Windows error 0x0000002D, 45

Detailed Error Information

SCSI_DISK_DRIVER_INTERNAL[1]

This is a Blue Screen of Death stop code. More information is available in the Knowledge Base article Bug Check 0x2D: SCSI_DISK_DRIVER_INTERNAL.

HRESULT analysis[2]

This is probably not the correct interpretation of this error. The Win32 error above is more likely to indicate the actual problem.
FlagsSeveritySuccess

This code indicates success, rather than an error. This may not be the correct interpretation of this code, or possibly the program is handling errors incorrectly.

Reserved (R)false
OriginMicrosoft
NTSTATUSfalse
Reserved (X)false
FacilityCode0 (0x000)
NameFACILITY_NULL[2][3]
DescriptionThe default facility code.[2][3]
Error Code45 (0x002d)

Questions

2votes
1answer

lldb finding exit point of app

I am debugging an app that presumably has anti debugging measures, setting up breakpoints and signals stops for quitting the app doesn't stop the app from exiting, $ lldb App (lldb) target create "App" error: Invalid fde/cie next entry offset of 0x43029a18 found in cie/fde at 0x1404 Current executable set [...] read more
c
assembly
lldb
2votes
3answers

datatable not accepting the value of varbinary

the value buf has a datatype varbinary(max) and the value is 0x0000002D string buF = "0x" + BitConverter.ToString((byte[])dt.Rows[i]["BuF"]).Replace("-", ""); Label3.Text = buF; i use the value to find the fileid DataTable dt = new DataTable(); SqlConnection connection = new SqlConnection(); connection.ConnectionString = ConfigurationManager.ConnectionStrings["XYZ"].ConnectionString; connection.Open(); SqlCommand sqlCmd = new SqlCommand("SELECT FileID [...] read more
c#
asp.net
sql-server
database
datatable
1vote
1answer

Application Verifier reports access violation in call to ShellExecuteEx

SHORT VERSION Application Verifier says there is an access violation when running the code: var shi: TShellExecuteInfo; begin shi := Default(TShellExecuteInfo); shi.cbSize := SizeOf(TShellExecuteInfo); shi.lpFile := PChar('C:\Windows'); ShellExecuteEx(@shi); end; What's wrong with it? LONG VERSION I'm running my application under the Application Verifier, with the option to detect heap corruption [...] read more
winapi
windows-shell
application-verifier
1vote
1answer

lldb application on mac os

I would like to learn to use the lldb debugger on my Mac OSx (Yosemite) as I can't seem to get gdb to work properly (via homebrew). However I ran into a weird problem and wonder if someone can point me int he right direction. Basically after I loaded an [...] read more
macos
lldb
0votes
1answer

Adding a property on Aspose.Email and reading it on Interop.Outlook.MailItem

I have an App that uses Aspose.Email on the server side and Microsoft.Office.Interop.Outlook on the client side. I want to add some named values to my MailMessage (or MapiMessage) so that they can be read in Microsoft.Office.Interop.Outlook.MailItem.ItemProperties. Can anyone help me with this? I’ve tried several things, but the last [...] read more
c#
outlook
aspose
0votes
1answer

C++ WriteProcessMemory makes MessageBox crash the programm

i want to write a little AntiHack and i have a problem with one part of it. The idea was to prevent from dll injecting by hooking the LdrLoadDll from NTDLL.DLL. I found a function by googling which do this: // function call: BlockAPI(m_hProc, "NTDLL.DLL", "LdrLoadDll"); bool zProtect::BlockAPI(HANDLE hProcess, char* [...] read more
c++
memory
crash
release
messagebox
0votes
1answer

Strange stack trace in Windows Phone 8

Hi I have a Windows phone app which is getting a number of crashes reported by the dev center. I recently did an upgrade which included some minor changes and the moving of some common code from a Silverlight class library to a Windows phone class library (so that I [...] read more
windows-phone-8
crash-dumps
0votes
5answers

How can I use a DLL from Python

I am trying to load a DLL in Python, I want to use its eConnect() function using ctypes What I know from the source code of the DLL: * from the *.cpp source code: bool eConnect( const char *host, UINT port, int clientId=0); * from the dependency walker tool: function [...] read more
python
dllimport
ctypes
0votes
1answer

Hunting memory leaks

I'm finding leaked heap blocks by using the following command in WinDbg !heap –l With each leaked heap block I get, I'm running to following to get the stack trace. !heap -p -a leakedheapblock The following is the result of this command: address 1c841cc0 found in _HEAP @ 3930000 HEAP_ENTRY [...] read more
com
memory-leaks

Comments

Leave a comment

(plain text only)

Sources

  1. https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-code-reference2
  2. https://msdn.microsoft.com/en-us/library/cc231198.aspx
  3. winerror.h from Windows SDK 10.0.14393.0

User contributions licensed under CC BY-SA 3.0