*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000080, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040561327c, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 18062
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on P5PL2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36280
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 80
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8040561327c
READ_ADDRESS: fffff804058fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040580f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8040580f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: RainbowSix.exe
TRAP_FRAME: ffffa308544d7a00 -- (.trap 0xffffa308544d7a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000080 rbx=0000000000000000 rcx=0000000000000004
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040561327c rsp=ffffa308544d7b90 rbp=000000973286e500
r8=0000000000000049 r9=0000009732869994 r10=0000000000000065
r11=0000009732868d72 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!KiIpiInterruptShadow+0x3c:
fffff804`0561327c 3800 cmp byte ptr [rax],al ds:00000000`00000080=??
Resetting default scope
MISALIGNED_IP:
nt!KiIpiInterruptShadow+3c
fffff804`0561327c 3800 cmp byte ptr [rax],al
STACK_TEXT:
ffffa308`544d78b8 fffff804`05005e69 : 00000000`0000000a 00000000`00000080 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffa308`544d78c0 fffff804`05002169 : 000001a5`00000000 ffffa308`00000001 ffffa308`544d7a80 ffffa308`544d7a80 : nt!KiBugCheckDispatch+0x69
ffffa308`544d7a00 fffff804`0561327c : ffffa308`544d8000 ffffa308`544d1000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffa308`544d7b90 ffffa308`544d8000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterruptShadow+0x3c
00000000`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffa308`544d8000
SYMBOL_NAME: nt!KiIpiInterruptShadow+3c
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------