0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+64e62faf00b5de24
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff80000b9c678 -- (.exr 0xfffff80000b9c678)
ExceptionAddress: fffff88004c77631 (ks!CKsQueue::ForwardIrp+0x0000000000000079)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff80000b9c720 -- (.trap 0xfffff80000b9c720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88004c88110 rbx=0000000000000000 rcx=fffff88004c88180
rdx=fffffa80072b1b50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004c77631 rsp=fffff80000b9c8b0 rbp=fffffa80072933c0
r8=fffffa80072b1dd8 r9=0000000000000000 r10=fffffa8006e7d4d0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ks!CKsQueue::ForwardIrp+0x79:
fffff880`04c77631 418b8780000000 mov eax,dword ptr [r15+80h] ds:00000000`00000080=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000287d5fe to fffff80002885c10
STACK_TEXT:
fffff800`00b9b758 fffff800`0287d5fe : 00000000`00000000 00000000`00000000 fffff800`00b9bed0 fffff800`028b1830 : nt!KeBugCheck
fffff800`00b9b760 fffff800`028b14fd : fffff800`02a8f71c fffff800`029ccc30 fffff800`02809000 fffff800`00b9c678 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00b9b790 fffff800`028b02d5 : fffff800`029d00fc fffff800`00b9b808 fffff800`00b9c678 fffff800`02809000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00b9b7c0 fffff800`028c1361 : fffff800`00b9c678 fffff800`00b9bed0 fffff800`00000000 fffffa80`00000007 : nt!RtlDispatchException+0x415
fffff800`00b9bea0 fffff800`028852c2 : fffff800`00b9c678 00000000`00000000 fffff800`00b9c720 00000000`00000000 : nt!KiDispatchException+0x135
fffff800`00b9c540 fffff800`02883bca : fffffa80`0557a000 fffff800`0288bfda fffffa80`0635f000 fffff800`00b9c880 : nt!KiExceptionDispatch+0xc2
fffff800`00b9c720 fffff880`04c77631 : fffffa80`06582410 00000000`00000000 00000000`00000000 fffffa80`07314002 : nt!KiGeneralProtectionFault+0x10a
fffff800`00b9c8b0 fffff880`04c777af : fffffa80`072933c0 00000000`00000002 00000000`00000000 fffffa80`0730b602 : ks!CKsQueue::ForwardIrp+0x79
fffff800`00b9c900 fffff880`04c7817f : fffffa80`072933c0 00000000`00000000 fffffa80`072b1b50 fffffa80`072d3f60 : ks!CKsQueue::ForwardWaitingIrps+0x5f
fffff800`00b9c930 fffff880`04c77945 : fffffa80`072d3f60 00000000`00000000 fffffa80`072d3fc0 00000000`00000000 : ks!CKsQueue::UnlockStreamPointer+0x123
fffff800`00b9c980 fffff880`046bd061 : fffffa80`0726d670 fffffa80`072d3fc0 00000000`00000000 fffffa80`0726d670 : ks!CKsQueue::DeleteStreamPointer+0xf5
fffff800`00b9c9c0 fffff800`02889021 : fffffa80`0731d24b 00000000`00000000 00000000`00000000 00000000`00000050 : usbaudio!USBType1CompleteCallback+0x20d
fffff800`00b9ca30 fffff880`04264631 : fffffa80`03c58050 fffffa80`0730b600 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`00b9cb20 fffff880`04264b0f : fffffa80`040c1902 fffffa80`0731d010 00000000`ffffffff fffffa80`03c58eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff800`00b9cc00 fffff880`0426266f : fffffa80`03c58eb0 fffffa80`03c581a0 fffffa80`03c59050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00b9cc60 fffff880`04253f89 : fffffa80`03c58050 00000000`00000000 fffffa80`03c58e02 fffffa80`03c58eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00b9cca0 fffff800`028910ac : fffff800`029fbe80 fffffa80`03c58eb0 fffffa80`03c58ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`0287d96a : fffff800`029fbe80 fffff800`02a09cc0 00000000`00000000 fffff880`04253db0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ks!CKsQueue::ForwardIrp+79
fffff880`04c77631 418b8780000000 mov eax,dword ptr [r15+80h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: ks!CKsQueue::ForwardIrp+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ks
IMAGE_NAME: ks.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a3f3
FAILURE_BUCKET_ID: X64_0x1E_0_ks!CKsQueue::ForwardIrp+79
BUCKET_ID: X64_0x1E_0_ks!CKsQueue::ForwardIrp+79
Followup: MachineOwner
---------