10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff9c08e9a22cc8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff804ef68fb72, address which referenced memory Debugging Details: ------------------ //uploader's comment: I deleted many similar lines here. The removed lines are like 'Page *hex number* not present in the dump file. Type ".hh dbgerr004" for details'. //This dump file is a minidump, so it only contains a small part of RAM data when OS crashes. KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3671 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3771 Key : Analysis.Init.CPU.mSec Value: 1609 Key : Analysis.Init.Elapsed.mSec Value: 175075 Key : Analysis.Memory.CommitPeak.Mb Value: 87 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1 BUGCHECK_P1: ffff9c08e9a22cc8 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff804ef68fb72 READ_ADDRESS: ffff9c08e9a22cc8 Paged pool PROCESS_NAME: javaw.exe TRAP_FRAME: ffff86898a36af50 -- (.trap 0xffff86898a36af50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000e0000002 rbx=0000000000000000 rcx=00000000e0000000 rdx=0000000010000100 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804ef68fb72 rsp=ffff86898a36b0e0 rbp=ffff86898a36b1e0 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=ffffd37af7400000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc afd!AfdBCommonChainedReceiveEventHandler+0x1e2: fffff804`ef68fb72 488b5608 mov rdx,qword ptr [rsi+8] ds:00000000`00000008=???????????????? Resetting default scope STACK_TEXT: ffff8689`8a36ae08 fffff800`2f013e69 : 00000000`0000000a ffff9c08`e9a22cc8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff8689`8a36ae10 fffff800`2f010169 : ffff9c08`d3800d00 00000000`000000ff 00000000`00000531 00000000`00000001 : nt!KiBugCheckDispatch+0x69 ffff8689`8a36af50 fffff804`ef68fb72 : ffffbe0f`300d3350 00000000`00002328 00000000`00000000 ffff9c08`e9a22cc0 : nt!KiPageFault+0x469 ffff8689`8a36b0e0 fffff804`ef68f983 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00001001 : afd!AfdBCommonChainedReceiveEventHandler+0x1e2 ffff8689`8a36b230 fffff804`ef629b61 : ffff9c08`e0d7ef30 00000000`00000000 00000000`00000000 00000000`69706e57 : afd!AfdTLConnectedReceiveEventHandler+0x13 ffff8689`8a36b260 fffff804`ef629f35 : 00000000`00000000 ffff9c08`e9a22cc0 00000000`00000000 00000000`00000000 : afunix!AfUnixDeliverDataToClient+0x18d ffff8689`8a36b330 fffff804`ef6211bc : 00000000`00000000 ffffbe0f`3a3484a0 ffff8689`8a36b410 ffff9c08`f3075da0 : afunix!AfUnixDeliverEndpointSend+0x1ed ffff8689`8a36b380 fffff804`ef68f0cf : ffffbe0f`32673f68 ffffbe0f`3a3484a0 00000000`00000001 ffffbe0f`32673f68 : afunix!AfUnixTlConnectEndpointSend+0x10c ffff8689`8a36b3c0 fffff804`ef68eefa : ffffbe0f`3a3484a0 ffff8689`8a36bb80 ffffbe0f`2fdd7960 ffffbe0f`32673ce0 : afd!AfdTLStartBufferedVcSend+0x9f ffff8689`8a36b470 fffff804`ef674190 : ffffbe0f`32673f68 00000000`00000000 00000000`00000001 ffff8689`8a36b968 : afd!AfdFastConnectionSend+0x2a2 ffff8689`8a36b540 fffff800`2f27fbf2 : 00000000`00000000 00000000`0001201f ffff8689`8a36bb80 ffffbe0f`42ea5d20 : afd!AfdFastIoDeviceControl+0xf90 ffff8689`8a36b8e0 fffff800`2f27f856 : 00000000`00000001 00000000`0000119c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382 ffff8689`8a36ba20 fffff800`2f0138b8 : 00000000`00000000 ffff8689`8a36bb80 ffffbe0f`00000000 ffffbe0f`404dc4e0 : nt!NtDeviceIoControlFile+0x56 ffff8689`8a36ba90 00007ffa`cfcacf04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000027`a94fea48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`cfcacf04 SYMBOL_NAME: afunix!AfUnixDeliverDataToClient+18d MODULE_NAME: afunix IMAGE_NAME: afunix.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 18d FAILURE_BUCKET_ID: AV_VRF_afunix!AfUnixDeliverDataToClient OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {32ed9c9e-7aaf-5ea4-bfac-940a9e5c5caa} Followup: MachineOwner