I was reasonably sure until you asked. Doubling checking, I found that the pdb and sym did not have the correct name (as the build process renames the output for signing). O.o!
After correcting that, I now have a much more useful dump (did I mention I was novice)!
This seems to clearly indicate where the problem is (now I just need to determine what condition leads to the issue - which should be in my wheelhouse)
Thanks for the patience and assistance!
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa80158ac000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800f6c9faa, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c3100
fffffa80158ac000
FAULTING_IP:
dmic_x64!memcpy+ca [d:\winmain\minkernel\crts\crtw32\string\amd64\memcpy.asm @ 205]
fffff880`0f6c9faa 4c8b540af8 mov r10,qword ptr [rdx+rcx-8]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: xxxxxx
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800b3ae660 – (.trap 0xfffff8800b3ae660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800ee0d530
rdx=0000000006a9ead6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f6c9faa rsp=fffff8800b3ae7f8 rbp=0000000000000000
r8=0000000000005ba4 r9=0000000000000242 r10=00000000000001d7
r11=fffffa800ee0c1aa r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dmic_x64!memcpy+0xca:
fffff8800f6c9faa 4c8b540af8 mov r10,qword ptr [rdx+rcx-8] ds:3780:fffffa80
158abffe=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003102c07 to fffff80003086a40
STACK_TEXT:
fffff8800b3ae4f8 fffff800
03102c07 : 0000000000000050 fffffa80
158ac000 0000000000000000 fffff880
0b3ae660 : nt!KeBugCheckEx
fffff8800b3ae500 fffff800
03084b6e : 0000000000000000 fffffa80
158ac000 fffffa800d586a00 00000000
ffffa29c : nt! ?? ::FNODOBFM::string'+0x41c2f fffff880
0b3ae660 fffff8800f6c9faa : fffff880
0f6c6642 fffffa800b0520f0 fffff880
061fa5fb fffffa800b0520e8 : nt!KiPageFault+0x16e fffff880
0b3ae7f8 fffff8800f6c6642 : fffffa80
0b0520f0 fffff880061fa5fb fffffa80
0b0520e8 0000000000000348 : dmic_x64!memcpy+0xca [d:\winmain\minkernel\crts\crtw32\string\amd64\memcpy.asm @ 205] fffff880
0b3ae800 0000000000000000 : 00000000
00000000 0000000000000000 00000000
00000000 00000000`00000000 : dmic_x64!CAudioBuffer::WriteData+0x76 [c:xxxx\baseaudiobuffer.cpp @ 230]
STACK_COMMAND: kb
FOLLOWUP_IP:
dmic_x64!memcpy+ca [d:\winmain\minkernel\crts\crtw32\string\amd64\memcpy.asm @ 205]
fffff880`0f6c9faa 4c8b540af8 mov r10,qword ptr [rdx+rcx-8]
FAULTING_SOURCE_CODE:
No source found for ‘d:\winmain\minkernel\crts\crtw32\string\amd64\memcpy.asm’
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dmic_x64!memcpy+ca
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dmic_x64
IMAGE_NAME: dmic_x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 553f8a59
FAILURE_BUCKET_ID: X64_0x50_dmic_x64!memcpy+ca
BUCKET_ID: X64_0x50_dmic_x64!memcpy+ca
Followup: MachineOwner