 fffff802`ab0542f2 : ffffd607`5db29390 fffff802`aab215a7 ffffd607`5f603040 ffffd607`5db293e0 : nt!PipProcessDevNodeTree+0x3d0
    ffff8a85`fd68bbb0 fffff802`aabd2beb : ffffd601`00000003 ffffd607`58c02810 ffffd607`5db29390 00000000`00000000 : nt!PiProcessReenumeration+0x82
    ffff8a85`fd68bc00 fffff802`aab42b05 : ffffd607`5f603040 ffffd607`57d21d20 fffff802`aae53d20 ffffd607`57d21d20 : nt!PnpDeviceActionWorker+0x1eb
    ffff8a85`fd68bcc0 fffff802`aabbd2d7 : ffffd607`5f603040 00000000`00000080 ffffd607`57c92440 ffffd607`5f603040 : nt!ExpWorkerThread+0xf5
    ffff8a85`fd68bd50 fffff802`aac3e516 : ffffa181`96542180 ffffd607`5f603040 fffff802`aabbd290 8b8b8b8b`8b8b8b8b : nt!PspSystemThreadStartup+0x47
    ffff8a85`fd68bda0 00000000`00000000 : ffff8a85`fd68c000 ffff8a85`fd686000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  9070b37be5cd7e15efad35dc2f3bc04a7ae20fad
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2fd6327681b4e44441d9716e7e7e9fbddfcafa68
    
    THREAD_SHA1_HASH_MOD:  59ab819ed470f957edb7925a655e7a53a63b05da
    
    FAULT_INSTR_CODE:  8bcb8b48
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  HIDCLASS!HidpCallDriver+a2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: HIDCLASS
    
    IMAGE_NAME:  HIDCLASS.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.1
    
    STACK_COMMAND:  .cxr 0xffff8a85fd68a920 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  a2
    
    FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver
    
    TARGET_TIME:  2019-10-12T17:21:04.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  12a0
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver
    
    FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}
    
    Followup:     MachineOwner
    ---------
    
    1: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    1: kd> !dpx
    Start memory scan  : 0xffff8a85fd68a118 ($csp)
    End memory scan    : 0xffff8a85fd68c000 (Kernel Stack Base)
    
                   rax : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
                   rsp : 0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
                   r14 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
    0xffff8a85fd68a130 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68a140 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a158 : 0xfffff802aac13d5f : nt!_C_specific_handler+0x9f
    0xffff8a85fd68a198 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a1a8 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b8 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1c8 : 0xfffff802aac3f94d : nt!RtlpExecuteHandlerForException+0xd
    0xffff8a85fd68a1f0 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1f8 : 0xfffff802aab4bb16 : nt!RtlDispatchException+0x416
    0xffff8a85fd68a230 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a248 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a298 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a2a8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a2b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a2c0 : 0xffffd60757fc2798 : 0xfffff802ab29fde2 : nt!IovCompleteRequest+0x2e
    0xffff8a85fd68a2d0 : 0xfffff802aac13cc0 : nt!_C_specific_handler
    0xffff8a85fd68a318 : 0xfffff802aaf7c529 : nt!CmpWalkOneLevel+0x529
    0xffff8a85fd68a348 : 0xfffff802aab1c7cc : nt!KiSetAddressPolicy+0xc
    0xffff8a85fd68a378 : 0xfffff802aab1b59d : nt!KiSwapProcess+0x6d
    0xffff8a85fd68a3b8 : 0xfffff802aab1b4bd : nt!KiUnstackDetachProcess+0x13d
    0xffff8a85fd68a3e8 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68a468 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68a5d0 : 0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a5e0 : 0xffffe78186cf4696 :  !du "{24daeb80-9823-4ff8-92a6-3a4c6189f82c}\0002"
    0xffff8a85fd68a608 : 0xfffff802aad77543 : nt!ExAllocatePoolWithTag+0x133
    0xffff8a85fd68a6a0 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a6a8 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a6d0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a6d8 : 0xfffff802aaf83800 : nt!CmpCallCallBacksEx+0x250
    0xffff8a85fd68a6e0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a710 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a728 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a760 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a7c8 : 0xfffff802aabf4ab4 : nt!IopfCallDriver
    0xffff8a85fd68a7d0 : 0xfffff80728165258 : HIDCLASS!HidpIrpMajorSystemControl+0x7c
    0xffff8a85fd68a7d8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7e0 : 0xfffff802aaecf33c : "nt!Ports <PERF> (nt+0x44233c)"
    0xffff8a85fd68a7e8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7f0 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a7f8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a800 : 0xfffff802aae9b880 : "nt!Ports <PERF> (nt+0x40e880)"
    0xffff8a85fd68a808 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a810 : 0xfffff802aaed03ec : "nt!Ports <PERF> (nt+0x4433ec)"
    0xffff8a85fd68a818 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a820 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a828 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a830 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a838 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a848 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a858 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a860 : 0xfffff807281613d8 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213d8)"
    0xffff8a85fd68a868 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a870 : 0xfffff80728162014 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x22014)"
    0xffff8a85fd68a878 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a888 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a898 : 0xfffff802ab2a0916 : nt!IovpValidateDeviceObject+0x6
    0xffff8a85fd68a8a8 : 0xfffff802aab4d9d6 : nt!KdTrap+0x22
    0xffff8a85fd68a8c0 : 0xfffff8072815a100 : HIDCLASS!HidFdoWmiGuidList
    0xffff8a85fd68a8d8 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a8e8 : 0xfffff802aab4d613 : nt!KiDispatchException+0x1f3
    0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a938 : 0xfffff802aaf88942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffff8a85fd68a968 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68a9b8 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68a9c0 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68a9e8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68a9f8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa00 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa18 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68aa98 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68aad8 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68abe0 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac30 : 0xffffd607582b2c98 : 0xfffff802ab2b28b4 : nt!VfFreePoolNotification+0x74
    0xffff8a85fd68ac38 : 0xfffff802aae7e000 : "nt!Ports <PERF> (nt+0x3f1000)"
    0xffff8a85fd68ac40 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac68 : 0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68acb8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68acc0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68ace8 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad00 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad08 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad10 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad18 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ad38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad50 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad58 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad60 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad68 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ada0 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ada8 : 0xfffff802aab4e00c : nt!RtlGetExtendedContextLength+0x34
    0xffff8a85fd68adb8 : 0xfffff802aaaac8a8 : nt!MiInPagePageTable+0x178
    0xffff8a85fd68ae38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ae48 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ae80 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68aea8 : 0xfffff802aaae8c76 : nt!MiUnlockWorkingSetShared+0x56
    0xffff8a85fd68af48 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68af70 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af78 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af98 : 0xfffff802aac47d42 : nt!KiExceptionDispatch+0xc2
    0xffff8a85fd68afb8 : 0xfffff802aab19c61 : nt!ExFreeToNPagedLookasideList+0x15
    0xffff8a85fd68b0b8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0c0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b178 : 0xfffff802aac448bf : nt!KiPageFault+0x3ff
    0xffff8a85fd68b180 : 0x0000000000400000 :  Trap @ ffff8a85fd68b180
    0xffff8a85fd68b188 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b190 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b1d8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b208 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68b258 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68b2b0 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b2b8 : 0xfffff802aaa9abf1 : nt!ExAllocateFromNPagedLookasideList+0x11
    0xffff8a85fd68b2c8 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b2d8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b2e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b300 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b328 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b388 : 0xfffff802ab2ad638 : nt!VerifierIofCallDriver+0x28
    0xffff8a85fd68b3a8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3b0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3c8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b3d8 : 0xfffff802ab2ab800 : nt!VfBeforeCallDriver+0x13c
    0xffff8a85fd68b3f8 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b408 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b428 : 0xfffff802aabee12f : nt!ViAvlReleaseTableLockFromDpcLevel+0x2b
    0xffff8a85fd68b478 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b488 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b498 : 0xfffff802aab4d2d2 : nt!RtlWalkFrameChain+0x72
    0xffff8a85fd68b4a8 : 0xfffff802ab2b0c73 : nt!VfMajorBuildIrpLogEntry+0x33
    0xffff8a85fd68b4c8 : 0xfffff802aab4d3c2 : nt!RtlCaptureStackBackTrace+0x42
    0xffff8a85fd68b4d8 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b4e8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b4f8 : 0xfffff80728147872 : HIDCLASS!HidpIrpMajorDefault+0x102
    0xffff8a85fd68b518 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b538 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b558 : 0xfffff80728165237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    0xffff8a85fd68b578 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b5d8 : 0xfffff802ab2ba5d3 : nt!VfPacketCreateAndLock+0xa7
    0xffff8a85fd68b618 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b648 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b658 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b678 : 0xfffff802ab2abcf9 : nt!VfIrpWatermark+0x2d
    0xffff8a85fd68b6d8 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b748 : 0xfffff802ab2bc12a : nt!VfWmiTestStartedPdoStack+0x5a
    0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68b818 : 0xfffff802aabd30cf : nt!PpvUtilTestStartedPdoStack+0x17
    0xffff8a85fd68b848 : 0xfffff802ab054852 : nt!PipProcessStartPhase3+0xc2
    0xffff8a85fd68b888 : 0xfffff802aabd3034 : nt!PpMarkDeviceStackExtensionFlag+0x54
    0xffff8a85fd68b898 : 0xfffff802aae555e0 : nt!PnpRegistryDeviceResource+0x60
    0xffff8a85fd68b8a8 : 0xfffff802aabd3634 : nt!PipSetDevNodeState+0xe0
    0xffff8a85fd68b8b8 : 0xfffff802ab054430 : nt!IopDoDeferredSetInterfaceState+0x64
    0xffff8a85fd68b8c8 : 0xfffff802aabd32b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b
    0xffff8a85fd68b8d0 : 0xffffe7818188b7c0 : 0xfffff802aae54a30 : nt!PiPnpRtlActiveOperations
    0xffff8a85fd68b8e8 : 0xfffff802ab054372 : nt!PipProcessStartPhase2+0x56
    0xffff8a85fd68b928 : 0xfffff802ab057bd0 : nt!PipProcessDevNodeTree+0x3d0
    0xffff8a85fd68b958 : 0xfffff802aac3e421 : nt!SwapContext+0x411
    0xffff8a85fd68b9b8 : 0xffffd6075f9ed744 :  !du "\WINDOWS\SYSTEM32\WINTRUST.DLL"
    0xffff8a85fd68ba20 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68ba28 : 0xfffff802aab1d82f : nt!ExpAcquireResourceSharedLite+0x19f
    0xffff8a85fd68ba68 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68baa0 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68baa8 : 0xfffff802aab1feb8 : nt!ExReleaseResourceLite+0xc8
    0xffff8a85fd68bac8 : 0xfffff802aab1d5d0 : nt!ExAcquireResourceSharedLite+0x40
    0xffff8a85fd68bad8 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68bae8 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb08 : 0xfffff802aaff4391 : nt!PpDevNodeUnlockTree+0x19
    0xffff8a85fd68bb28 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb38 : 0xfffff802ab053cd0 : nt!PipForDeviceNodeSubtree+0x30
    0xffff8a85fd68bb60 : 0xfffff802ab08d410 : nt!PiMarkDeviceTreeForReenumerationWorker
    0xffff8a85fd68bb78 : 0xfffff802ab05425d : nt!PiMarkDeviceTreeForReenumeration+0x3d
    0xffff8a85fd68bba8 : 0xfffff802ab0542f2 : nt!PiProcessReenumeration+0x82
    0xffff8a85fd68bbb8 : 0xfffff802aab215a7 : nt!ExAcquirePushLockExclusiveEx+0xe7
    0xffff8a85fd68bbf8 : 0xfffff802aabd2beb : nt!PnpDeviceActionWorker+0x1eb
    0xffff8a85fd68bc48 : 0xfffff802aab42ea6 : nt!KeRemovePriQueue+0x186
    0xffff8a85fd68bc80 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bc90 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bcb0 : 0xfffff802aabd2a00 : nt!PnpDeviceActionWorker
    0xffff8a85fd68bcb8 : 0xfffff802aab42b05 : nt!ExpWorkerThread+0xf5
    0xffff8a85fd68bcd0 : 0xfffff802aae53d20 : nt!PnpDeviceEnumerationWorkItem
    0xffff8a85fd68bcf8 : 0xffffd60757c740e0 : 0xffffd60757c84260 : 0xfffff802aae5bf40 : nt!MiSystemPartition
    0xffff8a85fd68bd18 : 0xfffff802aaf426f7 : nt!PspDisablePrimaryTokenExchange+0x27
    0xffff8a85fd68bd40 : 0xfffff802aab42a10 : nt!ExpWorkerThread
    0xffff8a85fd68bd48 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68bd98 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68bdb0 : 0xfffff802aabbd290 : nt!PspSystemThreadStartup
    
    1: kd> knL
     # Child-SP          RetAddr           Call Site
    00 ffff8a85`fd68a118 fffff802`aac4e456 nt!KeBugCheckEx
    01 ffff8a85`fd68a120 fffff802`aac13d5f nt!PspSystemThreadStartup$filt$0+0x44
    02 ffff8a85`fd68a160 fffff802`aac3f94d nt!_C_specific_handler+0x9f
    03 ffff8a85`fd68a1d0 fffff802`aab4bb16 nt!RtlpExecuteHandlerForException+0xd
    04 ffff8a85`fd68a200 fffff802`aab4d613 nt!RtlDispatchException+0x416
    05 ffff8a85`fd68a8f0 fffff802`aac47d42 nt!KiDispatchException+0x1f3
    06 ffff8a85`fd68afa0 fffff802`aac448bf nt!KiExceptionDispatch+0xc2
    07 ffff8a85`fd68b180 fffff802`ab2a0915 nt!KiPageFault+0x3ff
    08 ffff8a85`fd68b318 fffff802`ab29fc1e nt!IovpValidateDeviceObject+0x5
    09 ffff8a85`fd68b320 fffff802`aaca2949 nt!IovCallDriver+0x16a
    0a ffff8a85`fd68b360 fffff802`ab2ad638 nt!IofCallDriverSpecifyReturn+0xadeb9
    0b ffff8a85`fd68b390 fffff802`aabf4b0a nt!VerifierIofCallDriver+0x28
    0c ffff8a85`fd68b3d0 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    0d ffff8a85`fd68b410 fffff802`aac727bb nt!IovCallDriver+0x275
    0e ffff8a85`fd68b450 fffff807`281476a2 nt!IofCallDriver+0x14c9ab
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    10 ffff8a85`fd68b500 fffff807`28165237 HIDCLASS!HidpIrpMajorDefault+0x102
    11 ffff8a85`fd68b560 fffff807`2814456d HIDCLASS!HidpIrpMajorSystemControl+0x5b
    12 ffff8a85`fd68b590 fffff802`aabf4b0a HIDCLASS!HidpMajorHandler+0x290d
    13 ffff8a85`fd68b620 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    14 ffff8a85`fd68b660 fffff802`aac727bb nt!IovCallDriver+0x275
    15 ffff8a85`fd68b6a0 fffff802`ab2abc55 nt!IofCallDriver+0x14c9ab
    16 ffff8a85`fd68b6e0 fffff802`ab2bc12a nt!VfIrpSendSynchronousIrp+0x109
    17 ffff8a85`fd68b750 fffff802`ab2b0ecc nt!VfWmiTestStartedPdoStack+0x5a
    18 ffff8a85`fd68b7f0 fffff802`aabd30cf nt!VfMajorTestStartedPdoStack+0x58
    19 ffff8a85`fd68b820 fffff802`ab054852 nt!PpvUtilTestStartedPdoStack+0x17
    1a ffff8a85`fd68b850 fffff802`ab057bd0 nt!PipProcessStartPhase3+0xc2
    1b ffff8a85`fd68b930 fffff802`ab0542f2 nt!PipProcessDevNodeTree+0x3d0
    1c ffff8a85`fd68bbb0 fffff802`aabd2beb nt!PiProcessReenumeration+0x82
    1d ffff8a85`fd68bc00 fffff802`aab42b05 nt!PnpDeviceActionWorker+0x1eb
    1e ffff8a85`fd68bcc0 fffff802`aabbd2d7 nt!ExpWorkerThread+0xf5
    1f ffff8a85`fd68bd50 fffff802`aac3e516 nt!PspSystemThreadStartup+0x47
    20 ffff8a85`fd68bda0 00000000`00000000 nt!KiStartSystemThread+0x16
    1: kd> .frame /r 0f
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    rax=ffffd6075b953200 rbx=ffffd6075f4241b0 rcx=00000000046dc232
    rdx=0000000000000000 rsi=ffffd6075f424060 rdi=ffffd6075b953200
    rip=fffff807281476a2 rsp=ffff8a85fd68b490 rbp=0000000000000017
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
    HIDCLASS!HidpCallDriver+0xa2:
    fffff807`281476a2 488bcb          mov     rcx,rbx
    1: kd> !irp ffffd6075b953200
    Irp is active with 3 stacks 3 is current (= 0xffffd6075b953360)
     No Mdl: No System Buffer: Thread 00000000:  Irp stack trace.  
         cmd  flg cl Device   File     Completion-Context
     [N/A(0), N/A(0)]
                0 10 00000000 00000000 00000000-00000000    
    
    			Args: 00000000 00000000 00000000 00000000
     [IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f420b70 00000000 fffff802ab2ab300-ffffd6075b953360 Success Error Cancel 
    	       \Driver\LGBusEnum	nt!IovpInternalCompletionTrap
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    >[IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f424060 00000000 fffff802ab2abf40-ffff8a85fd68b710 Success Error Cancel 
    	       \Driver\LGVirHid	nt!ViIrpSynchronousCompletionRoutine
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    
    Irp Extension present at 0xffffd6075b9533a8:
    1: kd> !devobj ffffd6075f420b70
    Device object (ffffd6075f420b70) is for:
     0000008c \Driver\LGBusEnum DriverObject ffffd6075ae6e790
    Current Irp 00000000 RefCount 0 Type 0000002a Flags 00003040
    SecurityDescriptor ffffe781870c6f20 DevExt ffffd6075f420cc0 DevObjExt ffffd6075f420de0 DevNode ffffd6075f4201d0 
    ExtensionFlags (0xc1000000)  DOE_BOTTOM_OF_FDO_STACK, DOE_DESIGNATED_FDO
                                 Unknown flags 0x01000000
    Characteristics (0x00000080)  FILE_AUTOGENERATED_DEVICE_NAME
    AttachedDevice (Upper) ffffd6075f424060 \Driver\LGVirHid
    Device queue is not busy.
    1: kd> !devnode ffffd6075f4201d0
    DevNode 0xffffd6075f4201d0 for PDO 0xffffd6075f420b70
      Parent 0xffffd60758c02810   Sibling 0000000000   Child 0000000000   
      InstancePath is "LogiDevice\VID_046D&PID_C232\1&79f5d87&0&01"
      ServiceName is "LGVirHid"
      State = DeviceNodeStartPostWork (0x307)
      Previous State = DeviceNodeStartCompletion (0x306)
      StateHistory[05] = DeviceNodeStartCompletion (0x306)
      StateHistory[04] = DeviceNodeStartPending (0x305)
      StateHistory[03] = DeviceNodeResourcesAssigned (0x304)
      StateHistory[02] = DeviceNodeDriversAdded (0x303)
      StateHistory[01] = DeviceNodeInitialized (0x302)
      StateHistory[00] = DeviceNodeUninitialized (0x301)
      StateHistory[19] = Unknown State (0x0)
      StateHistory[18] = Unknown State (0x0)
      StateHistory[17] = Unknown State (0x0)
      StateHistory[16] = Unknown State (0x0)
      StateHistory[15] = Unknown State (0x0)
      StateHistory[14] = Unknown State (0x0)
      StateHistory[13] = Unknown State (0x0)
      StateHistory[12] = Unknown State (0x0)
      StateHistory[11] = Unknown State (0x0)
      StateHistory[10] = Unknown State (0x0)
      StateHistory[09] = Unknown State (0x0)
      StateHistory[08] = Unknown State (0x0)
      StateHistory[07] = Unknown State (0x0)
      StateHistory[06] = Unknown State (0x0)
      Flags (0x6c000138)  DNF_REENUMERATE, DNF_ENUMERATED, 
                          DNF_IDS_QUERIED, DNF_NO_RESOURCE_REQUIRED, 
                          DNF_NO_LOWER_DEVICE_FILTERS, DNF_NO_LOWER_CLASS_FILTERS, 
                          DNF_NO_UPPER_DEVICE_FILTERS, DNF_NO_UPPER_CLASS_FILTERS
      CapabilityFlags (0x00000290)  Removable, SilentInstall, 
                                    SurpriseRemovalOK
    1: kd> lmvm LGBusEnum
    Browse full module list
    start             end                 module name
    fffff807`261a0000 fffff807`261a4e00   LGBusEnum   (no symbols)           
        Loaded symbol image file: LGBusEnum.sys
        Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
        Image name: LGBusEnum.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:08 2016 (575EFFAC)
        CheckSum:         00012B72
        ImageSize:        00004E00
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    1: kd> lmvm LGVirHid
    Browse full module list
    start             end                 module name
    fffff807`27700000 fffff807`27702500   LGVirHid   (no symbols)           
        Loaded symbol image file: LGVirHid.sys
        Image path: \SystemRoot\system32\drivers\LGVirHid.sys
        Image name: LGVirHid.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:03 2016 (575EFFA7)
        CheckSum:         0000BE50
        ImageSize:        00002500
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    So update:
    Logitech SetPoint (check updates in program or visit SetPoint Logitech Support + Download)
    Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.
    thanks master, this is the dmp without microsoft drivers...strange; it still gives me that hidclass, for i can see in "whocrashed"

    - for logitech; i have only installed logitech gaming software...for the headphones..checked now and the firmware and version of the software seem be all updated (64bit)
      My Computer


  4. Posts : 14,894
    Windows 10 Pro
       #14

    MrPepka said:
    OK, let's take a look at this:
    So I will ask you again. Have you enabled the "I / O Verification" and "Enhanced I / O Verification" options in Driver Verifier? If not, turn off Driver Verifier completely, then turn it on again and turn on these missing options
    One of the reasons I requested a kernel memory dump is this, to see which options were checked in driver verifier.
    Code:
    Verify Flags Level 0x00000610
    
      STANDARD FLAGS:
        [X] (0x00000000) Automatic Checks
        [ ] (0x00000001) Special pool
        [ ] (0x00000002) Force IRQL checking
        [ ] (0x00000008) Pool tracking
        [X] (0x00000010) I/O verification
        [ ] (0x00000020) Deadlock detection
        [ ] (0x00000080) DMA checking
        [ ] (0x00000100) Security checks
        [ ] (0x00000800) Miscellaneous checks
        [ ] (0x00020000) DDI compliance checking
    
      ADDITIONAL FLAGS:
        [ ] (0x00000004) Randomized low resources simulation
        [X] (0x00000200) Force pending I/O requests
        [X] (0x00000400) IRP logging
        [ ] (0x00002000) Invariant MDL checking for stack
        [ ] (0x00004000) Invariant MDL checking for driver
        [ ] (0x00008000) Power framework delay fuzzing
        [ ] (0x00010000) Port/miniport interface checking
        [ ] (0x00040000) Systematic low resources simulation
        [ ] (0x00080000) DDI compliance checking (additional)
        [ ] (0x00200000) NDIS/WIFI verification
        [ ] (0x00800000) Kernel synchronization delay fuzzing
        [ ] (0x01000000) VM switch verification
        [ ] (0x02000000) Code integrity checks
    
        [X] Indicates flag is enabled
    
    
    Summary of All Verifier Statistics
    
      RaiseIrqls           0x4
      AcquireSpinLocks     0xfd8
      Synch Executions     0x0
      Trims                0x0
    
      Pool Allocations Attempted             0x67d1a
      Pool Allocations Succeeded             0x67d1a
      Pool Allocations Succeeded SpecialPool 0x11
      Pool Allocations With NO TAG           0x98
      Pool Allocations Failed                0x0
    
      Current paged pool allocations         0x0 for 00000000 bytes
      Peak paged pool allocations            0x0 for 00000000 bytes
      Current nonpaged pool allocations      0x0 for 00000000 bytes
      Peak nonpaged pool allocations         0x0 for 00000000 bytes
      My Computers


  5. Posts : 8
    win10
    Thread Starter
       #15

    Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.

    dmp with logitech updated, always the same hidclass damned
      My Computer


  6. Posts : 8
    win10
    Thread Starter
       #16

    MrPepka said:
    Unfortunately the same. You can still see this HIDCLASS.sys driver, that's why I ask you in Driver Verifier to enable all standard options and these 2 additional options (Force pending I / O requests and IRP Logging). Make sure you don't select Microsoft drivers when selecting drivers to detect

    - - - Updated - - -

    And yet it succeeded
    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\michal01\Downloads\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff802`aaa8d000 PsLoadedModuleList = 0xfffff802`aae3b150
    Debug session time: Sat Oct 12 19:21:04.997 2019 (UTC + 2:00)
    System Uptime: 0 days 0:01:01.857
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ........
    Loading User Symbols
    
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    1: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 7E, {ffffffffc0000005, fffff802ab2a0915, ffff8a85fd68b0d8, ffff8a85fd68a920}
    
    Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 )
    
    Followup:     MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff802ab2a0915, The address that the exception occurred at
    Arg3: ffff8a85fd68b0d8, Exception Record Address
    Arg4: ffff8a85fd68a920, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : AV.Fault
        Value: Read
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 401
    
    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804
    
    SYSTEM_MANUFACTURER:  System manufacturer
    
    SYSTEM_PRODUCT_NAME:  System Product Name
    
    SYSTEM_SKU:  To Be Filled By O.E.M.
    
    SYSTEM_VERSION:  System Version
    
    BIOS_VENDOR:  American Megatrends Inc.
    
    BIOS_VERSION:  1408   
    
    BIOS_DATE:  09/21/2010
    
    BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.
    
    BASEBOARD_PRODUCT:  P6T
    
    BASEBOARD_VERSION:  Rev 1.xx
    
    DUMP_TYPE:  1
    
    BUGCHECK_P1: ffffffffc0000005
    
    BUGCHECK_P2: fffff802ab2a0915
    
    BUGCHECK_P3: ffff8a85fd68b0d8
    
    BUGCHECK_P4: ffff8a85fd68a920
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IovpValidateDeviceObject+5
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3
    
    EXCEPTION_RECORD:  ffff8a85fd68b0d8 -- (.exr 0xffff8a85fd68b0d8)
    ExceptionAddress: fffff802ab2a0915 (nt!IovpValidateDeviceObject+0x0000000000000005)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 00000000046dc232
    Attempt to read from address 00000000046dc232
    
    CONTEXT:  ffff8a85fd68a920 -- (.cxr 0xffff8a85fd68a920)
    rax=ffffd6075b953200 rbx=ffffd6075b953200 rcx=00000000046dc232
    rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffd6075f46d370
    rip=fffff802ab2a0915 rsp=ffff8a85fd68b318 rbp=fffff802aabf4b0a
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000400000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IovpValidateDeviceObject+0x5:
    fffff802`ab2a0915 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: c80
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 1a
    
    CPU_STEPPING: 5
    
    CPU_MICROCODE: 6,1a,5,0 (F,M,S,R)  SIG: 19'00000000 (cache) 19'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    FOLLOWUP_IP: 
    HIDCLASS!HidpCallDriver+a2
    fffff807`281476a2 488bcb          mov     rcx,rbx
    
    BUGCHECK_STR:  AV
    
    READ_ADDRESS:  00000000046dc232 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE_STR:  c0000005
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  00000000046dc232
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  10-13-2019 19:06:16.0560
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    LOCK_ADDRESS:  fffff802aae55460 -- (!locks fffff802aae55460)
    
    Resource @ nt!PiEngineLock (0xfffff802aae55460)    Exclusively owned
        Contention Count = 14
        NumberOfExclusiveWaiters = 1
         Threads: ffffd6075f603040-01<*> 
    
         Threads Waiting On Exclusive Access:
                  ffffd6075f2e0700       
    1 total locks
    
    PNP_TRIAGE_DATA: 
    	Lock address  : 0xfffff802aae55460
    	Thread Count  : 1
    	Thread address: 0xffffd6075f603040
    	Thread wait   : 0xf76
    
    LAST_CONTROL_TRANSFER:  from fffff802aac4e456 to fffff802aac370a0
    
    STACK_TEXT:  
    ffff8a85`fd68b318 fffff802`ab29fc1e : ffffd607`5b953200 fffff802`ab2aa7be ffffd607`5b953360 ffffd607`5b953360 : nt!IovpValidateDeviceObject+0x5
    ffff8a85`fd68b320 fffff802`aaca2949 : ffffd607`5b953200 00000000`00000000 ffffd607`5f420b70 ffffd607`5f46d370 : nt!IovCallDriver+0x16a
    ffff8a85`fd68b360 fffff802`ab2ad638 : ffffd607`5f6270c8 00000000`00400000 00000000`00000000 fffff807`2815a140 : nt!IofCallDriverSpecifyReturn+0xadeb9
    ffff8a85`fd68b390 fffff802`aabf4b0a : 00000000`00000000 fffff802`ab2ab800 ffffd607`00000000 ffffd607`00000000 : nt!VerifierIofCallDriver+0x28
    ffff8a85`fd68b3d0 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f420b70 ffffd607`5f9261c8 fffff802`aabee12f : nt!IopfCallDriver+0x56
    ffff8a85`fd68b410 fffff802`aac727bb : ffffd607`5f4241b0 00000000`00000017 ffffd607`5f424060 ffffd607`5dffbce0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b450 fffff807`281476a2 : 00000000`00000004 fffff802`aab4d2d2 ffff8a85`fd686000 fffff802`ab2b0c73 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b490 fffff807`28147872 : ffffd607`5b953200 ffffd607`5b953200 00000000`00000000 fffff802`ab2b101e : HIDCLASS!HidpCallDriver+0xa2
    ffff8a85`fd68b500 fffff807`28165237 : ffffd607`5f4241b0 ffffd607`5f92c4b0 ffffd607`5f92c4b0 fffff802`ab2aa7be : HIDCLASS!HidpIrpMajorDefault+0x102
    ffff8a85`fd68b560 fffff807`2814456d : ffffd607`00000002 ffffd607`5f4241d0 ffffd607`5f9261c8 ffffd607`5f4241b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    ffff8a85`fd68b590 fffff802`aabf4b0a : ffffd607`5b953200 00000000`00000000 ffffd607`5f92c4b0 ffffd607`00000001 : HIDCLASS!HidpMajorHandler+0x290d
    ffff8a85`fd68b620 fffff802`ab29fd29 : ffffd607`5b953200 ffffd607`5f424060 00000000`00000001 fffff802`ab2abcf9 : nt!IopfCallDriver+0x56
    ffff8a85`fd68b660 fffff802`aac727bb : ffffd607`5b953200 ffffd607`5f424060 00000000`00000000 ffffd607`5f92c4b0 : nt!IovCallDriver+0x275
    ffff8a85`fd68b6a0 fffff802`ab2abc55 : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000000 ffff8a85`00000000 : nt!IofCallDriver+0x14c9ab
    ffff8a85`fd68b6e0 fffff802`ab2bc12a : ffffd607`5f420b70 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfIrpSendSynchronousIrp+0x109
    ffff8a85`fd68b750 fffff802`ab2b0ecc : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffffd607`5f420b70 : nt!VfWmiTestStartedPdoStack+0x5a
    ffff8a85`fd68b7f0 fffff802`aabd30cf : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58
    ffff8a85`fd68b820 fffff802`ab054852 : 00000000`00000000 ffff8a85`fd68b8c9 00000000`00000001 ffff8a85`fd68b8c9 : nt!PpvUtilTestStartedPdoStack+0x17
    ffff8a85`fd68b850 fffff802`ab057bd0 : ffffd607`5f4201d0 ffff8a85`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2
    ffff8a85`fd68b930 fffff802`ab0542f2 : ffffd607`5db29390 fffff802`aab215a7 ffffd607`5f603040 ffffd607`5db293e0 : nt!PipProcessDevNodeTree+0x3d0
    ffff8a85`fd68bbb0 fffff802`aabd2beb : ffffd601`00000003 ffffd607`58c02810 ffffd607`5db29390 00000000`00000000 : nt!PiProcessReenumeration+0x82
    ffff8a85`fd68bc00 fffff802`aab42b05 : ffffd607`5f603040 ffffd607`57d21d20 fffff802`aae53d20 ffffd607`57d21d20 : nt!PnpDeviceActionWorker+0x1eb
    ffff8a85`fd68bcc0 fffff802`aabbd2d7 : ffffd607`5f603040 00000000`00000080 ffffd607`57c92440 ffffd607`5f603040 : nt!ExpWorkerThread+0xf5
    ffff8a85`fd68bd50 fffff802`aac3e516 : ffffa181`96542180 ffffd607`5f603040 fffff802`aabbd290 8b8b8b8b`8b8b8b8b : nt!PspSystemThreadStartup+0x47
    ffff8a85`fd68bda0 00000000`00000000 : ffff8a85`fd68c000 ffff8a85`fd686000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  9070b37be5cd7e15efad35dc2f3bc04a7ae20fad
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2fd6327681b4e44441d9716e7e7e9fbddfcafa68
    
    THREAD_SHA1_HASH_MOD:  59ab819ed470f957edb7925a655e7a53a63b05da
    
    FAULT_INSTR_CODE:  8bcb8b48
    
    SYMBOL_STACK_INDEX:  7
    
    SYMBOL_NAME:  HIDCLASS!HidpCallDriver+a2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: HIDCLASS
    
    IMAGE_NAME:  HIDCLASS.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.1
    
    STACK_COMMAND:  .cxr 0xffff8a85fd68a920 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  a2
    
    FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver
    
    PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver
    
    TARGET_TIME:  2019-10-12T17:21:04.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  180410-1804
    
    BUILDLAB_STR:  rs4_release
    
    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804
    
    ANALYSIS_SESSION_ELAPSED_TIME:  12a0
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver
    
    FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}
    
    Followup:     MachineOwner
    ---------
    
    1: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    1: kd> !dpx
    Start memory scan  : 0xffff8a85fd68a118 ($csp)
    End memory scan    : 0xffff8a85fd68c000 (Kernel Stack Base)
    
                   rax : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
                   rsp : 0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
                   r14 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a118 : 0xfffff802aac4e456 : nt!PspSystemThreadStartup$filt$0+0x44
    0xffff8a85fd68a130 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68a140 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a158 : 0xfffff802aac13d5f : nt!_C_specific_handler+0x9f
    0xffff8a85fd68a198 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a1a8 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a1b8 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1c8 : 0xfffff802aac3f94d : nt!RtlpExecuteHandlerForException+0xd
    0xffff8a85fd68a1f0 : 0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a1f8 : 0xfffff802aab4bb16 : nt!RtlDispatchException+0x416
    0xffff8a85fd68a230 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a248 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a298 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a2a0 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68a2a8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a2b0 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68a2c0 : 0xffffd60757fc2798 : 0xfffff802ab29fde2 : nt!IovCompleteRequest+0x2e
    0xffff8a85fd68a2d0 : 0xfffff802aac13cc0 : nt!_C_specific_handler
    0xffff8a85fd68a318 : 0xfffff802aaf7c529 : nt!CmpWalkOneLevel+0x529
    0xffff8a85fd68a348 : 0xfffff802aab1c7cc : nt!KiSetAddressPolicy+0xc
    0xffff8a85fd68a378 : 0xfffff802aab1b59d : nt!KiSwapProcess+0x6d
    0xffff8a85fd68a3b8 : 0xfffff802aab1b4bd : nt!KiUnstackDetachProcess+0x13d
    0xffff8a85fd68a3e8 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68a468 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68a5d0 : 0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a5e0 : 0xffffe78186cf4696 :  !du "{24daeb80-9823-4ff8-92a6-3a4c6189f82c}\0002"
    0xffff8a85fd68a608 : 0xfffff802aad77543 : nt!ExAllocatePoolWithTag+0x133
    0xffff8a85fd68a6a0 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a6a8 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a6d0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a6d8 : 0xfffff802aaf83800 : nt!CmpCallCallBacksEx+0x250
    0xffff8a85fd68a6e0 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a710 : 0xffffe7817e948430 : 0xfffff802aae588a0 : nt!CallbackListHead
    0xffff8a85fd68a728 : 0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a760 : 0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a7c8 : 0xfffff802aabf4ab4 : nt!IopfCallDriver
    0xffff8a85fd68a7d0 : 0xfffff80728165258 : HIDCLASS!HidpIrpMajorSystemControl+0x7c
    0xffff8a85fd68a7d8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7e0 : 0xfffff802aaecf33c : "nt!Ports <PERF> (nt+0x44233c)"
    0xffff8a85fd68a7e8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a7f0 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a7f8 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a800 : 0xfffff802aae9b880 : "nt!Ports <PERF> (nt+0x40e880)"
    0xffff8a85fd68a808 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a810 : 0xfffff802aaed03ec : "nt!Ports <PERF> (nt+0x4433ec)"
    0xffff8a85fd68a818 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a820 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a828 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a830 : 0xfffff802aaecf27c : "nt!Ports <PERF> (nt+0x44227c)"
    0xffff8a85fd68a838 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a848 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a850 : 0xfffff807281613c0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213c0)"
    0xffff8a85fd68a858 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a860 : 0xfffff807281613d8 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x213d8)"
    0xffff8a85fd68a868 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a870 : 0xfffff80728162014 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x22014)"
    0xffff8a85fd68a878 : 0xfffff80728140000 : "HIDCLASS!HidpIrpMajorClose <PERF> (HIDCLASS+0x0)"
    0xffff8a85fd68a880 : 0xfffff807281611b0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x211b0)"
    0xffff8a85fd68a888 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68a890 : 0xfffff802aae8f6a0 : "nt!Ports <PERF> (nt+0x4026a0)"
    0xffff8a85fd68a898 : 0xfffff802ab2a0916 : nt!IovpValidateDeviceObject+0x6
    0xffff8a85fd68a8a8 : 0xfffff802aab4d9d6 : nt!KdTrap+0x22
    0xffff8a85fd68a8c0 : 0xfffff8072815a100 : HIDCLASS!HidFdoWmiGuidList
    0xffff8a85fd68a8d8 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a8e8 : 0xfffff802aab4d613 : nt!KiDispatchException+0x1f3
    0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68a938 : 0xfffff802aaf88942 : nt!ObpReferenceObjectByHandleWithTag+0x272
    0xffff8a85fd68a968 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68a9b8 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68a9c0 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68a9e8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68a9f8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa00 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68aa18 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68aa98 : 0xfffff80728161bd0 : "HIDCLASS!allFdoExtensions <PERF> (HIDCLASS+0x21bd0)"
    0xffff8a85fd68aad8 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68abe0 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac30 : 0xffffd607582b2c98 : 0xfffff802ab2b28b4 : nt!VfFreePoolNotification+0x74
    0xffff8a85fd68ac38 : 0xfffff802aae7e000 : "nt!Ports <PERF> (nt+0x3f1000)"
    0xffff8a85fd68ac40 : 0xfffff802aaa8d000 : "nt!IoStartNextPacket <PERF> (nt+0x0)"
    0xffff8a85fd68ac68 : 0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68acb8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68acc0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68ace8 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad00 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad08 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad10 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad18 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ad38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ad50 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad58 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad60 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ad68 : 0xfffff802aab4d074 : nt!RtlpGetStackLimits+0x14
    0xffff8a85fd68ada0 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ada8 : 0xfffff802aab4e00c : nt!RtlGetExtendedContextLength+0x34
    0xffff8a85fd68adb8 : 0xfffff802aaaac8a8 : nt!MiInPagePageTable+0x178
    0xffff8a85fd68ae38 : 0xfffff802aab4d0bb : nt!KeQueryCurrentStackInformation+0x2b
    0xffff8a85fd68ae48 : 0xfffff802aaeb337c : "nt!Ports <PERF> (nt+0x42637c)"
    0xffff8a85fd68ae80 : 0xffff8a85fd68a920 : 0xffff8a85fd68a840 : 0xfffff802aae9729c : "nt!Ports <PERF> (nt+0x40a29c)"
    0xffff8a85fd68aea8 : 0xfffff802aaae8c76 : nt!MiUnlockWorkingSetShared+0x56
    0xffff8a85fd68af48 : 0xfffff802aae8beb4 : "nt!Ports <PERF> (nt+0x3feeb4)"
    0xffff8a85fd68af70 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af78 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68af98 : 0xfffff802aac47d42 : nt!KiExceptionDispatch+0xc2
    0xffff8a85fd68afb8 : 0xfffff802aab19c61 : nt!ExFreeToNPagedLookasideList+0x15
    0xffff8a85fd68b0b8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0c0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b0e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b178 : 0xfffff802aac448bf : nt!KiPageFault+0x3ff
    0xffff8a85fd68b180 : 0x0000000000400000 :  Trap @ ffff8a85fd68b180
    0xffff8a85fd68b188 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b190 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b1d8 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b208 : 0xfffff802ab2ab300 : nt!IovpInternalCompletionTrap
    0xffff8a85fd68b258 : 0xfffff802aad372a7 : nt!VfTargetDriversGetNode+0x4b
    0xffff8a85fd68b2b0 : 0xfffff802ab2d07c0 : nt!ViIrpCallDriverDataList
    0xffff8a85fd68b2b8 : 0xfffff802aaa9abf1 : nt!ExAllocateFromNPagedLookasideList+0x11
    0xffff8a85fd68b2c8 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b2d8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b2e8 : 0xfffff802ab2a0915 : nt!IovpValidateDeviceObject+0x5
    0xffff8a85fd68b300 : 0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b318 : 0xfffff802ab29fc1e : nt!IovCallDriver+0x16a
    0xffff8a85fd68b328 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b388 : 0xfffff802ab2ad638 : nt!VerifierIofCallDriver+0x28
    0xffff8a85fd68b3a8 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3b0 : 0xfffff8072815a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xffff8a85fd68b3c8 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b3d8 : 0xfffff802ab2ab800 : nt!VfBeforeCallDriver+0x13c
    0xffff8a85fd68b3f8 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b408 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b428 : 0xfffff802aabee12f : nt!ViAvlReleaseTableLockFromDpcLevel+0x2b
    0xffff8a85fd68b478 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b488 : 0xfffff807281476a2 : HIDCLASS!HidpCallDriver+0xa2
    0xffff8a85fd68b498 : 0xfffff802aab4d2d2 : nt!RtlWalkFrameChain+0x72
    0xffff8a85fd68b4a8 : 0xfffff802ab2b0c73 : nt!VfMajorBuildIrpLogEntry+0x33
    0xffff8a85fd68b4c8 : 0xfffff802aab4d3c2 : nt!RtlCaptureStackBackTrace+0x42
    0xffff8a85fd68b4d8 : 0xffffd607582b3318 : 0xfffff802ab2b27b5 : nt!VfAllocPoolNotification+0x31
    0xffff8a85fd68b4e8 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b4f8 : 0xfffff80728147872 : HIDCLASS!HidpIrpMajorDefault+0x102
    0xffff8a85fd68b518 : 0xfffff802ab2b101e : nt!VfMajorVerifyIrpStackDownward+0xb2
    0xffff8a85fd68b538 : 0xffffd6075f425000 :  !da "HID00000009"
    0xffff8a85fd68b558 : 0xfffff80728165237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    0xffff8a85fd68b578 : 0xfffff802ab2aa7be : nt!IovpCallDriver1+0x506
    0xffff8a85fd68b5d8 : 0xfffff802ab2ba5d3 : nt!VfPacketCreateAndLock+0xa7
    0xffff8a85fd68b618 : 0xfffff802aabf4b0a : nt!IopfCallDriver+0x56
    0xffff8a85fd68b648 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b658 : 0xfffff802ab29fd29 : nt!IovCallDriver+0x275
    0xffff8a85fd68b678 : 0xfffff802ab2abcf9 : nt!VfIrpWatermark+0x2d
    0xffff8a85fd68b6d8 : 0xfffff802ab2abc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xffff8a85fd68b748 : 0xfffff802ab2bc12a : nt!VfWmiTestStartedPdoStack+0x5a
    0xffff8a85fd68b7e8 : 0xfffff802ab2b0ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xffff8a85fd68b818 : 0xfffff802aabd30cf : nt!PpvUtilTestStartedPdoStack+0x17
    0xffff8a85fd68b848 : 0xfffff802ab054852 : nt!PipProcessStartPhase3+0xc2
    0xffff8a85fd68b888 : 0xfffff802aabd3034 : nt!PpMarkDeviceStackExtensionFlag+0x54
    0xffff8a85fd68b898 : 0xfffff802aae555e0 : nt!PnpRegistryDeviceResource+0x60
    0xffff8a85fd68b8a8 : 0xfffff802aabd3634 : nt!PipSetDevNodeState+0xe0
    0xffff8a85fd68b8b8 : 0xfffff802ab054430 : nt!IopDoDeferredSetInterfaceState+0x64
    0xffff8a85fd68b8c8 : 0xfffff802aabd32b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b
    0xffff8a85fd68b8d0 : 0xffffe7818188b7c0 : 0xfffff802aae54a30 : nt!PiPnpRtlActiveOperations
    0xffff8a85fd68b8e8 : 0xfffff802ab054372 : nt!PipProcessStartPhase2+0x56
    0xffff8a85fd68b928 : 0xfffff802ab057bd0 : nt!PipProcessDevNodeTree+0x3d0
    0xffff8a85fd68b958 : 0xfffff802aac3e421 : nt!SwapContext+0x411
    0xffff8a85fd68b9b8 : 0xffffd6075f9ed744 :  !du "\WINDOWS\SYSTEM32\WINTRUST.DLL"
    0xffff8a85fd68ba20 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68ba28 : 0xfffff802aab1d82f : nt!ExpAcquireResourceSharedLite+0x19f
    0xffff8a85fd68ba68 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68baa0 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68baa8 : 0xfffff802aab1feb8 : nt!ExReleaseResourceLite+0xc8
    0xffff8a85fd68bac8 : 0xfffff802aab1d5d0 : nt!ExAcquireResourceSharedLite+0x40
    0xffff8a85fd68bad8 : 0xfffff802aae553e0 : nt!IopDeviceTreeLock
    0xffff8a85fd68bae8 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb08 : 0xfffff802aaff4391 : nt!PpDevNodeUnlockTree+0x19
    0xffff8a85fd68bb28 : 0xfffff802aae55440 : nt!IopDeviceTreeLock+0x60
    0xffff8a85fd68bb38 : 0xfffff802ab053cd0 : nt!PipForDeviceNodeSubtree+0x30
    0xffff8a85fd68bb60 : 0xfffff802ab08d410 : nt!PiMarkDeviceTreeForReenumerationWorker
    0xffff8a85fd68bb78 : 0xfffff802ab05425d : nt!PiMarkDeviceTreeForReenumeration+0x3d
    0xffff8a85fd68bba8 : 0xfffff802ab0542f2 : nt!PiProcessReenumeration+0x82
    0xffff8a85fd68bbb8 : 0xfffff802aab215a7 : nt!ExAcquirePushLockExclusiveEx+0xe7
    0xffff8a85fd68bbf8 : 0xfffff802aabd2beb : nt!PnpDeviceActionWorker+0x1eb
    0xffff8a85fd68bc48 : 0xfffff802aab42ea6 : nt!KeRemovePriQueue+0x186
    0xffff8a85fd68bc80 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bc90 : 0xfffff802aaef5240 : nt!ExNode0
    0xffff8a85fd68bcb0 : 0xfffff802aabd2a00 : nt!PnpDeviceActionWorker
    0xffff8a85fd68bcb8 : 0xfffff802aab42b05 : nt!ExpWorkerThread+0xf5
    0xffff8a85fd68bcd0 : 0xfffff802aae53d20 : nt!PnpDeviceEnumerationWorkItem
    0xffff8a85fd68bcf8 : 0xffffd60757c740e0 : 0xffffd60757c84260 : 0xfffff802aae5bf40 : nt!MiSystemPartition
    0xffff8a85fd68bd18 : 0xfffff802aaf426f7 : nt!PspDisablePrimaryTokenExchange+0x27
    0xffff8a85fd68bd40 : 0xfffff802aab42a10 : nt!ExpWorkerThread
    0xffff8a85fd68bd48 : 0xfffff802aabbd2d7 : nt!PspSystemThreadStartup+0x47
    0xffff8a85fd68bd98 : 0xfffff802aac3e516 : nt!KiStartSystemThread+0x16
    0xffff8a85fd68bdb0 : 0xfffff802aabbd290 : nt!PspSystemThreadStartup
    
    1: kd> knL
     # Child-SP          RetAddr           Call Site
    00 ffff8a85`fd68a118 fffff802`aac4e456 nt!KeBugCheckEx
    01 ffff8a85`fd68a120 fffff802`aac13d5f nt!PspSystemThreadStartup$filt$0+0x44
    02 ffff8a85`fd68a160 fffff802`aac3f94d nt!_C_specific_handler+0x9f
    03 ffff8a85`fd68a1d0 fffff802`aab4bb16 nt!RtlpExecuteHandlerForException+0xd
    04 ffff8a85`fd68a200 fffff802`aab4d613 nt!RtlDispatchException+0x416
    05 ffff8a85`fd68a8f0 fffff802`aac47d42 nt!KiDispatchException+0x1f3
    06 ffff8a85`fd68afa0 fffff802`aac448bf nt!KiExceptionDispatch+0xc2
    07 ffff8a85`fd68b180 fffff802`ab2a0915 nt!KiPageFault+0x3ff
    08 ffff8a85`fd68b318 fffff802`ab29fc1e nt!IovpValidateDeviceObject+0x5
    09 ffff8a85`fd68b320 fffff802`aaca2949 nt!IovCallDriver+0x16a
    0a ffff8a85`fd68b360 fffff802`ab2ad638 nt!IofCallDriverSpecifyReturn+0xadeb9
    0b ffff8a85`fd68b390 fffff802`aabf4b0a nt!VerifierIofCallDriver+0x28
    0c ffff8a85`fd68b3d0 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    0d ffff8a85`fd68b410 fffff802`aac727bb nt!IovCallDriver+0x275
    0e ffff8a85`fd68b450 fffff807`281476a2 nt!IofCallDriver+0x14c9ab
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    10 ffff8a85`fd68b500 fffff807`28165237 HIDCLASS!HidpIrpMajorDefault+0x102
    11 ffff8a85`fd68b560 fffff807`2814456d HIDCLASS!HidpIrpMajorSystemControl+0x5b
    12 ffff8a85`fd68b590 fffff802`aabf4b0a HIDCLASS!HidpMajorHandler+0x290d
    13 ffff8a85`fd68b620 fffff802`ab29fd29 nt!IopfCallDriver+0x56
    14 ffff8a85`fd68b660 fffff802`aac727bb nt!IovCallDriver+0x275
    15 ffff8a85`fd68b6a0 fffff802`ab2abc55 nt!IofCallDriver+0x14c9ab
    16 ffff8a85`fd68b6e0 fffff802`ab2bc12a nt!VfIrpSendSynchronousIrp+0x109
    17 ffff8a85`fd68b750 fffff802`ab2b0ecc nt!VfWmiTestStartedPdoStack+0x5a
    18 ffff8a85`fd68b7f0 fffff802`aabd30cf nt!VfMajorTestStartedPdoStack+0x58
    19 ffff8a85`fd68b820 fffff802`ab054852 nt!PpvUtilTestStartedPdoStack+0x17
    1a ffff8a85`fd68b850 fffff802`ab057bd0 nt!PipProcessStartPhase3+0xc2
    1b ffff8a85`fd68b930 fffff802`ab0542f2 nt!PipProcessDevNodeTree+0x3d0
    1c ffff8a85`fd68bbb0 fffff802`aabd2beb nt!PiProcessReenumeration+0x82
    1d ffff8a85`fd68bc00 fffff802`aab42b05 nt!PnpDeviceActionWorker+0x1eb
    1e ffff8a85`fd68bcc0 fffff802`aabbd2d7 nt!ExpWorkerThread+0xf5
    1f ffff8a85`fd68bd50 fffff802`aac3e516 nt!PspSystemThreadStartup+0x47
    20 ffff8a85`fd68bda0 00000000`00000000 nt!KiStartSystemThread+0x16
    1: kd> .frame /r 0f
    0f ffff8a85`fd68b490 fffff807`28147872 HIDCLASS!HidpCallDriver+0xa2
    rax=ffffd6075b953200 rbx=ffffd6075f4241b0 rcx=00000000046dc232
    rdx=0000000000000000 rsi=ffffd6075f424060 rdi=ffffd6075b953200
    rip=fffff807281476a2 rsp=ffff8a85fd68b490 rbp=0000000000000017
     r8=0000000000000000  r9=0000000000000000 r10=fffff802ab2d07c0
    r11=0000000000000000 r12=fffff8072815a140 r13=fffff8072815a140
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
    HIDCLASS!HidpCallDriver+0xa2:
    fffff807`281476a2 488bcb          mov     rcx,rbx
    1: kd> !irp ffffd6075b953200
    Irp is active with 3 stacks 3 is current (= 0xffffd6075b953360)
     No Mdl: No System Buffer: Thread 00000000:  Irp stack trace.  
         cmd  flg cl Device   File     Completion-Context
     [N/A(0), N/A(0)]
                0 10 00000000 00000000 00000000-00000000    
    
    			Args: 00000000 00000000 00000000 00000000
     [IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f420b70 00000000 fffff802ab2ab300-ffffd6075b953360 Success Error Cancel 
    	       \Driver\LGBusEnum	nt!IovpInternalCompletionTrap
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    >[IRP_MJ_SYSTEM_CONTROL(17), IRP_MN_???(ff)]
                0 e0 ffffd6075f424060 00000000 fffff802ab2abf40-ffff8a85fd68b710 Success Error Cancel 
    	       \Driver\LGVirHid	nt!ViIrpSynchronousCompletionRoutine
    			Args: ffffd6075f420b70 00000000 00000000 00000000
    
    Irp Extension present at 0xffffd6075b9533a8:
    1: kd> !devobj ffffd6075f420b70
    Device object (ffffd6075f420b70) is for:
     0000008c \Driver\LGBusEnum DriverObject ffffd6075ae6e790
    Current Irp 00000000 RefCount 0 Type 0000002a Flags 00003040
    SecurityDescriptor ffffe781870c6f20 DevExt ffffd6075f420cc0 DevObjExt ffffd6075f420de0 DevNode ffffd6075f4201d0 
    ExtensionFlags (0xc1000000)  DOE_BOTTOM_OF_FDO_STACK, DOE_DESIGNATED_FDO
                                 Unknown flags 0x01000000
    Characteristics (0x00000080)  FILE_AUTOGENERATED_DEVICE_NAME
    AttachedDevice (Upper) ffffd6075f424060 \Driver\LGVirHid
    Device queue is not busy.
    1: kd> !devnode ffffd6075f4201d0
    DevNode 0xffffd6075f4201d0 for PDO 0xffffd6075f420b70
      Parent 0xffffd60758c02810   Sibling 0000000000   Child 0000000000   
      InstancePath is "LogiDevice\VID_046D&PID_C232\1&79f5d87&0&01"
      ServiceName is "LGVirHid"
      State = DeviceNodeStartPostWork (0x307)
      Previous State = DeviceNodeStartCompletion (0x306)
      StateHistory[05] = DeviceNodeStartCompletion (0x306)
      StateHistory[04] = DeviceNodeStartPending (0x305)
      StateHistory[03] = DeviceNodeResourcesAssigned (0x304)
      StateHistory[02] = DeviceNodeDriversAdded (0x303)
      StateHistory[01] = DeviceNodeInitialized (0x302)
      StateHistory[00] = DeviceNodeUninitialized (0x301)
      StateHistory[19] = Unknown State (0x0)
      StateHistory[18] = Unknown State (0x0)
      StateHistory[17] = Unknown State (0x0)
      StateHistory[16] = Unknown State (0x0)
      StateHistory[15] = Unknown State (0x0)
      StateHistory[14] = Unknown State (0x0)
      StateHistory[13] = Unknown State (0x0)
      StateHistory[12] = Unknown State (0x0)
      StateHistory[11] = Unknown State (0x0)
      StateHistory[10] = Unknown State (0x0)
      StateHistory[09] = Unknown State (0x0)
      StateHistory[08] = Unknown State (0x0)
      StateHistory[07] = Unknown State (0x0)
      StateHistory[06] = Unknown State (0x0)
      Flags (0x6c000138)  DNF_REENUMERATE, DNF_ENUMERATED, 
                          DNF_IDS_QUERIED, DNF_NO_RESOURCE_REQUIRED, 
                          DNF_NO_LOWER_DEVICE_FILTERS, DNF_NO_LOWER_CLASS_FILTERS, 
                          DNF_NO_UPPER_DEVICE_FILTERS, DNF_NO_UPPER_CLASS_FILTERS
      CapabilityFlags (0x00000290)  Removable, SilentInstall, 
                                    SurpriseRemovalOK
    1: kd> lmvm LGBusEnum
    Browse full module list
    start             end                 module name
    fffff807`261a0000 fffff807`261a4e00   LGBusEnum   (no symbols)           
        Loaded symbol image file: LGBusEnum.sys
        Image path: \SystemRoot\system32\drivers\LGBusEnum.sys
        Image name: LGBusEnum.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:08 2016 (575EFFAC)
        CheckSum:         00012B72
        ImageSize:        00004E00
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    1: kd> lmvm LGVirHid
    Browse full module list
    start             end                 module name
    fffff807`27700000 fffff807`27702500   LGVirHid   (no symbols)           
        Loaded symbol image file: LGVirHid.sys
        Image path: \SystemRoot\system32\drivers\LGVirHid.sys
        Image name: LGVirHid.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jun 13 11:47:03 2016 (575EFFA7)
        CheckSum:         0000BE50
        ImageSize:        00002500
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    So update:
    Logitech SetPoint (check updates in program or visit SetPoint – Logitech Support + Download)
    update:

    Thank you a lot Mr.
    i have updated at the last version the G-hub..but then the bsod still occurs, the only way is been remove totaly the g-hub software+syss, i hope that with future versions Logitech can fix the problem, but i have read around that this kind of problem still there was on the previous version of windows...bah ! :)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 17:32.
Find Us




Windows 10 Forums