BSOD hidclass.syss with verifier enabled

Page 1 of 2 12 LastLast

  1. Posts : 8
    win10
       #1

    BSOD hidclass.syss with verifier enabled


    Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.

    //win10 version 1903

    Hello :)

    i have enabled "verifier" to check my PC behaviour; well at the start of the system it gives me Always this bsod.

    I have tried to:

    - unplug all usb things
    - sfc /scannow and chkdsk
    - reinstall in place of Windows

    No results.

    Thanks in advance of all your replies.

    Cheers
      My Computer


  2. Posts : 14,894
    Windows 10 Pro
       #2

    Hi DocSams,

    Could you upload the memory dump, C:\Windows\MEMORY.dmp, to onedrive and post a share link. The minidumps provided severely lack in data.

    If you haven't yet, please disable driver verifier.
    Resetting driver verifier options (recommended in this order)
    1. In normal mode open an administrator command prompt and enter the below command
    2. In safe mode open an administrator command prompt and enter the below command
    3. On 3 boot failures, you'll boot automatically to the recovery options,
      • click Troubleshoot
      • go to the advanced options
      • choose command prompt
      • enter the below command
    4. Boot with the recovery media, see above 4 steps in option 3.
    5. Via the recovery options or recovery media, select a restore point prior enabling driver verifier

    Code:
    verifier /reset
      My Computers


  3. Posts : 8
    win10
    Thread Starter
       #3

    this is the last dmp, Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.

    i have made a no-reduction of memory kernel dmp for that link,

    also i am uploading the memory.dmp...but it has got 16gb; is it correct ?
      My Computer


  4. Posts : 14,894
    Windows 10 Pro
       #4

    That sounds like you have configured a full memory dump, which implies that everything present in the memory is 'dumped' during the crash. Unfortunately most of the data a full memory dump may contain is useless for the public, because it is about usermode (non-administrator software) for which the resources to look into them is private for the developers.
      My Computers


  5. Posts : 1,479
    Windows 8.1 Enterprise x64
       #5

    Did you enable in Driver Verifier "I/O Verification" option? If yes try also enable "Enhanced I/O Verification"
      My Computer


  6. Posts : 8
    win10
    Thread Starter
       #6

    Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.

    this is another dmp file with a driver verifier more "simple" in selection of drivers, like the guides say
      My Computer


  7. Posts : 14,894
    Windows 10 Pro
       #7

    Please ensure you have the option 'Kernel Memory Dump' selected in the startup and recovery settings.
    Configure Windows 10 to Create Minidump on BSOD

    After verifying and/or changing the setting to Kernel Memory Dump, wait for another crash for a memory dump of a more reasonable size to be created. After another crash has happened, please upload the memory dump located in C:\Windows\MEMORY.dmp to onedrive and post a share link. This file should be about up to 5 GB large.
      My Computers


  8. Posts : 1,479
    Windows 8.1 Enterprise x64
       #8

    OK, let's take a look at this:
    Code:
    Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\michal01\Downloads\101219-5703-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Machine Name:
    Kernel base = 0xfffff800`1fc0f000 PsLoadedModuleList = 0xfffff800`1ffbd150
    Debug session time: Sat Oct 12 18:03:22.825 2019 (UTC + 2:00)
    System Uptime: 0 days 0:00:49.730
    Loading Kernel Symbols
    ..
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    .............................................................
    ................................................................
    ................................................................
    .........
    Loading User Symbols
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    1: kd> !analyze
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {ffffffffc0000005, fffff80020422915, fffffd846b9c3d68, fffffd846b9c35b0}
    
    Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 )
    
    Followup:     MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff80020422915, The address that the exception occurred at
    Arg3: fffffd846b9c3d68, Exception Record Address
    Arg4: fffffd846b9c35b0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : AV.Fault
        Value: Read
    
    
    PROCESSES_ANALYSIS: 1
    
    SERVICE_ANALYSIS: 1
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  10.0.17134.523 (WinBuild.160101.0800)
    
    DUMP_FILE_ATTRIBUTES: 0x8
      Kernel Generated Triage Dump
    
    DUMP_TYPE:  2
    
    BUGCHECK_P1: ffffffffc0000005
    
    BUGCHECK_P2: fffff80020422915
    
    BUGCHECK_P3: fffffd846b9c3d68
    
    BUGCHECK_P4: fffffd846b9c35b0
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!IovpValidateDeviceObject+5
    fffff800`20422915 66833903        cmp     word ptr [rcx],3
    
    EXCEPTION_RECORD:  fffffd846b9c3d68 -- (.exr 0xfffffd846b9c3d68)
    ExceptionAddress: fffff80020422915 (nt!IovpValidateDeviceObject+0x0000000000000005)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: 00000000046dc232
    Attempt to read from address 00000000046dc232
    
    CONTEXT:  fffffd846b9c35b0 -- (.cxr 0xfffffd846b9c35b0)
    rax=ffffca81cda18d80 rbx=ffffca81cda18d80 rcx=00000000046dc232
    rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffcb8c2233ada0
    rip=fffff80020422915 rsp=fffffd846b9c3fa8 rbp=fffff8002043fab8
     r8=0000000000000000  r9=0000000000000000 r10=fffff800204527c0
    r11=0000000000000000 r12=fffff80396d1a140 r13=fffff80396d1a140
    r14=0000000000000000 r15=0000000000400000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IovpValidateDeviceObject+0x5:
    fffff800`20422915 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
    Resetting default scope
    
    CPU_COUNT: 8
    
    CPU_MHZ: c80
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 1a
    
    CPU_STEPPING: 5
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    FOLLOWUP_IP: 
    HIDCLASS!HidpCallDriver+a2
    fffff803`96d076a2 488bcb          mov     rcx,rbx
    
    BUGCHECK_STR:  AV
    
    READ_ADDRESS: fffff8002005c388: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
     00000000046dc232 
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    EXCEPTION_CODE_STR:  c0000005
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  00000000046dc232
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  10-12-2019 19:52:50.0246
    
    ANALYSIS_VERSION: 10.0.18362.1 amd64fre
    
    LOCK_ADDRESS:  fffff8001ffd7460 -- (!locks fffff8001ffd7460)
    Cannot get _ERESOURCE type
    
    Resource @ nt!PiEngineLock (0xfffff8001ffd7460)    Available
    1 total locks
    
    PNP_TRIAGE_DATA: 
    	Lock address  : 0xfffff8001ffd7460
    	Thread Count  : 0
    	Thread address: 0x0000000000000000
    	Thread wait   : 0x0
    
    LAST_CONTROL_TRANSFER:  from fffff80020421c1e to fffff80020422915
    
    STACK_TEXT:  
    fffffd84`6b9c3fa8 fffff800`20421c1e : ffffca81`cda18d80 00000000`00000002 ffffcb8c`21f6a4c0 ffffcb8c`1e76a530 : nt!IovpValidateDeviceObject+0x5
    fffffd84`6b9c3fb0 fffff800`1fe24949 : 00000000`00000017 00000000`00000000 ffffcb8c`1e76a530 ffffcb8c`2233ada0 : nt!IovCallDriver+0x16a
    fffffd84`6b9c3ff0 fffff803`930b53b3 : ffffcb8c`1e7582b8 fffff800`2043b613 fffff800`2044028b ffffcb8c`1e758010 : nt!IofCallDriverSpecifyReturn+0xadeb9
    fffffd84`6b9c4020 fffff800`2042f631 : ffffcb8c`21ebb1a0 fffff800`2042c7be ffffca81`cda18ee0 ffffca81`cda18ee0 : VerifierExt!IofCallDriver_internal_wrapper+0x13
    fffffd84`6b9c4050 fffff800`2043fab8 : fffffd84`00000001 fffffd84`6b9c40a8 ffffca81`cda18ee0 ffffcb8c`1e758150 : nt!VerifierIofCallDriver+0x21
    fffffd84`6b9c4090 fffff800`2043ff76 : 00000000`00000000 fffff803`96d1a140 fffff803`96d1a140 ffffcb8c`21ebb1a0 : nt!ViGenericDispatchHandler+0x54
    fffffd84`6b9c40d0 fffff800`1fd76b0a : 00000000`00000000 fffff800`2042d800 ffffca81`00000000 ffffca81`00000000 : nt!ViGenericSystemControl+0x16
    fffffd84`6b9c4100 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`1e76a530 ffffcb8c`222ec010 fffff800`2042c7be : nt!IopfCallDriver+0x56
    fffffd84`6b9c4140 fffff800`1fdf47bb : ffffca81`cda18d80 00000000`00000000 ffffcb8c`1e77d990 ffffcb8c`21ebb1a0 : nt!IovCallDriver+0x275
    fffffd84`6b9c4180 fffff800`2044028b : ffffca81`cda18d80 00000000`00000000 ffffcb8c`1e77d990 fffff803`96d1a140 : nt!IofCallDriver+0x14c9ab
    fffffd84`6b9c41c0 fffff800`1fd76b0a : ffffcb8c`1e77dae0 ffffca81`cda18d80 ffffca81`00000000 ffffca81`00000000 : nt!ViFilterDispatchGeneric+0xbb
    fffffd84`6b9c4200 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`1e77d990 00000000`00000000 00000000`00000001 : nt!IopfCallDriver+0x56
    fffffd84`6b9c4240 fffff800`1fe24949 : ffffcb8c`223aa1b0 00000000`00000017 ffffcb8c`223aa060 ffffcb8c`222ec010 : nt!IovCallDriver+0x275
    fffffd84`6b9c4280 fffff803`930b53b3 : 00000000`00000000 fffff800`20424b5b 00000000`00000000 00000000`00000000 : nt!IofCallDriverSpecifyReturn+0xadeb9
    fffffd84`6b9c42b0 fffff800`2042f631 : 00000000`00000000 fffff800`20432dc4 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x13
    fffffd84`6b9c42e0 fffff803`96d076a2 : ffffcb8c`1e7582b8 00000000`00000000 ffffc480`00000000 fffff800`1fe73cd1 : nt!VerifierIofCallDriver+0x21
    fffffd84`6b9c4320 fffff803`96d07872 : ffffca81`cda18d80 ffffca81`cda18d80 00000000`00000000 00000001`00000000 : HIDCLASS!HidpCallDriver+0xa2
    fffffd84`6b9c4390 fffff803`96d25237 : ffffcb8c`223aa1b0 ffffcb8c`1e758010 ffffca81`cda18f28 fffff800`2044028b : HIDCLASS!HidpIrpMajorDefault+0x102
    fffffd84`6b9c43f0 fffff803`96d0456d : ffffcb8c`00000002 ffffcb8c`223aa1d0 00000000`00000004 ffffcb8c`223aa1b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    fffffd84`6b9c4420 fffff800`2043fab8 : 00000000`00000017 00000000`00000000 ffffcb8c`1fe98010 ffffcb8c`1e758240 : HIDCLASS!HidpMajorHandler+0x290d
    fffffd84`6b9c44b0 fffff800`2043ff76 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffcb8c`1fe98010 : nt!ViGenericDispatchHandler+0x54
    fffffd84`6b9c44f0 fffff800`1fd76b0a : 00000000`00000000 fffff800`2042d800 ffffca81`00000000 ffffca81`00000000 : nt!ViGenericSystemControl+0x16
    fffffd84`6b9c4520 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`223aa060 ffffcb8c`22266aa0 fffff800`2042c7be : nt!IopfCallDriver+0x56
    fffffd84`6b9c4560 fffff800`1fdf47bb : ffffca81`cda18d80 00000000`00000000 ffffcb8c`223b81c0 ffffcb8c`1fe98010 : nt!IovCallDriver+0x275
    fffffd84`6b9c45a0 fffff800`2044028b : ffffca81`cda18d80 00000000`00000000 ffffcb8c`223b81c0 00000000`00000000 : nt!IofCallDriver+0x14c9ab
    fffffd84`6b9c45e0 fffff800`1fd76b0a : ffffcb8c`223b8310 ffffca81`cda18d80 ffffca81`00000001 ffffca81`00000001 : nt!ViFilterDispatchGeneric+0xbb
    fffffd84`6b9c4620 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`223b81c0 00000000`00000001 fffff800`2042dcf9 : nt!IopfCallDriver+0x56
    fffffd84`6b9c4660 fffff800`1fdf47bb : ffffca81`cda18d80 ffffcb8c`223b81c0 00000000`00000000 ffffcb8c`22266aa0 : nt!IovCallDriver+0x275
    fffffd84`6b9c46a0 fffff800`2042dc55 : ffffcb8c`1e76a530 fffffd84`6b9c48c9 00000000`00000000 ffffb381`00000000 : nt!IofCallDriver+0x14c9ab
    fffffd84`6b9c46e0 fffff800`2043e12a : ffffcb8c`1e76a530 fffffd84`6b9c48c9 00000000`00000001 ffffcb8c`1e76a530 : nt!VfIrpSendSynchronousIrp+0x109
    fffffd84`6b9c4750 fffff800`20432ecc : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 ffffcb8c`1e76a530 : nt!VfWmiTestStartedPdoStack+0x5a
    fffffd84`6b9c47f0 fffff800`1fd550cf : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58
    fffffd84`6b9c4820 fffff800`201d6852 : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 fffffd84`6b9c48c9 : nt!PpvUtilTestStartedPdoStack+0x17
    fffffd84`6b9c4850 fffff800`201d9bd0 : ffffcb8c`21f80850 fffffd84`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2
    fffffd84`6b9c4930 fffff800`201d62f2 : ffffcb8c`222b05b0 fffff800`1fca35a7 ffffcb8c`22325040 ffffcb8c`222b0600 : nt!PipProcessDevNodeTree+0x3d0
    fffffd84`6b9c4bb0 fffff800`1fd54beb : ffffcb01`00000003 ffffcb8c`1be8c300 ffffcb8c`222b05b0 00000000`00000000 : nt!PiProcessReenumeration+0x82
    fffffd84`6b9c4c00 fffff800`1fcc4b05 : ffffcb8c`22325040 ffffcb8c`1ae7fad0 fffff800`1ffd5d20 ffffcb8c`1ae7fad0 : nt!PnpDeviceActionWorker+0x1eb
    fffffd84`6b9c4cc0 fffff800`1fd3f2d7 : ffffcb8c`22325040 00000000`00000080 ffffcb8c`1ae95040 ffffcb8c`22325040 : nt!ExpWorkerThread+0xf5
    fffffd84`6b9c4d50 fffff800`1fdc0516 : fffff800`1fb57180 ffffcb8c`22325040 fffff800`1fd3f290 00000000`00000246 : nt!PspSystemThreadStartup+0x47
    fffffd84`6b9c4da0 00000000`00000000 : fffffd84`6b9c5000 fffffd84`6b9bf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  de01f4235fdbc9755248d940d6cb139534085dcc
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ff3f35a23b6ac0ad9aad82a755b67e133e0c8304
    
    THREAD_SHA1_HASH_MOD:  d4805119c5fae2f7bd376c36487c7fbf7dbdaf7c
    
    FAULT_INSTR_CODE:  8bcb8b48
    
    SYMBOL_STACK_INDEX:  10
    
    SYMBOL_NAME:  HIDCLASS!HidpCallDriver+a2
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: HIDCLASS
    
    IMAGE_NAME:  HIDCLASS.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    IMAGE_VERSION:  10.0.17134.1
    
    STACK_COMMAND:  .cxr 0xfffffd846b9c35b0 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  a2
    
    FAILURE_BUCKET_ID:  AV_HIDCLASS!HidpCallDriver
    
    BUCKET_ID:  AV_HIDCLASS!HidpCallDriver
    
    PRIMARY_PROBLEM_CLASS:  AV_HIDCLASS!HidpCallDriver
    
    TARGET_TIME:  2019-10-12T16:03:22.000Z
    
    OSBUILD:  17134
    
    OSSERVICEPACK:  523
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2019-01-01 07:44:13
    
    BUILDDATESTAMP_STR:  160101.0800
    
    BUILDLAB_STR:  WinBuild
    
    BUILDOSVER_STR:  10.0.17134.523
    
    ANALYSIS_SESSION_ELAPSED_TIME:  1472
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_hidclass!hidpcalldriver
    
    FAILURE_ID_HASH:  {09223f76-66f9-c8bc-7ce8-d669ecd11026}
    
    Followup:     MachineOwner
    ---------
    
    1: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    1: kd> !dpx
    Start memory scan  : 0xfffffd846b9c3fa8 ($csp)
    End memory scan    : 0xfffffd846b9c5000 (Kernel Stack Base)
    
                   rsp : 0xfffffd846b9c3fa8 : 0xfffff80020421c1e : nt!IovCallDriver+0x16a
    0xfffffd846b9c3fa8 : 0xfffff80020421c1e : nt!IovCallDriver+0x16a
    0xfffffd846b9c4018 : 0xfffff803930b53b3 : VerifierExt!IofCallDriver_internal_wrapper+0x13
    0xfffffd846b9c4028 : 0xfffff8002043b613 : nt!VfIrpDatabaseEntryReleaseLock+0xf7
    0xfffffd846b9c4030 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4048 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
    0xfffffd846b9c4058 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
    0xfffffd846b9c4088 : 0xfffff8002043fab8 : nt!ViGenericDispatchHandler+0x54
    0xfffffd846b9c40b8 : 0xfffffd846b9c42d8 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
    0xfffffd846b9c40c8 : 0xfffff8002043ff76 : nt!ViGenericSystemControl+0x16
    0xfffffd846b9c40d8 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xfffffd846b9c40e0 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xfffffd846b9c40f8 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
    0xfffffd846b9c4108 : 0xfffff8002042d800 : nt!VfBeforeCallDriver+0x13c
    0xfffffd846b9c4128 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4138 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
    0xfffffd846b9c4158 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
    0xfffffd846b9c41b8 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c41d8 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
    0xfffffd846b9c41f8 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
    0xfffffd846b9c4228 : 0xfffff80396d076a2 : HIDCLASS!HidpCallDriver+0xa2
    0xfffffd846b9c4238 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
    0xfffffd846b9c42a8 : 0xfffff803930b53b3 : VerifierExt!IofCallDriver_internal_wrapper+0x13
    0xfffffd846b9c42b8 : 0xfffff80020424b5b : nt!ViGenericIsValidIrpStatus+0xb
    0xfffffd846b9c42d8 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
    0xfffffd846b9c42e8 : 0xfffff80020432dc4 : nt!VfMajorIsValidIrpStatus+0x64
    0xfffffd846b9c4308 : 0xfffff8001fe73d17 : nt!MiSetOriginalPtePfnFromFreeList+0x17
    0xfffffd846b9c4318 : 0xfffff80396d076a2 : HIDCLASS!HidpCallDriver+0xa2
    0xfffffd846b9c4338 : 0xfffff8001fe73cd1 : nt!MiSetFreshPfnFromFreeList+0xd
    0xfffffd846b9c4388 : 0xfffff80396d07872 : HIDCLASS!HidpIrpMajorDefault+0x102
    0xfffffd846b9c43b8 : 0xfffff8001fc893ec : nt!MiFinalizePageAttribute+0x28
    0xfffffd846b9c43e8 : 0xfffff80396d25237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
    0xfffffd846b9c4408 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4448 : 0xfffff8002043b613 : nt!VfIrpDatabaseEntryReleaseLock+0xf7
    0xfffffd846b9c4450 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4478 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
    0xfffffd846b9c44a8 : 0xfffff8002043fab8 : nt!ViGenericDispatchHandler+0x54
    0xfffffd846b9c44e8 : 0xfffff8002043ff76 : nt!ViGenericSystemControl+0x16
    0xfffffd846b9c4518 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
    0xfffffd846b9c4528 : 0xfffff8002042d800 : nt!VfBeforeCallDriver+0x13c
    0xfffffd846b9c4548 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4558 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
    0xfffffd846b9c4578 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
    0xfffffd846b9c45d8 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
    0xfffffd846b9c4618 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
    0xfffffd846b9c4648 : 0xfffff8002042dc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xfffffd846b9c4658 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
    0xfffffd846b9c4678 : 0xfffff8002042dcf9 : nt!VfIrpWatermark+0x2d
    0xfffffd846b9c46d8 : 0xfffff8002042dc55 : nt!VfIrpSendSynchronousIrp+0x109
    0xfffffd846b9c4748 : 0xfffff8002043e12a : nt!VfWmiTestStartedPdoStack+0x5a
    0xfffffd846b9c47e8 : 0xfffff80020432ecc : nt!VfMajorTestStartedPdoStack+0x58
    0xfffffd846b9c4818 : 0xfffff8001fd550cf : nt!PpvUtilTestStartedPdoStack+0x17
    0xfffffd846b9c4848 : 0xfffff800201d6852 : nt!PipProcessStartPhase3+0xc2
    0xfffffd846b9c4888 : 0xfffff8001fd55034 : nt!PpMarkDeviceStackExtensionFlag+0x54
    0xfffffd846b9c4898 : 0xfffff8001ffd75e0 : nt!PnpRegistryDeviceResource+0x60
    0xfffffd846b9c48a8 : 0xfffff8001fd55634 : nt!PipSetDevNodeState+0xe0
    0xfffffd846b9c48b8 : 0xfffff800201d6430 : nt!IopDoDeferredSetInterfaceState+0x64
    0xfffffd846b9c48c8 : 0xfffff8001fd552b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b
    0xfffffd846b9c48e8 : 0xfffff800201d6372 : nt!PipProcessStartPhase2+0x56
    0xfffffd846b9c4928 : 0xfffff800201d9bd0 : nt!PipProcessDevNodeTree+0x3d0
    0xfffffd846b9c4958 : 0xfffff8001fdbfa66 : nt!KiIpiInterrupt+0x326
    0xfffffd846b9c4960 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
    0xfffffd846b9c49b8 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
    0xfffffd846b9c4a20 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
    0xfffffd846b9c4a28 : 0xfffff8001fc9f82f : nt!ExpAcquireResourceSharedLite+0x19f
    0xfffffd846b9c4a68 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
    0xfffffd846b9c4aa0 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
    0xfffffd846b9c4aa8 : 0xfffff8001fca1eb8 : nt!ExReleaseResourceLite+0xc8
    0xfffffd846b9c4ac8 : 0xfffff8001fc9f5d0 : nt!ExAcquireResourceSharedLite+0x40
    0xfffffd846b9c4ad8 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
    0xfffffd846b9c4ae8 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
    0xfffffd846b9c4b08 : 0xfffff80020176391 : nt!PpDevNodeUnlockTree+0x19
    0xfffffd846b9c4b28 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
    0xfffffd846b9c4b38 : 0xfffff800201d5cd0 : nt!PipForDeviceNodeSubtree+0x30
    0xfffffd846b9c4b58 : 0xfffff8002010ddf5 : nt!ObpFreeObject+0x195
    0xfffffd846b9c4b60 : 0xfffff8002020f410 : nt!PiMarkDeviceTreeForReenumerationWorker
    0xfffffd846b9c4b78 : 0xfffff800201d625d : nt!PiMarkDeviceTreeForReenumeration+0x3d
    0xfffffd846b9c4ba8 : 0xfffff800201d62f2 : nt!PiProcessReenumeration+0x82
    0xfffffd846b9c4bb8 : 0xfffff8001fca35a7 : nt!ExAcquirePushLockExclusiveEx+0xe7
    0xfffffd846b9c4bf8 : 0xfffff8001fd54beb : nt!PnpDeviceActionWorker+0x1eb
    0xfffffd846b9c4c48 : 0xfffff8001fcc4ea6 : nt!KeRemovePriQueue+0x186
    0xfffffd846b9c4c80 : 0xfffff80020077240 : nt!ExNode0
    0xfffffd846b9c4c90 : 0xfffff80020077240 : nt!ExNode0
    0xfffffd846b9c4cb0 : 0xfffff8001fd54a00 : nt!PnpDeviceActionWorker
    0xfffffd846b9c4cb8 : 0xfffff8001fcc4b05 : nt!ExpWorkerThread+0xf5
    0xfffffd846b9c4cd0 : 0xfffff8001ffd5d20 : nt!PnpDeviceEnumerationWorkItem
    0xfffffd846b9c4d18 : 0xfffff800200c46f7 : nt!PspDisablePrimaryTokenExchange+0x27
    0xfffffd846b9c4d40 : 0xfffff8001fcc4a10 : nt!ExpWorkerThread
    0xfffffd846b9c4d48 : 0xfffff8001fd3f2d7 : nt!PspSystemThreadStartup+0x47
    0xfffffd846b9c4d78 : 0xfffff8001fdc0509 : nt!KiStartSystemThread+0x9
    0xfffffd846b9c4d98 : 0xfffff8001fdc0516 : nt!KiStartSystemThread+0x16
    0xfffffd846b9c4db0 : 0xfffff8001fd3f290 : nt!PspSystemThreadStartup
    
    1: kd> knL
     # Child-SP          RetAddr           Call Site
    00 fffffd84`6b9c3fa8 fffff800`20421c1e nt!IovpValidateDeviceObject+0x5
    01 fffffd84`6b9c3fb0 fffff800`1fe24949 nt!IovCallDriver+0x16a
    02 fffffd84`6b9c3ff0 fffff803`930b53b3 nt!IofCallDriverSpecifyReturn+0xadeb9
    03 fffffd84`6b9c4020 fffff800`2042f631 VerifierExt!IofCallDriver_internal_wrapper+0x13
    04 fffffd84`6b9c4050 fffff800`2043fab8 nt!VerifierIofCallDriver+0x21
    05 fffffd84`6b9c4090 fffff800`2043ff76 nt!ViGenericDispatchHandler+0x54
    06 fffffd84`6b9c40d0 fffff800`1fd76b0a nt!ViGenericSystemControl+0x16
    07 fffffd84`6b9c4100 fffff800`20421d29 nt!IopfCallDriver+0x56
    08 fffffd84`6b9c4140 fffff800`1fdf47bb nt!IovCallDriver+0x275
    09 fffffd84`6b9c4180 fffff800`2044028b nt!IofCallDriver+0x14c9ab
    0a fffffd84`6b9c41c0 fffff800`1fd76b0a nt!ViFilterDispatchGeneric+0xbb
    0b fffffd84`6b9c4200 fffff800`20421d29 nt!IopfCallDriver+0x56
    0c fffffd84`6b9c4240 fffff800`1fe24949 nt!IovCallDriver+0x275
    0d fffffd84`6b9c4280 fffff803`930b53b3 nt!IofCallDriverSpecifyReturn+0xadeb9
    0e fffffd84`6b9c42b0 fffff800`2042f631 VerifierExt!IofCallDriver_internal_wrapper+0x13
    0f fffffd84`6b9c42e0 fffff803`96d076a2 nt!VerifierIofCallDriver+0x21
    10 fffffd84`6b9c4320 fffff803`96d07872 HIDCLASS!HidpCallDriver+0xa2
    11 fffffd84`6b9c4390 fffff803`96d25237 HIDCLASS!HidpIrpMajorDefault+0x102
    12 fffffd84`6b9c43f0 fffff803`96d0456d HIDCLASS!HidpIrpMajorSystemControl+0x5b
    13 fffffd84`6b9c4420 fffff800`2043fab8 HIDCLASS!HidpMajorHandler+0x290d
    14 fffffd84`6b9c44b0 fffff800`2043ff76 nt!ViGenericDispatchHandler+0x54
    15 fffffd84`6b9c44f0 fffff800`1fd76b0a nt!ViGenericSystemControl+0x16
    16 fffffd84`6b9c4520 fffff800`20421d29 nt!IopfCallDriver+0x56
    17 fffffd84`6b9c4560 fffff800`1fdf47bb nt!IovCallDriver+0x275
    18 fffffd84`6b9c45a0 fffff800`2044028b nt!IofCallDriver+0x14c9ab
    19 fffffd84`6b9c45e0 fffff800`1fd76b0a nt!ViFilterDispatchGeneric+0xbb
    1a fffffd84`6b9c4620 fffff800`20421d29 nt!IopfCallDriver+0x56
    1b fffffd84`6b9c4660 fffff800`1fdf47bb nt!IovCallDriver+0x275
    1c fffffd84`6b9c46a0 fffff800`2042dc55 nt!IofCallDriver+0x14c9ab
    1d fffffd84`6b9c46e0 fffff800`2043e12a nt!VfIrpSendSynchronousIrp+0x109
    1e fffffd84`6b9c4750 fffff800`20432ecc nt!VfWmiTestStartedPdoStack+0x5a
    1f fffffd84`6b9c47f0 fffff800`1fd550cf nt!VfMajorTestStartedPdoStack+0x58
    20 fffffd84`6b9c4820 fffff800`201d6852 nt!PpvUtilTestStartedPdoStack+0x17
    21 fffffd84`6b9c4850 fffff800`201d9bd0 nt!PipProcessStartPhase3+0xc2
    22 fffffd84`6b9c4930 fffff800`201d62f2 nt!PipProcessDevNodeTree+0x3d0
    23 fffffd84`6b9c4bb0 fffff800`1fd54beb nt!PiProcessReenumeration+0x82
    24 fffffd84`6b9c4c00 fffff800`1fcc4b05 nt!PnpDeviceActionWorker+0x1eb
    25 fffffd84`6b9c4cc0 fffff800`1fd3f2d7 nt!ExpWorkerThread+0xf5
    26 fffffd84`6b9c4d50 fffff800`1fdc0516 nt!PspSystemThreadStartup+0x47
    27 fffffd84`6b9c4da0 00000000`00000000 nt!KiStartSystemThread+0x16
    1: kd> u nt!IovpValidateDeviceObject+0x5
    nt!IovpValidateDeviceObject+0x5:
    fffff800`20422915 66833903        cmp     word ptr [rcx],3
    fffff800`20422919 7510            jne     nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
    fffff800`2042291b 4883790800      cmp     qword ptr [rcx+8],0
    fffff800`20422920 7409            je      nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
    fffff800`20422922 83790400        cmp     dword ptr [rcx+4],0
    fffff800`20422926 7c03            jl      nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
    fffff800`20422928 b001            mov     al,1
    fffff800`2042292a c3              ret
    1: kd> .frame /r 1
    01 fffffd84`6b9c3fb0 fffff800`1fe24949 nt!IovCallDriver+0x16a
    rax=ffffca81cda18d80 rbx=ffffca81cda18d80 rcx=00000000046dc232
    rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffcb8c2233ada0
    rip=fffff80020421c1e rsp=fffffd846b9c3fb0 rbp=fffff8002043fab8
     r8=0000000000000000  r9=0000000000000000 r10=fffff800204527c0
    r11=0000000000000000 r12=fffff80396d1a140 r13=fffff80396d1a140
    r14=0000000000000000 r15=0000000000400000
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    nt!IovCallDriver+0x16a:
    fffff800`20421c1e 84c0            test    al,al
    Looking at the Exception Record Address we can see that we're attempting to check that the device object pointer which we referenced is valid. In this case, we know that it's now based upon the address which was returned.
    Crash occurred on the function IovpValidateDeviceObject which (after unassembling) shows that it checks the device object all the time. In turn, dropping registers, we see the function called IoCallDriver (https://docs.microsoft.com/en-us/win...-iofcalldriver)
    So I will ask you again. Have you enabled the "I / O Verification" and "Enhanced I / O Verification" options in Driver Verifier? If not, turn off Driver Verifier completely, then turn it on again and turn on these missing options
      My Computer


  9. Posts : 8
    win10
    Thread Starter
       #9

    axe0 said:
    Please ensure you have the option 'Kernel Memory Dump' selected in the startup and recovery settings.
    Configure Windows 10 to Create Minidump on BSOD

    After verifying and/or changing the setting to Kernel Memory Dump, wait for another crash for a memory dump of a more reasonable size to be created. After another crash has happened, please upload the memory dump located in C:\Windows\MEMORY.dmp to onedrive and post a share link. This file should be about up to 5 GB large.
    Microsoft OneDrive - Access files anywhere. Create docs with free Office Online.

    here it is, before for some strange reason it did not give me that dmp
    @MrPepka

    yes those options were enabled, thanks :)
      My Computer


  10. Posts : 1,479
    Windows 8.1 Enterprise x64
       #10

    Update:
    Windows 10 to version 1903 (https://support.microsoft.com/pl-pl/...date-assistant)
    In Driver Verifier enable ALL standard settings and leave these 2 additional options enabled (Force pending I / O requests and IRP Logging)
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 09:14.
Find Us




Windows 10 Forums