Dump one shows ks.sys as culprit (Kernel CSA Library), and dump two shows usbaudio.sys as the culprit. Both of these actually causing the crash are highly unlikely, so I recommend enabling Driver Verifier. This will force a crash when it locates the driver in question at fault and hopefully give us an answer.
Code:
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : usbaudio.sys ( usbaudio!USBType1CompleteCallback+143 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3039326437353862
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002d8b798 -- (.exr 0xfffff88002d8b798)
ExceptionAddress: fffff88004f83f97 (usbaudio!USBType1CompleteCallback+0x0000000000000143)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002d8b840 -- (.trap 0xfffff88002d8b840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=41fffa8005169bc0 rbx=0000000000000000 rcx=fffffa8003d68210
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004f83f97 rsp=fffff88002d8b9d0 rbp=fffffa80052c82d0
r8=fffffa8003af54f0 r9=0000000000000000 r10=fffff88002d63b80
r11=fffff88002d8ba38 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
usbaudio!USBType1CompleteCallback+0x143:
fffff880`04f83f97 488908 mov qword ptr [rax],rcx ds:8270:41fffa80`05169bc0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ecbc2e to fffff80002ed3ed0
STACK_TEXT:
fffff880`02d8a878 fffff800`02ecbc2e : 00000000`00000002 00000000`00000000 fffff880`02d8aff0 fffff800`02f00e28 : nt!KeBugCheck
fffff880`02d8a880 fffff800`02ef9bed : fffff800`030e0c24 fffff800`03019a3c fffff800`02e62000 fffff880`02d8b798 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02d8a8b0 fffff800`02f01250 : fffff800`03021b5c fffff880`02d8a928 fffff880`02d8b798 fffff800`02e62000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02d8a8e0 fffff800`02f0e1b5 : fffff880`02d8b798 fffff880`02d8aff0 fffff880`00000000 fffffa80`05169b90 : nt!RtlDispatchException+0x410
fffff880`02d8afc0 fffff800`02ed3542 : fffff880`02d8b798 fffffa80`05169c30 fffff880`02d8b840 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02d8b660 fffff800`02ed1e4a : 00000000`00000000 fffffa80`03c3aae0 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02d8b840 fffff880`04f83f97 : 00000000`00000000 fffffa80`05c1ea10 fffffa80`05169b90 fffffa80`05169c30 : nt!KiGeneralProtectionFault+0x10a
fffff880`02d8b9d0 fffff800`02ed6516 : fffffa80`03af5803 00000000`00000000 00000000`00000000 00000000`00000f00 : usbaudio!USBType1CompleteCallback+0x143
fffff880`02d8ba40 fffff880`1493d5d9 : fffffa80`05c1e050 fffffa80`03db2900 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02d8bb20 fffff880`1493dab7 : fffffa80`06703902 fffffa80`03af54f0 00000000`ffffffff fffffa80`05c1eea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02d8bc00 fffff880`1493b64f : fffffa80`05c1eea8 fffffa80`05c1e1a0 fffffa80`05c1f040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02d8bc60 fffff880`1492cf89 : fffffa80`05c1e050 00000000`00000000 fffffa80`05c1ee02 fffffa80`05c1eea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02d8bca0 fffff800`02edf5dc : fffff880`02d63180 fffffa80`05c1eea8 fffffa80`05c1eec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02d8bcd0 fffff800`02edc6fa : fffff880`02d63180 fffff880`02d6df80 00000000`00000000 fffff880`1492cdb0 : nt!KiRetireDpcList+0x1bc
fffff880`02d8bd80 00000000`00000000 : fffff880`02d8c000 fffff880`02d86000 fffff880`02d8bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
usbaudio!USBType1CompleteCallback+143
fffff880`04f83f97 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: usbaudio!USBType1CompleteCallback+143
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbaudio
IMAGE_NAME: usbaudio.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
FAILURE_BUCKET_ID: X64_0x1E_0_usbaudio!USBType1CompleteCallback+143
BUCKET_ID: X64_0x1E_0_usbaudio!USBType1CompleteCallback+143
Followup: MachineOwner
BugCheck A, {fffff88003163020, 2, 0, fffff80002ed8815}
Probably caused by : ks.sys ( ks!KsQueueWorkItem+52 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff88003163020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ed8815, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031070e0
fffff88003163020
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExQueueWorkItem+75
fffff800`02ed8815 654c8b242520000000 mov r12,qword ptr gs:[20h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Everything.exe
TRAP_FRAME: fffff88002f92980 -- (.trap 0xfffff88002f92980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa800418eb70
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ed8815 rsp=fffff88002f92b10 rbp=fffffa8004789002
r8=fffffa800418eba8 r9=fffff88003607744 r10=fffff88002f63b80
r11=fffff88003610910 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!ExQueueWorkItem+0x75:
fffff800`02ed8815 654c8b242520000000 mov r12,qword ptr gs:[20h] gs:ffff:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed0469 to fffff80002ed0f00
STACK_TEXT:
fffff880`02f92838 fffff800`02ed0469 : 00000000`0000000a fffff880`03163020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f92840 fffff800`02ecf0e0 : fffffa80`05ce8e02 fffff800`030745f8 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f92980 fffff800`02ed8815 : 00000000`00000000 fffffa80`0667bc00 fffffa80`0510ad20 fffff880`03e935c2 : nt!KiPageFault+0x260
fffff880`02f92b10 fffff880`0360786e : fffffa80`04789450 fffffa80`04273ef0 00000000`00000002 fffffa80`04273ef0 : nt!ExQueueWorkItem+0x75
fffff880`02f92b80 fffff880`03603779 : fffffa80`04273b08 fffffa80`04789000 fffffa80`04789450 fffff800`02e196e5 : ks!KsQueueWorkItem+0x52
fffff880`02f92bb0 fffff880`0360b628 : fffffa80`04273b08 fffffa80`039d2870 fffffa80`04273c00 fffffa80`047891b0 : ks!CKsPin::Process+0x85
fffff880`02f92be0 fffff880`0518f3ac : 00000000`00000000 fffff800`02e197d8 fffffa80`047890a0 fffffa80`0454d010 : ks!KsPinAttemptProcessing+0x8c
fffff880`02f92c10 fffff800`02ed3516 : fffffa80`0454d323 fffff800`02e1ac02 00000000`00000000 00000000`00000000 : usbaudio!USBCaptureCompleteCallback+0x1a8
fffff880`02f92c70 fffff880`03ea45d9 : fffffa80`050fe050 fffffa80`04789400 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f92d50 fffff880`03ea4ab7 : fffffa80`06930502 fffffa80`0454d010 00000000`ffffffff fffffa80`050feea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f92e30 fffff880`03ea264f : fffffa80`050feea8 fffffa80`050fe1a0 fffffa80`050ff040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f92e90 fffff880`03e93f89 : fffffa80`050fe050 00000000`00000000 fffffa80`050fee02 fffffa80`050feea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f92ed0 fffff800`02edc5dc : fffff880`02f63180 fffffa80`050feea8 fffffa80`050feec0 00000000`0000ffff : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f92f00 fffff800`02ed7065 : 00000000`00000000 fffffa80`06b2db60 00000000`00000000 fffff880`03e93db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f92fb0 fffff800`02ed6e7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`06434bd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
ks!KsQueueWorkItem+52
fffff880`0360786e 488d4f48 lea rcx,[rdi+48h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: ks!KsQueueWorkItem+52
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ks
IMAGE_NAME: ks.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bca9f
FAILURE_BUCKET_ID: X64_0xA_ks!KsQueueWorkItem+52
BUCKET_ID: X64_0xA_ks!KsQueueWorkItem+52
Followup: MachineOwner