PipDeviceActionWorker???

Can anybody offer some hints about this bugcheck or the
PipDeviceActionWorker
thread?

Thanks
Charles

*** Fatal System Error: 0x00000050
(0xBF7F0010,0x00000000,0x80505BAF,0x00000002)

Break instruction exception - code 80000003 (first chance)

A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.

A fatal system error has occurred.

****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***

Use !analyze -v to get detailed debugging information.

BugCheck 50, {bf7f0010, 0, 80505baf, 2}

Probably caused by : ntoskrnl ( nt!MiAttachToSecureProcessInSession+7 )

Followup: MachineOwner

nt!RtlpBreakWithStatusInstruction:
8050d064 cc int 3
kd> .bugcheck
Bugcheck code 00000050
Arguments bf7f0010 00000000 80505baf 00000002
kd> !analyze -v
****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by
try-except,
it must be protected by a Probe. Typically the address is just plain bad or
it
is pointing at freed memory.
Arguments:
Arg1: bf7f0010, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 80505baf, If non-zero, the instruction address which referenced the
bad memory
address.
Arg4: 00000002, (reserved)

Debugging Details:

READ_ADDRESS: bf7f0010 Nonpaged pool

FAULTING_IP:
nt!MiAttachToSecureProcessInSession+7
80505baf 8b7010 mov esi,[eax+0x10]

MM_INTERNAL_CODE: 2

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 50

LAST_CONTROL_TRANSFER: from 805226a5 to 8050d064

STACK_TEXT:
f9d770b4 805226a5 00000003 00000000 00000050
nt!RtlpBreakWithStatusInstruction
f9d77100 80522dea 00000003 c0300bf4 c02fdfc0 nt!KiBugCheckDebugBreak+0x19
f9d774c8 804fc1bb 00000050 bf7f0010 00000000 nt!KeBugCheck2+0x43c
f9d774e8 8051a00c 00000050 bf7f0010 00000000 nt!KeBugCheckEx+0x19
f9d77534 804d7a5b 00000000 bf7f0010 00000000 nt!MmAccessFault+0x6cb
f9d77534 80505baf 00000000 bf7f0010 00000000 nt!KiTrap0E+0xb8
f9d775c4 805b1879 f9d77638 f9d778e8 00000000
nt!MiAttachToSecureProcessInSession+0x7
f9d77690 805b3fd1 e127f430 f9d778e8 f9d778f8 nt!MiLoadImageSection+0x16c
f9d77838 805acdf4 f9d778f8 00000000 00000000 nt!MmLoadSystemImage+0x476
f9d77904 805aeaf2 80000388 00000000 f9d77900 nt!IopLoadDriver+0x311
f9d77948 8055c01e e19a1600 00000001 80000388
nt!PipCallDriverAddDeviceQueryRoutine+0x239
f9d77994 8055c2d4 f9d77a20 e19a15ec f9d779f4
nt!RtlpCallQueryRegistryRoutine+0x3af
f9d779f8 805ad81d 00000000 00000084 00000001 nt!RtlQueryRegistryValues+0x2a4
f9d77acc 805ad627 00000000 00000001 f9d77d54 nt!PipCallDriverAddDevice+0x237
f9d77d18 805af082 817b4948 00000001 00000000 nt!PipProcessDevNodeTree+0x147
f9d77d4c 805057fa 00000003 80543d40 80548abc nt!PiProcessReenumeration+0x5e
f9d77d74 804ebd08 00000000 00000000 817cab30 nt!PipDeviceActionWorker+0x133
f9d77dac 80559026 00000000 00000000 00000000 nt!ExpWorkerThread+0xfe
f9d77ddc 8050f513 804ebc35 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

FOLLOWUP_IP:
nt!MiAttachToSecureProcessInSession+7
80505baf 8b7010 mov esi,[eax+0x10]

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: nt!MiAttachToSecureProcessInSession+7

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl

STACK_COMMAND: kb

BUCKET_ID: 0x50_nt!MiAttachToSecureProcessInSession+7

Followup: MachineOwner


You are currently subscribed to ntdev as: $subst(‘Recip.EmailAddr’)
To unsubscribe send a blank email to leave-ntdev-$subst(‘Recip.MemberIDChar’)@lists.osr.com