OK, let's take a look at this:
Code:
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\michal01\Downloads\101219-5703-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*
Symbol search path is: SRV*
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff800`1fc0f000 PsLoadedModuleList = 0xfffff800`1ffbd150
Debug session time: Sat Oct 12 18:03:22.825 2019 (UTC + 2:00)
System Uptime: 0 days 0:00:49.730
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
1: kd> !analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80020422915, fffffd846b9c3d68, fffffd846b9c35b0}
Probably caused by : HIDCLASS.SYS ( HIDCLASS!HidpCallDriver+a2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80020422915, The address that the exception occurred at
Arg3: fffffd846b9c3d68, Exception Record Address
Arg4: fffffd846b9c35b0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.17134.523 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80020422915
BUGCHECK_P3: fffffd846b9c3d68
BUGCHECK_P4: fffffd846b9c35b0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff800`20422915 66833903 cmp word ptr [rcx],3
EXCEPTION_RECORD: fffffd846b9c3d68 -- (.exr 0xfffffd846b9c3d68)
ExceptionAddress: fffff80020422915 (nt!IovpValidateDeviceObject+0x0000000000000005)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232
CONTEXT: fffffd846b9c35b0 -- (.cxr 0xfffffd846b9c35b0)
rax=ffffca81cda18d80 rbx=ffffca81cda18d80 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffcb8c2233ada0
rip=fffff80020422915 rsp=fffffd846b9c3fa8 rbp=fffff8002043fab8
r8=0000000000000000 r9=0000000000000000 r10=fffff800204527c0
r11=0000000000000000 r12=fffff80396d1a140 r13=fffff80396d1a140
r14=0000000000000000 r15=0000000000400000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!IovpValidateDeviceObject+0x5:
fffff800`20422915 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: c80
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 1a
CPU_STEPPING: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+a2
fffff803`96d076a2 488bcb mov rcx,rbx
BUGCHECK_STR: AV
READ_ADDRESS: fffff8002005c388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000046dc232
ANALYSIS_SESSION_HOST: MICHAL
ANALYSIS_SESSION_TIME: 10-12-2019 19:52:50.0246
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LOCK_ADDRESS: fffff8001ffd7460 -- (!locks fffff8001ffd7460)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8001ffd7460) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8001ffd7460
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80020421c1e to fffff80020422915
STACK_TEXT:
fffffd84`6b9c3fa8 fffff800`20421c1e : ffffca81`cda18d80 00000000`00000002 ffffcb8c`21f6a4c0 ffffcb8c`1e76a530 : nt!IovpValidateDeviceObject+0x5
fffffd84`6b9c3fb0 fffff800`1fe24949 : 00000000`00000017 00000000`00000000 ffffcb8c`1e76a530 ffffcb8c`2233ada0 : nt!IovCallDriver+0x16a
fffffd84`6b9c3ff0 fffff803`930b53b3 : ffffcb8c`1e7582b8 fffff800`2043b613 fffff800`2044028b ffffcb8c`1e758010 : nt!IofCallDriverSpecifyReturn+0xadeb9
fffffd84`6b9c4020 fffff800`2042f631 : ffffcb8c`21ebb1a0 fffff800`2042c7be ffffca81`cda18ee0 ffffca81`cda18ee0 : VerifierExt!IofCallDriver_internal_wrapper+0x13
fffffd84`6b9c4050 fffff800`2043fab8 : fffffd84`00000001 fffffd84`6b9c40a8 ffffca81`cda18ee0 ffffcb8c`1e758150 : nt!VerifierIofCallDriver+0x21
fffffd84`6b9c4090 fffff800`2043ff76 : 00000000`00000000 fffff803`96d1a140 fffff803`96d1a140 ffffcb8c`21ebb1a0 : nt!ViGenericDispatchHandler+0x54
fffffd84`6b9c40d0 fffff800`1fd76b0a : 00000000`00000000 fffff800`2042d800 ffffca81`00000000 ffffca81`00000000 : nt!ViGenericSystemControl+0x16
fffffd84`6b9c4100 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`1e76a530 ffffcb8c`222ec010 fffff800`2042c7be : nt!IopfCallDriver+0x56
fffffd84`6b9c4140 fffff800`1fdf47bb : ffffca81`cda18d80 00000000`00000000 ffffcb8c`1e77d990 ffffcb8c`21ebb1a0 : nt!IovCallDriver+0x275
fffffd84`6b9c4180 fffff800`2044028b : ffffca81`cda18d80 00000000`00000000 ffffcb8c`1e77d990 fffff803`96d1a140 : nt!IofCallDriver+0x14c9ab
fffffd84`6b9c41c0 fffff800`1fd76b0a : ffffcb8c`1e77dae0 ffffca81`cda18d80 ffffca81`00000000 ffffca81`00000000 : nt!ViFilterDispatchGeneric+0xbb
fffffd84`6b9c4200 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`1e77d990 00000000`00000000 00000000`00000001 : nt!IopfCallDriver+0x56
fffffd84`6b9c4240 fffff800`1fe24949 : ffffcb8c`223aa1b0 00000000`00000017 ffffcb8c`223aa060 ffffcb8c`222ec010 : nt!IovCallDriver+0x275
fffffd84`6b9c4280 fffff803`930b53b3 : 00000000`00000000 fffff800`20424b5b 00000000`00000000 00000000`00000000 : nt!IofCallDriverSpecifyReturn+0xadeb9
fffffd84`6b9c42b0 fffff800`2042f631 : 00000000`00000000 fffff800`20432dc4 00000000`00000000 00000000`00000000 : VerifierExt!IofCallDriver_internal_wrapper+0x13
fffffd84`6b9c42e0 fffff803`96d076a2 : ffffcb8c`1e7582b8 00000000`00000000 ffffc480`00000000 fffff800`1fe73cd1 : nt!VerifierIofCallDriver+0x21
fffffd84`6b9c4320 fffff803`96d07872 : ffffca81`cda18d80 ffffca81`cda18d80 00000000`00000000 00000001`00000000 : HIDCLASS!HidpCallDriver+0xa2
fffffd84`6b9c4390 fffff803`96d25237 : ffffcb8c`223aa1b0 ffffcb8c`1e758010 ffffca81`cda18f28 fffff800`2044028b : HIDCLASS!HidpIrpMajorDefault+0x102
fffffd84`6b9c43f0 fffff803`96d0456d : ffffcb8c`00000002 ffffcb8c`223aa1d0 00000000`00000004 ffffcb8c`223aa1b0 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
fffffd84`6b9c4420 fffff800`2043fab8 : 00000000`00000017 00000000`00000000 ffffcb8c`1fe98010 ffffcb8c`1e758240 : HIDCLASS!HidpMajorHandler+0x290d
fffffd84`6b9c44b0 fffff800`2043ff76 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffcb8c`1fe98010 : nt!ViGenericDispatchHandler+0x54
fffffd84`6b9c44f0 fffff800`1fd76b0a : 00000000`00000000 fffff800`2042d800 ffffca81`00000000 ffffca81`00000000 : nt!ViGenericSystemControl+0x16
fffffd84`6b9c4520 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`223aa060 ffffcb8c`22266aa0 fffff800`2042c7be : nt!IopfCallDriver+0x56
fffffd84`6b9c4560 fffff800`1fdf47bb : ffffca81`cda18d80 00000000`00000000 ffffcb8c`223b81c0 ffffcb8c`1fe98010 : nt!IovCallDriver+0x275
fffffd84`6b9c45a0 fffff800`2044028b : ffffca81`cda18d80 00000000`00000000 ffffcb8c`223b81c0 00000000`00000000 : nt!IofCallDriver+0x14c9ab
fffffd84`6b9c45e0 fffff800`1fd76b0a : ffffcb8c`223b8310 ffffca81`cda18d80 ffffca81`00000001 ffffca81`00000001 : nt!ViFilterDispatchGeneric+0xbb
fffffd84`6b9c4620 fffff800`20421d29 : ffffca81`cda18d80 ffffcb8c`223b81c0 00000000`00000001 fffff800`2042dcf9 : nt!IopfCallDriver+0x56
fffffd84`6b9c4660 fffff800`1fdf47bb : ffffca81`cda18d80 ffffcb8c`223b81c0 00000000`00000000 ffffcb8c`22266aa0 : nt!IovCallDriver+0x275
fffffd84`6b9c46a0 fffff800`2042dc55 : ffffcb8c`1e76a530 fffffd84`6b9c48c9 00000000`00000000 ffffb381`00000000 : nt!IofCallDriver+0x14c9ab
fffffd84`6b9c46e0 fffff800`2043e12a : ffffcb8c`1e76a530 fffffd84`6b9c48c9 00000000`00000001 ffffcb8c`1e76a530 : nt!VfIrpSendSynchronousIrp+0x109
fffffd84`6b9c4750 fffff800`20432ecc : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 ffffcb8c`1e76a530 : nt!VfWmiTestStartedPdoStack+0x5a
fffffd84`6b9c47f0 fffff800`1fd550cf : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 00000000`00000000 : nt!VfMajorTestStartedPdoStack+0x58
fffffd84`6b9c4820 fffff800`201d6852 : 00000000`00000000 fffffd84`6b9c48c9 00000000`00000001 fffffd84`6b9c48c9 : nt!PpvUtilTestStartedPdoStack+0x17
fffffd84`6b9c4850 fffff800`201d9bd0 : ffffcb8c`21f80850 fffffd84`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xc2
fffffd84`6b9c4930 fffff800`201d62f2 : ffffcb8c`222b05b0 fffff800`1fca35a7 ffffcb8c`22325040 ffffcb8c`222b0600 : nt!PipProcessDevNodeTree+0x3d0
fffffd84`6b9c4bb0 fffff800`1fd54beb : ffffcb01`00000003 ffffcb8c`1be8c300 ffffcb8c`222b05b0 00000000`00000000 : nt!PiProcessReenumeration+0x82
fffffd84`6b9c4c00 fffff800`1fcc4b05 : ffffcb8c`22325040 ffffcb8c`1ae7fad0 fffff800`1ffd5d20 ffffcb8c`1ae7fad0 : nt!PnpDeviceActionWorker+0x1eb
fffffd84`6b9c4cc0 fffff800`1fd3f2d7 : ffffcb8c`22325040 00000000`00000080 ffffcb8c`1ae95040 ffffcb8c`22325040 : nt!ExpWorkerThread+0xf5
fffffd84`6b9c4d50 fffff800`1fdc0516 : fffff800`1fb57180 ffffcb8c`22325040 fffff800`1fd3f290 00000000`00000246 : nt!PspSystemThreadStartup+0x47
fffffd84`6b9c4da0 00000000`00000000 : fffffd84`6b9c5000 fffffd84`6b9bf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: de01f4235fdbc9755248d940d6cb139534085dcc
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ff3f35a23b6ac0ad9aad82a755b67e133e0c8304
THREAD_SHA1_HASH_MOD: d4805119c5fae2f7bd376c36487c7fbf7dbdaf7c
FAULT_INSTR_CODE: 8bcb8b48
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: HIDCLASS!HidpCallDriver+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.17134.1
STACK_COMMAND: .cxr 0xfffffd846b9c35b0 ; kb
BUCKET_ID_FUNC_OFFSET: a2
FAILURE_BUCKET_ID: AV_HIDCLASS!HidpCallDriver
BUCKET_ID: AV_HIDCLASS!HidpCallDriver
PRIMARY_PROBLEM_CLASS: AV_HIDCLASS!HidpCallDriver
TARGET_TIME: 2019-10-12T16:03:22.000Z
OSBUILD: 17134
OSSERVICEPACK: 523
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-01-01 07:44:13
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.17134.523
ANALYSIS_SESSION_ELAPSED_TIME: 1472
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_hidclass!hidpcalldriver
FAILURE_ID_HASH: {09223f76-66f9-c8bc-7ce8-d669ecd11026}
Followup: MachineOwner
---------
1: kd> .load pde
=========================================================================================
PDE v11.3 - Copyright 2017 Andrew Richards
=========================================================================================
1: kd> !dpx
Start memory scan : 0xfffffd846b9c3fa8 ($csp)
End memory scan : 0xfffffd846b9c5000 (Kernel Stack Base)
rsp : 0xfffffd846b9c3fa8 : 0xfffff80020421c1e : nt!IovCallDriver+0x16a
0xfffffd846b9c3fa8 : 0xfffff80020421c1e : nt!IovCallDriver+0x16a
0xfffffd846b9c4018 : 0xfffff803930b53b3 : VerifierExt!IofCallDriver_internal_wrapper+0x13
0xfffffd846b9c4028 : 0xfffff8002043b613 : nt!VfIrpDatabaseEntryReleaseLock+0xf7
0xfffffd846b9c4030 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4048 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
0xfffffd846b9c4058 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
0xfffffd846b9c4088 : 0xfffff8002043fab8 : nt!ViGenericDispatchHandler+0x54
0xfffffd846b9c40b8 : 0xfffffd846b9c42d8 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
0xfffffd846b9c40c8 : 0xfffff8002043ff76 : nt!ViGenericSystemControl+0x16
0xfffffd846b9c40d8 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
0xfffffd846b9c40e0 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
0xfffffd846b9c40f8 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
0xfffffd846b9c4108 : 0xfffff8002042d800 : nt!VfBeforeCallDriver+0x13c
0xfffffd846b9c4128 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4138 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
0xfffffd846b9c4158 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
0xfffffd846b9c41b8 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c41d8 : 0xfffff80396d1a140 : HIDCLASS!WPP_4281ad99bc4836db6f9405cfe53e411b_Traceguids
0xfffffd846b9c41f8 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
0xfffffd846b9c4228 : 0xfffff80396d076a2 : HIDCLASS!HidpCallDriver+0xa2
0xfffffd846b9c4238 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
0xfffffd846b9c42a8 : 0xfffff803930b53b3 : VerifierExt!IofCallDriver_internal_wrapper+0x13
0xfffffd846b9c42b8 : 0xfffff80020424b5b : nt!ViGenericIsValidIrpStatus+0xb
0xfffffd846b9c42d8 : 0xfffff8002042f631 : nt!VerifierIofCallDriver+0x21
0xfffffd846b9c42e8 : 0xfffff80020432dc4 : nt!VfMajorIsValidIrpStatus+0x64
0xfffffd846b9c4308 : 0xfffff8001fe73d17 : nt!MiSetOriginalPtePfnFromFreeList+0x17
0xfffffd846b9c4318 : 0xfffff80396d076a2 : HIDCLASS!HidpCallDriver+0xa2
0xfffffd846b9c4338 : 0xfffff8001fe73cd1 : nt!MiSetFreshPfnFromFreeList+0xd
0xfffffd846b9c4388 : 0xfffff80396d07872 : HIDCLASS!HidpIrpMajorDefault+0x102
0xfffffd846b9c43b8 : 0xfffff8001fc893ec : nt!MiFinalizePageAttribute+0x28
0xfffffd846b9c43e8 : 0xfffff80396d25237 : HIDCLASS!HidpIrpMajorSystemControl+0x5b
0xfffffd846b9c4408 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4448 : 0xfffff8002043b613 : nt!VfIrpDatabaseEntryReleaseLock+0xf7
0xfffffd846b9c4450 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4478 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
0xfffffd846b9c44a8 : 0xfffff8002043fab8 : nt!ViGenericDispatchHandler+0x54
0xfffffd846b9c44e8 : 0xfffff8002043ff76 : nt!ViGenericSystemControl+0x16
0xfffffd846b9c4518 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
0xfffffd846b9c4528 : 0xfffff8002042d800 : nt!VfBeforeCallDriver+0x13c
0xfffffd846b9c4548 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4558 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
0xfffffd846b9c4578 : 0xfffff8002042c7be : nt!IovpCallDriver1+0x506
0xfffffd846b9c45d8 : 0xfffff8002044028b : nt!ViFilterDispatchGeneric+0xbb
0xfffffd846b9c4618 : 0xfffff8001fd76b0a : nt!IopfCallDriver+0x56
0xfffffd846b9c4648 : 0xfffff8002042dc55 : nt!VfIrpSendSynchronousIrp+0x109
0xfffffd846b9c4658 : 0xfffff80020421d29 : nt!IovCallDriver+0x275
0xfffffd846b9c4678 : 0xfffff8002042dcf9 : nt!VfIrpWatermark+0x2d
0xfffffd846b9c46d8 : 0xfffff8002042dc55 : nt!VfIrpSendSynchronousIrp+0x109
0xfffffd846b9c4748 : 0xfffff8002043e12a : nt!VfWmiTestStartedPdoStack+0x5a
0xfffffd846b9c47e8 : 0xfffff80020432ecc : nt!VfMajorTestStartedPdoStack+0x58
0xfffffd846b9c4818 : 0xfffff8001fd550cf : nt!PpvUtilTestStartedPdoStack+0x17
0xfffffd846b9c4848 : 0xfffff800201d6852 : nt!PipProcessStartPhase3+0xc2
0xfffffd846b9c4888 : 0xfffff8001fd55034 : nt!PpMarkDeviceStackExtensionFlag+0x54
0xfffffd846b9c4898 : 0xfffff8001ffd75e0 : nt!PnpRegistryDeviceResource+0x60
0xfffffd846b9c48a8 : 0xfffff8001fd55634 : nt!PipSetDevNodeState+0xe0
0xfffffd846b9c48b8 : 0xfffff800201d6430 : nt!IopDoDeferredSetInterfaceState+0x64
0xfffffd846b9c48c8 : 0xfffff8001fd552b3 : nt!PnpDeviceCompletionQueueIsEmpty+0x4b
0xfffffd846b9c48e8 : 0xfffff800201d6372 : nt!PipProcessStartPhase2+0x56
0xfffffd846b9c4928 : 0xfffff800201d9bd0 : nt!PipProcessDevNodeTree+0x3d0
0xfffffd846b9c4958 : 0xfffff8001fdbfa66 : nt!KiIpiInterrupt+0x326
0xfffffd846b9c4960 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
0xfffffd846b9c49b8 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
0xfffffd846b9c4a20 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
0xfffffd846b9c4a28 : 0xfffff8001fc9f82f : nt!ExpAcquireResourceSharedLite+0x19f
0xfffffd846b9c4a68 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
0xfffffd846b9c4aa0 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
0xfffffd846b9c4aa8 : 0xfffff8001fca1eb8 : nt!ExReleaseResourceLite+0xc8
0xfffffd846b9c4ac8 : 0xfffff8001fc9f5d0 : nt!ExAcquireResourceSharedLite+0x40
0xfffffd846b9c4ad8 : 0xfffff8001ffd73e0 : nt!IopDeviceTreeLock
0xfffffd846b9c4ae8 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
0xfffffd846b9c4b08 : 0xfffff80020176391 : nt!PpDevNodeUnlockTree+0x19
0xfffffd846b9c4b28 : 0xfffff8001ffd7440 : nt!IopDeviceTreeLock+0x60
0xfffffd846b9c4b38 : 0xfffff800201d5cd0 : nt!PipForDeviceNodeSubtree+0x30
0xfffffd846b9c4b58 : 0xfffff8002010ddf5 : nt!ObpFreeObject+0x195
0xfffffd846b9c4b60 : 0xfffff8002020f410 : nt!PiMarkDeviceTreeForReenumerationWorker
0xfffffd846b9c4b78 : 0xfffff800201d625d : nt!PiMarkDeviceTreeForReenumeration+0x3d
0xfffffd846b9c4ba8 : 0xfffff800201d62f2 : nt!PiProcessReenumeration+0x82
0xfffffd846b9c4bb8 : 0xfffff8001fca35a7 : nt!ExAcquirePushLockExclusiveEx+0xe7
0xfffffd846b9c4bf8 : 0xfffff8001fd54beb : nt!PnpDeviceActionWorker+0x1eb
0xfffffd846b9c4c48 : 0xfffff8001fcc4ea6 : nt!KeRemovePriQueue+0x186
0xfffffd846b9c4c80 : 0xfffff80020077240 : nt!ExNode0
0xfffffd846b9c4c90 : 0xfffff80020077240 : nt!ExNode0
0xfffffd846b9c4cb0 : 0xfffff8001fd54a00 : nt!PnpDeviceActionWorker
0xfffffd846b9c4cb8 : 0xfffff8001fcc4b05 : nt!ExpWorkerThread+0xf5
0xfffffd846b9c4cd0 : 0xfffff8001ffd5d20 : nt!PnpDeviceEnumerationWorkItem
0xfffffd846b9c4d18 : 0xfffff800200c46f7 : nt!PspDisablePrimaryTokenExchange+0x27
0xfffffd846b9c4d40 : 0xfffff8001fcc4a10 : nt!ExpWorkerThread
0xfffffd846b9c4d48 : 0xfffff8001fd3f2d7 : nt!PspSystemThreadStartup+0x47
0xfffffd846b9c4d78 : 0xfffff8001fdc0509 : nt!KiStartSystemThread+0x9
0xfffffd846b9c4d98 : 0xfffff8001fdc0516 : nt!KiStartSystemThread+0x16
0xfffffd846b9c4db0 : 0xfffff8001fd3f290 : nt!PspSystemThreadStartup
1: kd> knL
# Child-SP RetAddr Call Site
00 fffffd84`6b9c3fa8 fffff800`20421c1e nt!IovpValidateDeviceObject+0x5
01 fffffd84`6b9c3fb0 fffff800`1fe24949 nt!IovCallDriver+0x16a
02 fffffd84`6b9c3ff0 fffff803`930b53b3 nt!IofCallDriverSpecifyReturn+0xadeb9
03 fffffd84`6b9c4020 fffff800`2042f631 VerifierExt!IofCallDriver_internal_wrapper+0x13
04 fffffd84`6b9c4050 fffff800`2043fab8 nt!VerifierIofCallDriver+0x21
05 fffffd84`6b9c4090 fffff800`2043ff76 nt!ViGenericDispatchHandler+0x54
06 fffffd84`6b9c40d0 fffff800`1fd76b0a nt!ViGenericSystemControl+0x16
07 fffffd84`6b9c4100 fffff800`20421d29 nt!IopfCallDriver+0x56
08 fffffd84`6b9c4140 fffff800`1fdf47bb nt!IovCallDriver+0x275
09 fffffd84`6b9c4180 fffff800`2044028b nt!IofCallDriver+0x14c9ab
0a fffffd84`6b9c41c0 fffff800`1fd76b0a nt!ViFilterDispatchGeneric+0xbb
0b fffffd84`6b9c4200 fffff800`20421d29 nt!IopfCallDriver+0x56
0c fffffd84`6b9c4240 fffff800`1fe24949 nt!IovCallDriver+0x275
0d fffffd84`6b9c4280 fffff803`930b53b3 nt!IofCallDriverSpecifyReturn+0xadeb9
0e fffffd84`6b9c42b0 fffff800`2042f631 VerifierExt!IofCallDriver_internal_wrapper+0x13
0f fffffd84`6b9c42e0 fffff803`96d076a2 nt!VerifierIofCallDriver+0x21
10 fffffd84`6b9c4320 fffff803`96d07872 HIDCLASS!HidpCallDriver+0xa2
11 fffffd84`6b9c4390 fffff803`96d25237 HIDCLASS!HidpIrpMajorDefault+0x102
12 fffffd84`6b9c43f0 fffff803`96d0456d HIDCLASS!HidpIrpMajorSystemControl+0x5b
13 fffffd84`6b9c4420 fffff800`2043fab8 HIDCLASS!HidpMajorHandler+0x290d
14 fffffd84`6b9c44b0 fffff800`2043ff76 nt!ViGenericDispatchHandler+0x54
15 fffffd84`6b9c44f0 fffff800`1fd76b0a nt!ViGenericSystemControl+0x16
16 fffffd84`6b9c4520 fffff800`20421d29 nt!IopfCallDriver+0x56
17 fffffd84`6b9c4560 fffff800`1fdf47bb nt!IovCallDriver+0x275
18 fffffd84`6b9c45a0 fffff800`2044028b nt!IofCallDriver+0x14c9ab
19 fffffd84`6b9c45e0 fffff800`1fd76b0a nt!ViFilterDispatchGeneric+0xbb
1a fffffd84`6b9c4620 fffff800`20421d29 nt!IopfCallDriver+0x56
1b fffffd84`6b9c4660 fffff800`1fdf47bb nt!IovCallDriver+0x275
1c fffffd84`6b9c46a0 fffff800`2042dc55 nt!IofCallDriver+0x14c9ab
1d fffffd84`6b9c46e0 fffff800`2043e12a nt!VfIrpSendSynchronousIrp+0x109
1e fffffd84`6b9c4750 fffff800`20432ecc nt!VfWmiTestStartedPdoStack+0x5a
1f fffffd84`6b9c47f0 fffff800`1fd550cf nt!VfMajorTestStartedPdoStack+0x58
20 fffffd84`6b9c4820 fffff800`201d6852 nt!PpvUtilTestStartedPdoStack+0x17
21 fffffd84`6b9c4850 fffff800`201d9bd0 nt!PipProcessStartPhase3+0xc2
22 fffffd84`6b9c4930 fffff800`201d62f2 nt!PipProcessDevNodeTree+0x3d0
23 fffffd84`6b9c4bb0 fffff800`1fd54beb nt!PiProcessReenumeration+0x82
24 fffffd84`6b9c4c00 fffff800`1fcc4b05 nt!PnpDeviceActionWorker+0x1eb
25 fffffd84`6b9c4cc0 fffff800`1fd3f2d7 nt!ExpWorkerThread+0xf5
26 fffffd84`6b9c4d50 fffff800`1fdc0516 nt!PspSystemThreadStartup+0x47
27 fffffd84`6b9c4da0 00000000`00000000 nt!KiStartSystemThread+0x16
1: kd> u nt!IovpValidateDeviceObject+0x5
nt!IovpValidateDeviceObject+0x5:
fffff800`20422915 66833903 cmp word ptr [rcx],3
fffff800`20422919 7510 jne nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
fffff800`2042291b 4883790800 cmp qword ptr [rcx+8],0
fffff800`20422920 7409 je nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
fffff800`20422922 83790400 cmp dword ptr [rcx+4],0
fffff800`20422926 7c03 jl nt!IovpValidateDeviceObject+0x1b (fffff800`2042292b)
fffff800`20422928 b001 mov al,1
fffff800`2042292a c3 ret
1: kd> .frame /r 1
01 fffffd84`6b9c3fb0 fffff800`1fe24949 nt!IovCallDriver+0x16a
rax=ffffca81cda18d80 rbx=ffffca81cda18d80 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffcb8c2233ada0
rip=fffff80020421c1e rsp=fffffd846b9c3fb0 rbp=fffff8002043fab8
r8=0000000000000000 r9=0000000000000000 r10=fffff800204527c0
r11=0000000000000000 r12=fffff80396d1a140 r13=fffff80396d1a140
r14=0000000000000000 r15=0000000000400000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!IovCallDriver+0x16a:
fffff800`20421c1e 84c0 test al,al
Looking at the Exception Record Address we can see that we're attempting to check that the device object pointer which we referenced is valid. In this case, we know that it's now based upon the address which was returned.
Crash occurred on the function IovpValidateDeviceObject which (after unassembling) shows that it checks the device object all the time. In turn, dropping registers, we see the function called IoCallDriver (https://docs.microsoft.com/en-us/win...-iofcalldriver)
So I will ask you again. Have you enabled the "I / O Verification" and "Enhanced I / O Verification" options in Driver Verifier? If not, turn off Driver Verifier completely, then turn it on again and turn on these missing options