Windows error 0x0000002D, 45

Detailed Error Information

SCSI_DISK_DRIVER_INTERNAL[1]

This is a Blue Screen of Death stop code. More information is available in the Knowledge Base article Bug Check 0x2D: SCSI_DISK_DRIVER_INTERNAL.

HRESULT analysis[2]

This is probably not the correct interpretation of this error. The Win32 error above is more likely to indicate the actual problem.
FlagsSeveritySuccess

This code indicates success, rather than an error. This may not be the correct interpretation of this code, or possibly the program is handling errors incorrectly.

Reserved (R)false
OriginMicrosoft
NTSTATUSfalse
Reserved (X)false
FacilityCode0 (0x000)
NameFACILITY_NULL[2][3]
DescriptionThe default facility code.[2][3]
Error Code45 (0x002d)

Questions

3votes
2answers

Application Verifier reports access violation in call to ShellExecuteEx

SHORT VERSION Application Verifier says there is an access violation when running the code: var shi: TShellExecuteInfo; begin shi := Default(TShellExecuteInfo); shi.cbSize := SizeOf(TShellExecuteInfo); shi.lpFile := PChar('C:\Windows'); ShellExecuteEx(@shi); end; What's wrong with it? LONG VERSION I'm running my application under the Application Verifier, with the option to detect heap corruption [...] read more
winapi
windows-shell
application-verifier
3votes
1answer

lldb finding exit point of app

I am debugging an app that presumably has anti debugging measures, setting up breakpoints and signals stops for quitting the app doesn't stop the app from exiting, $ lldb App (lldb) target create "App" error: Invalid fde/cie next entry offset of 0x43029a18 found in cie/fde at 0x1404 Current executable set [...] read more
c
assembly
lldb
2votes
1answer

Analyze ESP32 backtrace on NodeMCU

I'm debugging some crashes on the dev-esp32 branch of the NodeMCU Lua firmware. How do you other NodeMCU devs analyze the backtraces? During normal ESP32 dev the idf monitor handles decoding the backtrace. I've tried to use the IDF monitor with my NodeMCU build (unsuccessfully). I've also tried https://github.com/me-no-dev/EspExceptionDecoder with [...] read more
esp32
nodemcu
esp-idf
2votes
1answer

lldb application on mac os

I would like to learn to use the lldb debugger on my Mac OSx (Yosemite) as I can't seem to get gdb to work properly (via homebrew). However I ran into a weird problem and wonder if someone can point me int he right direction. Basically after I loaded an [...] read more
macos
lldb
2votes
3answers

datatable not accepting the value of varbinary

the value buf has a datatype varbinary(max) and the value is 0x0000002D string buF = "0x" + BitConverter.ToString((byte[])dt.Rows[i]["BuF"]).Replace("-", ""); Label3.Text = buF; i use the value to find the fileid DataTable dt = new DataTable(); SqlConnection connection = new SqlConnection(); connection.ConnectionString = ConfigurationManager.ConnectionStrings["XYZ"].ConnectionString; connection.Open(); SqlCommand sqlCmd = new SqlCommand("SELECT FileID [...] read more
c#
asp.net
sql-server
database
datatable
0votes
0answers

App Verifier Stop 00000900 using File Open Dialog

My C++/MFC program uses the CFileDialog class to retrieve a filename to open. If I comment out the DoModal() call, no Verifier Stops occur. If the dialog is opened (even if it is then simply Canceled), the stops are generated -- three in a row. So I tried the Common [...] read more
c++
memory-leaks
heap-memory
application-verifier
0votes
1answer

iText 7 - Problem when signing PDF document

I've tried to sign a PDF file by USB token with CRL distribution points as below: URI = ldap:///CN=CA2,CN=www,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=cavn,DC=vn?certificateRevocationList?base?objectClass=cRLDistributionPoint URI = http://cavn.vn/new/CA2.crl URI = http://www.cavn.vn/new/CA2.crl The first URI failed to parse 1. The first question is: why don't iText7 try to read next URI when the first one fails? public [...] read more
c#
itext7
0votes
1answer

"dyld`__abort_with_payload" error and exit code 45 on attempted reverse engineering of iOS app

I am attempting to reverse engineer an iOS app to remove jailbreak detection. When using lldb, I got this output: * thread #1: tid = 0xe26e, 0x00000001012322f8 dyld`__abort_with_payload + 8, queue = 'com.apple.main-thread', stop reason = signal SIGABRT I looked it up and __abort_with_payload has to do with embedded binaries [...] read more
ios
reverse-engineering
jailbreak
lldb
0votes
1answer

PC register changes supplied value

I'm new to buffer overflows and although I believe I get the process, I feel that something is wrong here. I am studying from a book about exploitation and in the example, there is a simple buffer overflow on a 16 bytes string. This is the code of the binary. [...] read more
ios
buffer-overflow
armv7
0votes
1answer

Adding a property on Aspose.Email and reading it on Interop.Outlook.MailItem

I have an App that uses Aspose.Email on the server side and Microsoft.Office.Interop.Outlook on the client side. I want to add some named values to my MailMessage (or MapiMessage) so that they can be read in Microsoft.Office.Interop.Outlook.MailItem.ItemProperties. Can anyone help me with this? I’ve tried several things, but the last [...] read more
c#
outlook
aspose
0votes
1answer

C++ WriteProcessMemory makes MessageBox crash the programm

i want to write a little AntiHack and i have a problem with one part of it. The idea was to prevent from dll injecting by hooking the LdrLoadDll from NTDLL.DLL. I found a function by googling which do this: // function call: BlockAPI(m_hProc, "NTDLL.DLL", "LdrLoadDll"); bool zProtect::BlockAPI(HANDLE hProcess, char* [...] read more
c++
memory
crash
release
messagebox
0votes
1answer

Strange stack trace in Windows Phone 8

Hi I have a Windows phone app which is getting a number of crashes reported by the dev center. I recently did an upgrade which included some minor changes and the moving of some common code from a Silverlight class library to a Windows phone class library (so that I [...] read more
windows-phone-8
crash-dumps
0votes
5answers

How can I use a DLL from Python

I am trying to load a DLL in Python, I want to use its eConnect() function using ctypes What I know from the source code of the DLL: * from the *.cpp source code: bool eConnect( const char *host, UINT port, int clientId=0); * from the dependency walker tool: function [...] read more
python
dllimport
ctypes
0votes
1answer

Hunting memory leaks

I'm finding leaked heap blocks by using the following command in WinDbg !heap –l With each leaked heap block I get, I'm running to following to get the stack trace. !heap -p -a leakedheapblock The following is the result of this command: address 1c841cc0 found in _HEAP @ 3930000 HEAP_ENTRY [...] read more
com
memory-leaks

Comments

Leave a comment

(plain text only)

Sources

  1. https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-code-reference2
  2. https://msdn.microsoft.com/en-us/library/cc231198.aspx
  3. winerror.h from Windows SDK 10.0.14393.0

User contributions licensed under CC BY-SA 3.0