Bug Check 0xC4: DRIVER_VERIFIER_DETECTED_VIOLATION
来源:互联网 发布:大众汽车销售数据采集 编辑:程序博客网 时间:2024/05/16 12:24
Bug Check 0xC4: DRIVER_VERIFIER_DETECTED_VIOLATION
The DRIVER_VERIFIER_DETECTED_VIOLATION bug check has a value of 0x000000C4. This is the general bug check code for fatal errors found by Driver Verifier. For more information, seeHandling a Bug Check When Driver Verifier is Enabled.
DRIVER_VERIFIER_DETECTED_VIOLATION Parameters
Parameter 1 identifies the type of violation. The meaning of the remaining parameters varies with the value of Parameter 1. The parameter values are described in the following table.
- Expand your browser window to full size.
- Place the cursor in the table and use the arrow keys to scroll left and right.
- Or use the MSDN Library version of this page.
0x00
Current IRQL
Pool type
0
The driver requested a zero-byte pool allocation.
0x01
Current IRQL
Pool type
Size of allocation, in bytes
The driver attempted to allocate paged memory with IRQL > APC_LEVEL.
0x02
Current IRQL
Pool type
Size of allocation, in bytes
The driver attempted to allocate nonpaged memory with IRQL > DISPATCH_LEVEL.
0x10
Bad Address
0
0
The driver attempted to free an address that was not returned from an allocate call.
0x11
Current IRQL
Pool type
Address of pool
The driver attempted to free paged pool with IRQL > APC_LEVEL.
0x12
Current IRQL
Pool type
Address of pool
The driver attempted to free nonpaged pool with IRQL > DISPATCH_LEVEL.
0x13 or
0x14
Reserved
Pointer to pool header
Pool header contents
The driver attempted to free memory pool which was already freed.
0x16
Reserved
Pool address
0
The driver attempted to free pool at a bad address, or the driver passed invalid parameters to a memory routine.
0x30
Current IRQL
Requested IRQL
0
The driver passed an invalid parameter to KeRaiseIrql.
(The parameter was either a value lower than the current IRQL, or a value higher than HIGH_LEVEL. This may be the result of using an uninitialized parameter.)
0x31
Current IRQL
Requested IRQL
0: New IRQL is bad
1: New IRQL is invalid inside a DPC routine
The driver passed an invalid parameter to KeLowerIrql.
(The parameter was either a value higher than the current IRQL, or a value higher than HIGH_LEVEL. This may be the result of using an uninitialized parameter.)
0x32
Current IRQL
Spin lock address
0
The driver called KeReleaseSpinLock at an IRQL other than DISPATCH_LEVEL.
(This may be due to a double-release of a spin lock.)
0x33
Current IRQL
Fast mutex address
0
The driver attempted to acquire fast mutex with IRQL > APC_LEVEL.
0x34
Current IRQL
Fast mutex address
0
The driver attempted to release fast mutex at an IRQL other than APC_LEVEL.
0x35
Current IRQL
Spin lock address
Old IRQL
The kernel released a spin lock with IRQL not equal to DISPATCH_LEVEL.
0x36
Current IRQL
Spin lock number
Old IRQL
The kernel released a queued spin lock with IRQL not equal to DISPATCH_LEVEL.
0x37
Current IRQL
Thread APC disable count
Resource
The driver tried to acquire a resource, but APCs are not disabled.
0x38
Current IRQL
Thread APC disable count
Resource
The driver tried to release a resource, but APCs are not disabled.
0x39
Current IRQL
Thread APC disable count
Mutex
The driver tried to acquire a mutex "unsafe" with IRQL not equal to APC_LEVEL on entry.
0x3A
Current IRQL
Thread APC disable count
Mutex
The driver tried to release a mutex "unsafe" with IRQL not equal to APC_LEVEL on entry.
0x3C
Handle passed to routine
Object type
0
The driver called ObReferenceObjectByHandle with a bad handle.
0x3D
0
0
Address of the bad resource
The driver passed a bad (unaligned) resource to ExAcquireResourceExclusive.
0x3E
0
0
0
The driver called KeLeaveCriticalRegion for a thread that is not currently in a critical region.
0x3F
Object address
New object reference count.
-1: dereference case
1: reference case
0
The driver applied ObReferenceObject to an object that has a reference count of zero, or the driver appliedObDereferenceObject to an object that has a reference count of zero.
0x40
Current IRQL
Spin lock address
0
The driver called KeAcquireSpinLockAtDpcLevel with IRQL < DISPATCH_LEVEL.
0x41
Current IRQL
Spin lock address
0
The driver called KeReleaseSpinLockFromDpcLevel with IRQL < DISPATCH_LEVEL.
0x42
Current IRQL
Spin lock address
0
The driver called KeAcquireSpinLock with IRQL > DISPATCH_LEVEL.
0x51
Base address of allocation
Address of the reference beyond the allocation
Number of charged bytes
The driver attempted to free memory after having written past the end of the allocation. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x52
Base address of allocation
Reserved
Number of charged bytes
The driver attempted to free memory after having written past the end of the allocation. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x53,
0x54,
or 0x59
Base address of allocation
Reserved
Reserved
The driver attempted to free memory after having written past the end of the allocation. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x60
Bytes allocated from paged pool
Bytes allocated from nonpaged pool
Total number of allocations that were not freed
The driver is unloading without first freeing its pool allocations. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x61
Bytes allocated from paged pool
Bytes allocated from nonpaged pool
Total number of allocations that were not freed
A driver thread is attempting to allocate pool memory while the driver is unloading. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x62
Name of the driver
Reserved
Total number of allocations that were not freed, including both paged and nonpaged pool
The driver is unloading without first freeing its pool allocations. A bug check with this parameter occurs only when thePool Tracking option of Driver Verifier is active.
0x70
Current IRQL
MDL address
Access mode
The driver called MmProbeAndLockPages with IRQL > DISPATCH_LEVEL.
0x71
Current IRQL
MDL address
Process address
The driver called MmProbeAndLockProcessPages with IRQL > DISPATCH_LEVEL.
0x72
Current IRQL
MDL address
Process address
The driver called MmProbeAndLockSelectedPages with IRQL > DISPATCH_LEVEL.
0x73
Current IRQL
In 32-bit Windows: Low 32 bits of the physical address
In 64-bit Windows: the 64-bit physical address
Number of bytes
The driver called MmMapIoSpace with IRQL > DISPATCH_LEVEL.
0x74
Current IRQL
MDL address
Access mode
The driver called MmMapLockedPages in kernel mode with IRQL > DISPATCH_LEVEL.
0x75
Current IRQL
MDL address
Access mode
The driver called MmMapLockedPages in user mode with IRQL > APC_LEVEL.
0x76
Current IRQL
MDL address
Access mode
The driver called MmMapLockedPagesSpecifyCache in kernel mode with IRQL > DISPATCH_LEVEL.
0x77
Current IRQL
MDL address
Access mode
The driver called MmMapLockedPagesSpecifyCache in user mode with IRQL > APC_LEVEL.
0x78
Current IRQL
MDL address
0
The driver called MmUnlockPages with IRQL > DISPATCH_LEVEL.
0x79
Current IRQL
Virtual address being unmapped
MDL address
The driver called MmUnmapLockedPages in kernel mode with IRQL > DISPATCH_LEVEL.
0x7A
Current IRQL
Virtual address being unmapped
MDL address
The driver called MmUnmapLockedPages in user mode with IRQL > APC_LEVEL.
0x7B
Current IRQL
Virtual address being unmapped
Number of bytes
The driver called MmUnmapIoSpace with IRQL > APC_LEVEL.
0x7C
MDL address
MDL flags
0
The driver called MmUnlockPages, and passed an MDL whose pages were never successfully locked.
0x7D
MDL address
MDL flags
0
The driver called MmUnlockPages, and passed an MDL whose pages are from nonpaged pool.
(These should never be unlocked.)
0x7E
Current IRQL
DISPATCH_LEVEL
0
The driver called MmAllocatePagesForMdl, MmAllocatePagesForMdlEx, or MmFreePagesFromMdl with IRQL > DISPATCH_LEVEL.
0x7F
Current IRQL
MDL address
MDL flags
The driver called BuildMdlForNonPagedPool and passed an MDL whose pages are from paged pool.
0x80
Current IRQL
Event address
0
The driver called KeSetEvent with IRQL > DISPATCH_LEVEL.
0x81
MDL address
MDL flags
0
The driver called MmMapLockedPages.
(You should use MmMapLockedPagesSpecifyCache instead, with the BugCheckOnFailure parameter set toFALSE.)
0x82
MDL address
MDL flags
0
The driver called MmMapLockedPagesSpecifyCache with the BugCheckOnFailure parameter equal toTRUE.
(This parameter should be set to FALSE.)
0x83
Start of physical address range to map
Number of bytes to map
First page frame number that isn't locked down
The driver called MmMapIoSpace without having locked down the MDL pages. The physical pages represented by the physical address range being mapped must have been locked down prior to making this call.
0x85
MDL address
Number of pages to map
First page frame number that isn't locked down
The driver called MmMapLockedPages without having locked down the MDL pages.
0x89
MDL address
Pointer to the non-memory page in the MDL
The non-memory page number in the MDL
An MDL is not marked as "I/O", but it contains non-memory page addresses.
0x91
Reserved
Reserved
Reserved
The driver switched stacks using a method that is not supported by the operating system. The only supported way to extend a kernel mode stack is by usingKeExpandKernelStackAndCallout.
0xA0 (Windows Server 2003 and later operating systems only)
Pointer to the IRP making the read or write request
Device object of the lower device
Number of the sector in which the error was detected
A cyclic redundancy check (CRC) error was detected on a hard disk. A bug check with this parameter occurs only when theDisk Integrity Checking option of Driver Verifier is active.
0xA1 (Windows Server 2003 and later operating systems only)
Copy of the IRP making the read or write request. (The actual IRP has been completed.)
Device object of the lower device
Number of the sector in which the error was detected
A CRC error was detected on a sector (asynchronously). A bug check with this parameter occurs only when theDisk Integrity Checking option of Driver Verifier is active.
0xA2 (Windows Server 2003 and later operating systems only)
IRP making the read or write request, or a copy of this IRP
Device object of the lower device
Number of the sector in which the error was detected
The CRCDISK checksum copies don't match. This could be a paging error. A bug check with this parameter occurs only when theDisk Integrity Checking option of Driver Verifier is active.
0xB0 (Windows Vista and later operating systems only)
MDL address
MDL flags
Incorrect MDL flags
The driver called MmProbeAndLockPages for an MDL with incorrect flags. For example, the driver passed an MDL created byMmBuildMdlForNonPagedPool to MmProbeAndLockPages.
0xB1 (Windows Vista and later operating systems only)
MDL address
MDL flags
Incorrect MDL flags
The driver called MmProbeAndLockProcessPages for an MDL with incorrect flags. For example, the driver passed an MDL created byMmBuildMdlForNonPagedPool to MmProbeAndLockProcessPages.
0xB2 (Windows Vista and later operating systems only)
MDL address
MDL flags
Incorrect MDL flags
The driver called MmMapLockedPages for an MDL with incorrect flags. For example, the driver passed an MDL that is already mapped to a system address or that was not locked toMmMapLockedPages.
0xB3 (Windows Vista and later operating systems only)
MDL address
MDL flags
Missing MDL flags (at least one was expected)
The driver called MmMapLockedPages for an MDL with incorrect flags. For example, the driver passed an MDL that is not locked toMmMapLockedPages.
0xB4 (Windows Vista and later operating systems only)
MDL address
MDL flags
Unexpected partial MDL flag
The driver called MmUnlockPages for a partial MDL. A partial MDL is one that was created byIoBuildPartialMdl.
0xC0 (Windows Vista and later operating systems only)
Address of the IRP
Reserved
Reserved
The driver called IoCallDriver with interrupts disabled.
0xC1 (Windows Vista and later operating systems only)
Address of the driver dispatch routine
Reserved
Reserved
A driver dispatch routine was returned with interrupts disabled.
0xC2 (Windows Vista and later operating systems only)
Reserved
Reserved
Reserved
The driver called a Fast I/O dispatch routine after interrupts were disabled.
0xC3 (Windows Vista and later operating systems only)
Address of the driver Fast I/O dispatch routine
Reserved
Reserved
A driver Fast I/O dispatch routine was returned with interrupts disabled.
0xC5 (Windows Vista and later operating systems only)
Address of the driver dispatch routine
The current thread's APC disable count
The thread's APC disable count prior to calling the driver dispatch routine
A driver dispatch routine has changed the thread's APC disable count.
The APC disable count is decremented each time a driver calls KeEnterCriticalRegion, FsRtlEnterFileSystem, or acquires a mutex.
The APC disable count is incremented each time a driver calls KeLeaveCriticalRegion, KeReleaseMutex, or FsRtlExitFileSystem.
Because these calls should always be in pairs, the APC disable count should be zero whenever a thread is exited. A negative value indicates that a driver has disabled APC calls without re-enabling them. A positive value indicates that the reverse is true.
0xC6 (Windows Vista and later operating systems only)
Address of the driver Fast I/O dispatch routine
Current thread's APC disable count
The thread's APC disable count prior to calling the Fast I/O driver dispatch routine
A driver Fast I/O dispatch routine has changed the thread's APC disable count.
The APC disable count is decremented each time a driver calls KeEnterCriticalRegion, FsRtlEnterFileSystem, or acquires a mutex.
The APC disable count is incremented each time a driver calls KeLeaveCriticalRegion, KeReleaseMutex, or FsRtlExitFileSystem.
Because these calls should always be in pairs, the APC disable count should be zero whenever a thread is exited. A negative value indicates that a driver has disabled APC calls without re-enabling them. A positive value indicates that the reverse is true.
0xCA (Windows Vista and later operating systems only)
Address of the lookaside list
Reserved
Reserved
The driver has attempted to re-initialize a lookaside list.
0xCB (Windows Vista and later operating systems only)
Address of the lookaside list
Reserved
Reserved
The driver has attempted to delete an uninitialized lookaside list.
0xCC (Windows Vista and later operating systems only)
Address of the lookaside list
Starting address of the pool allocation
Size of the pool allocation
The driver has attempted to free a pool allocation that contains an active lookaside list.
0xCD (Windows Vista and later operating systems only)
Address of the lookaside list
Block size specified by the caller
Minimum supported block size
The driver has attempted to create a lookaside list with an allocation block size that is too small.
0xD0 (Windows Vista and later operating systems only)
Address of the ERESOURCE structure
Reserved
Reserved
The driver has attempted to re-initialize an ERESOURCE structure.
0xD1 (Windows Vista and later operating systems only)
Address of the ERESOURCE structure
Reserved
Reserved
The driver has attempted to delete an uninitialized ERESOURCE structure.
0xD2 (Windows Vista and later operating systems only)
Address of the ERESOURCE structure
Starting address of the pool allocation
Size of the pool allocation
The driver has attempted to free a pool allocation that contains an active ERESOURCE structure.
0xD5 (Windows Vista and later operating systems only)
Address of the IO_REMOVE_LOCK structure created by the checked build version of the driver
Current IoReleaseRemoveLock tag
Reserved
The current IoReleaseRemoveLock tag does not match the previous IoAcquireRemoveLock tag. If the driver calling IoReleaseRemoveLock is not in a checked build, Parameter 2 is the address of the shadow IO_REMOVE_LOCK structure created by Driver Verifier on behalf of the driver. In this case, the address of the IO_REMOVE_LOCK structure used by the driver is not used at all, because Driver Verifier is replacing the lock address for all the remove lock APIs. A bug check with this parameter occurs only when theI/O Verification option of Driver Verifier is active.
0xD6 (Windows Vista and later operating systems only)
Address of the IO_REMOVE_LOCK structure created by the checked build version of the driver
Tag that does not match previous IoAcquireRemoveLock tag
Previous IoAcquireRemoveLock tag
The current IoReleaseRemoveLockAndWait tag does not match the previous IoAcquireRemoveLock tag. If the driver calling IoReleaseRemoveLock is not a checked build, Parameter 2 is the address of the shadow IO_REMOVE_LOCK structure created by Driver Verifier on behalf of the driver. In this case, the address of the IO_REMOVE_LOCK structure used by the driver is not used at all, because Driver Verifier is replacing the lock address for all the remove lock APIs. A bug check with this parameter occurs only when theI/O Verification option of Driver Verifier is active.
0xD7 (Windows 7 operating systems and later only)
Address of the checked build Remove Lock structure that is used internally by Driver Verifier
Address of the Remove Lock structure that is specified by the driver
Reserved
A Remove Lock cannot be re-initialized, even after it calls IoReleaseRemoveLockAndWait, because other threads might still be using that lock (by callingIoAcquireRemoveLock). The driver should allocate the Remove Lock inside its device extension, and initialize it a single time. The lock will be deleted together with the device extension.
0xDA (Windows Vista and later operating systems only)
Starting address of the driver
WMI callback address inside the driver
Reserved
An attempt was made to unload a driver that has not deregistered its WMI callback function.
0xDB (Windows Vista and later operating systems only)
Address of the device object
Reserved
Reserved
An attempt was made to delete a device object that was not deregistered from WMI.
0xDC (Windows Vista and later operating systems only)
Reserved
Reserved
Reserved
An invalid RegHandle value was specified as a parameter of the function EtwUnregister.
0xDD (Windows Vista and later operating systems only)
Address of the call to EtwRegister
Starting address of the unloading driver
For Windows 8Windows 8 and later versions, this parameter is the ETW RegHandle value.
An attempt was made to unload a driver without calling EtwUnregister.
0xDF (Windows 7 operating systems and later only)
Synchronization object address
The synchronization object is in session address space. Synchronization objects are not allowed in session address space because they can be manipulated from another session or from system threads that have no session virtual address space.
0xE0 (Windows Vista and later operating systems only)
User-mode address that is used as a parameter
Size ,in bytes, of the address range that is used as a parameter
Reserved
A call was made to an operating system kernel function that specified a user-mode address as a parameter.
0xE1 (Windows Vista and later operating systems only)
Address of the synchronization object
Reserved
Reserved
A synchronization object was found to have an address that was either invalid or pageable.
0xE2 (Windows Vista and later operating systems only)
Address of the IRP
User-mode address present in the IRP
Reserved
An IRP with Irp->RequestorMode set to KernelMode was found to have a user-mode address as one of its members.
0xE3 (Windows Vista and later operating systems only)
Address of the call to the API
User-mode address used as a parameter in the API
Reserved
A driver has made a call to a kernel-mode ZwXxx routine with a user-mode address as a parameter.
0xE4 (Windows Vista and later operating systems only)
Address of the call to the API
Address of the malformed UNICODE_STRING structure
Reserved
A driver has made a call to a kernel-mode ZwXxx routine with a malformed UNICODE_STRING structure as a parameter.
0xE5 (Windows Vista and later operating systems only)
Current IRQL
Reserved
Reserved
A call was made to a Kernel API at the incorrect IRQL.
0xEA (Windows Vista and later operating systems only)
Current IRQL
The thread's APC disable count
Address of the pushlock
A driver has attempted to acquire a pushlock while APCs are enabled.
0xEB (Windows Vista and later operating systems only)
Current IRQL
The thread's APC disable count
Address of the pushlock
A driver has attempted to release a pushlock while APCs are enabled.
0xF0 (Windows Vista and later operating systems only)
Address of the destination buffer
Address of the source buffer
Number of bytes to copy
A driver called the memcpy function with overlapping source and destination buffers.
0xF5 (Windows Vista and later operating systems only)
Address of the NULL handle
Object type
Reserved
A driver passed a NULL handle to ObReferenceObjectByHandle.
0xF6 (Windows 7 operating systems and later)
Handle value being referenced
Address of the current process
Address inside the driver that performs the incorrect reference
A driver references a user-mode handle as kernel mode.
0xF7 (Windows 7 operating systems and later)
Handle value specified by the caller
Object type specified by the caller
AccessMode specified by the caller
A driver is attempting a user-mode reference for a kernel handle in the context of the system process.
0xFA (Windows 7 operating systems and later)
Completion routine address.
IRQL value before it calls the completion routine
Current IRQL value, after it calls the completion routine
The IRP completion routine returned at an IRQL that was different from the IRQL the routine was called at.
0xFB (Windows 7 operating systems and later)
Completion routine address
Current thread's APC disable count
The thread's APC disable count before it calls the IRP completion routine
The thread's APC disable count was changed by the driver's IRP completion routine.
The APC disable count is decremented each time a driver calls KeEnterCriticalRegion, FsRtlEnterFileSystem, or acquires a mutex.
The APC disable count is incremented each time a driver calls KeLeaveCriticalRegion, KeReleaseMutex, or FsRtlExitFileSystem.
Because these calls should always be in pairs, the APC disable count should be zero whenever a thread is exited. A negative value indicates that a driver has disabled APC calls without re-enabling them. A positive value indicates that the reverse is true.
0x105
(Windows 7 operating systems and later)
Address of the IRP
The driver uses ExFreePool instead of IoFreeIrp to release the IRP.
0x10A
(Windows 7 operating systems and later)
The driver attempts to charge pool quota to the Idle process.
0x10B
(Windows 7 operating systems and later)
The driver attempts to charge pool quota from a DPC routine. This is incorrect because the current process context is undefined.
0x110
(Windows 7 operating systems and later)
Address of the Interrupt Service Routine
Address of the extended context that was saved before it executed the ISR
Address of the extended context was saved after it executed the ISR
The interrupt service routine (ISR) for the driver has corrupted the extended thread context.
0x115
(Windows 7 operating systems and later)
The address of the thread that is responsible for the shutdown, which might be deadlocked
Driver Verifier detected that the system has taken longer than 20 minutes and shutdown is not complete.
0x11A
(Windows 7 operating systems and later)
Current IRQL
The driver calls KeEnterCriticalRegion at IRQL > APC_LEVEL.
0x11B
(Windows 7 operating systems and later)
Current IRQL
The driver calls KeLeaveCriticalRegion at IRQL > APC_LEVEL.
0x120
(Windows 7 operating systems and later)
Address of the IRQL value
Address of the Object to wait on
Address of Timeout value
The thread waits at IRQL > DISPATCH_LEVEL. Callers of KeWaitForSingleObject or KeWaitForMultipleObjects must run at IRQL <= DISPATCH_LEVEL.
0x121
(Windows 7 operating systems and later)
Address of the IRQL value
Address of the Object to wait on
Address of Timeout value
The thread waits at IRQL equals DISPATCH_LEVEL and the Timeout is NULL. Callers of KeWaitForSingleObject or KeWaitForMultipleObjects can run at IRQL <= DISPATCH_LEVEL. If aNULL pointer is supplied for Timeout, the calling thread remains in a wait state until the Object is signaled.
0x122
(Windows 7 operating systems and later)
Address of the IRQL value
Address of the Object to wait on
Address of the Timeout value
The thread waits at DISPATCH_LEVEL and Timeout value is not equal to zero (0). If the Timeout != 0, the callers of KeWaitForSingleObject or KeWaitForMultipleObjects must run at IRQL <= APC_LEVEL.
0x123
(Windows 7 operating systems and later)
Address of the Object to wait on
The caller of KeWaitForSingleObject or KeWaitForMultipleObjects specified the wait asUserMode, but the Object is on the kernel stack.
0x130
(Windows 7 operating systems and later)
Address of work item
The work item is in session address space. Work items are not allowed in session address space because they can be manipulated from another session or from system threads that have no session virtual address space.
0x131
(Windows 7 operating systems and later)
Address of work item
The work item is in pageable memory. Work items have to be in nonpageable memory because the kernel uses them at DISPATCH_LEVEL.
0x135
Address of IRP
Number of milliseconds allowed between the IoCancelIrp call and the completion for this IRP
The canceled IRP did not completed in the expected time The driver took longer than expected to complete the canceled IRP.
0x13A
Address of the pool block being freed
Incorrect value
Address of the incorrect value
The driver has called ExFreePool and Driver Verifier detects an error in one of the internal values that is used to track pool usage.
0x13B
Address of the pool block being freed
Address of the incorrect value
Address of a pointer to the incorrect memory page
The driver has called ExFreePool and Driver Verifier detects an error in one of the internal values that is used to track pool usage.
0x13C
Address of the pool block being freed
Incorrect value
Address of the incorrect value
The driver has called ExFreePool and Driver Verifier detects an error in one of the internal values that is used to track pool usage.
0x13D
Address of the pool block being freed
Address of the incorrect value
Correct value that was expected
The driver has called ExFreePool and Driver Verifier detects an error in one of the internal values that is used to track pool usage.
0x13E
Pool block address specified by the caller
Pool block address tracked by Driver Verifier
Pointer to the pool block address that is tracked by Driver Verifier
The pool block address specified by the caller of ExFreePool is different from the address tracked by Driver Verifier.
0x13F
Address of the pool block being freed
Number of bytes being freed
Pointer to the number of bytes tracked by Driver Verifier
The number of bytes of memory being freed in the call to ExFreePool is different from the number of bytes tracked by Driver Verifier.
0x1000 (Windows XP and later operating systems only)
Address of the resource
Reserved
Reserved
Self-deadlock: The current thread has tried to recursively acquire a resource. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1001 (Windows XP and later operating systems only)
Address of the resource that was the final cause of the deadlock
Reserved
Reserved
Deadlock: A lock hierarchy violation has been found. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
(Use the !deadlock extension for further information.)
0x1002 (Windows XP and later operating systems only)
Address of the resource
Reserved
Reserved
Uninitialized resource: A resource has been acquired without having been initialized first. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1003 (Windows XP and later operating systems only)
Address of the resource that is being released deadlocked
Address of the resource that should have been released first
Reserved
Unexpected release: A resource has been released in an incorrect order. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1004 (Windows XP and later operating systems only)
Address of the resource
Address of the thread that acquired the resource
Address of the current thread
Unexpected thread: The wrong thread releases a resource. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1005 (Windows XP and later operating systems only)
Address of the resource
Reserved
Reserved
Multiple initialization: A resource is initialized more than one time. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1007 (Windows XP and later operating systems only)
Address of the resource
Reserved
Reserved
Unacquired resource: A resource is released before it has been acquired. A bug check with this parameter occurs only when theDeadlock Detection option of Driver Verifier is active.
0x1008
(Windows 7 operating systems and later)
Lock address
Driver Verifier internal data
Driver Verifier internal data
The driver tried to acquire a lock by using an API that is mismatched for this lock type.
0x1009
(Windows 7 operating systems and later)
Lock address
Driver Verifier internal data
Driver Verifier internal data
The driver tried to release a lock by using an API that is mismatched for this lock type.
0x100A
(Windows 7 operating systems and later)
Owner thread address
Driver Verifier internal data
The terminated thread owns the lock.
0x100B
(Windows 7 operating systems and later)
Lock address
Owner thread address
Driver Verifier internal address
The deleted lock is still owned by a thread.
0xA001
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch object (if NON-NULL)
Reserved (unused)
VM Switch: The SourceHandle for the caller-supplied NetBufferList must be set. See theAllocateNetBufferListForwardingContext routine.
0xA002
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch object (if NON-NULL).
Reserved (unused)
VM Switch: The caller supplied NetBufferList's forwarding detail is not zero. See theAllocateNetBufferListForwardingContext routine.
0xA003
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch object (if NON-NULL).
Reserved (unused)
VM Switch: The caller supplied a NetBufferList with packet header or routing context that is NULL. SeePacket Management Guidelines for the Extensible Switch Data Path.
0xA004
(Windows 8.1 operating systems and later)
ID of invalid port
NIC Index
A pointer to the virtual switch object (if NON-NULL).
VM Switch: The caller specified an invalid Port and NIC index combination. SeeHyper-V Extensible Switch Port and Network Adapter States.
0xA005
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the Destination list.
A pointer to the virtual switch object (if NON-NULL).
VM Switch: The caller supplied an invalid destination. See AddNetBufferListDestination and UpdateNetBufferListDestinations.
0xA006
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch object (if NON-NULL).
Reserved (unused)
VM Switch: The caller supplied an invalid source NIC or Port object. See Hyper-V Extensible Switch Port and Network Adapter States.
0xA007
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch object (if NON-NULL).
Reserved (unused)
VM Switch: The caller supplied an invalid destination list. See AddNetBufferListDestination and UpdateNetBufferListDestinations.
0xA008
(Windows 8.1 operating systems and later)
Parent NIC object
NIC index
A pointer to the virtual switch object (if NON-NULL).
VM Switch: Attempting to reference a NIC when not allowed. See Hyper-V Extensible Switch Port and Network Adapter States.
0xA009
(Windows 8.1 operating systems and later)
Port being referenced
A pointer to the virtual switch object (if NON-NULL)
Reserved (unused)
VM Switch: Attempt to reference a port when not allowed. See Hyper-V Extensible Switch Port and Network Adapter States.
0xA00A
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
ContextTypeInfo object
Reserved (unused)
VM Switch: Failure context is already set. See SetNetBufferListSwitchContext.
0xA00B
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
NDIS_SWITCH_REPORT_FILTERED_NBL_FLAGS_*
A pointer to the virtual switch object (if NON-NULL)
VM Switch: Invalid direction provided for dropped NetBufferList. See ReportFilteredNetBufferLists.
0xA00C
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
Send Flags value
A pointer to the virtual switch object (if NON-NULL)
VM Switch: NetBufferList chain has multiple source ports when NDIS_SEND_FLAGS_SWITCH_SINGLE_SOURCE flag is set. SeeHyper-V Extensible Switch Send and Receive Flags.
0xA00D
(Windows 8.1 operating systems and later)
A pointer to the NetBufferList object
A pointer to the virtual switch context
A pointer to the virtual switch object (if NON-NULL)
VM Switch: One or more NetBufferLists in chain have invalid destination when NDIS_RECEIVE_FLAGS_SWITCH_DESTINATION_GROUP flag is set. SeeHyper-V Extensible Switch Send and Receive Flags.
0x2000
(Windows 7 operating systems and later)
The first argument passed to the StorPortInitialize routine. This parameter is a pointer to the driver object that the operating system passed to the miniport driver in the first argument of the miniport driver'sDriverEntry routine.
The second argument passed to the StorPortInitialize routine. This parameter is a pointer to context information that the operating system passed to the miniport driver in the second argument of the miniport driver'sDriverEntry routine.
Reserved
The Storport miniport driver passed a bad argument (a NULL pointer) to theStorPortInitialize routine.
0x00020002
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlApcLte. The rule specifies that the driver must call ObGetObjectSecurity and ObReleaseObjectSecurity only when IRQL <= APC_LEVEL.
0x00020003
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlDispatch. The IrqlDispatch rule specifies that the driver must call certain routines only when IRQL = DISPATCH_LEVEL
0x00020004
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlExAllocatePool. The IrqlExAllocatePool rule specifies that the driver callsExAllocatePoolWithTag and ExAllocatePoolWithTagPriority only when at IRQL<=DISPATCH_LEVEL.
0x00020005
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlExApcLte1. The IrqlExApcLte1 rule specifies that the driver calls ExAcquireFastMutex and ExTryToAcquireFastMutex only at IRQL <= APC_LEVEL.
0x00020006
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlExApcLte2. The IrqlExApcLte2 rule specifies that the driver calls certain routines only when IRQL <= APC_LEVEL.
0x00020007
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlExApcLte3. The IrqlExApcLte3 rule specifies that the driver must call certain executive support routines only when IRQL <= APC_LEVEL.
0x00020008
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlExPassive. The IrqlExPassive rule specifies that the driver must call certain executive support routines only when IRQL = PASSIVE_LEVEL.
0x00020009
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoApcLte. The IrqlIoApcLte rule specifies that the driver must call certain I/O manager routines only when IRQL <= APC_LEVEL.
0x0002000A
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoPassive1. The IrqlIoPassive1 rule specifies that the driver must call certain I/O manager routines only when IRQL = PASSIVE_LEVEL.
0x0002000B
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoPassive2. The IrqlIoPassive2 rule specifies that the driver must call certain I/O manager routines only when IRQL = PASSIVE_LEVEL.
0x0002000C
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoPassive3. The IrqlIoPassive3 rule specifies that the driver must call certain I/O manager routines only when IRQL = PASSIVE_LEVEL.
0x0002000D
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoPassive4. The IrqlIoPassive4 rule specifies that the driver must call certain I/O manager routines only when IRQL = PASSIVE_LEVEL.
0x0002000E
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlIoPassive5. The IrqlIoPassive5 rule specifies that the driver must call certain I/O manager routines only when IRQL = PASSIVE_LEVEL.
0x0002000F
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlKeApcLte1. The IrqlKeApcLte1 rule specifies that the driver must call certain kernel routines only when IRQL <= APC_LEVEL.
0x00020010
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlKeApcLte2. The IrqlKeApcLte2 rule specifies that the driver must call certain kernel routines only when IRQL <= APC_LEVEL.
0x00020011
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlKeDispatchLte. The IrqlKeDispatchLte rule specifies that the driver must call certain kernel routines only when IRQL <= DISPATCH_LEVEL.
0x00020015
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlKeReleaseSpinLock. The IrqlKeReleaseSpinLock rule specifies that the driver must call KeReleaseSpinLock only when IRQL = DISPATCH_LEVEL.
0x00020016
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlKeSetEvent. The IrqlKeSetEvent rule specifies that the KeSetEvent routine is only called at IRQL <= DISPATCH_LEVEL when Wait is set to FALSE, and at IRQL <= APC_LEVEL when Wait is set to TRUE.
0x00020019
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlMmApcLte. The IrqlMmApcLte rule specifies that the driver must call certain memory manager routines only when IRQL <= APC_LEVEL.
0x0002001A
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlMmDispatch. The IrqlMmDispatch rule specifies that the driver must callMmFreeContiguousMemory only when IRQL = DISPATCH_LEVEL.
0x0002001B
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlObPassive. The IrqlObPassive rule specifies that the driver must call ObReferenceObjectByHandle only when IRQL = PASSIVE_LEVEL.
0x0002001C
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlPsPassive. The IrqlPsPassive rule specifies that the driver must call certain process and thread manager routines only when IRQL = PASSIVE_LEVEL.
0x0002001D
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule IrqlReturn.
0x0002001E
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlRtlPassive. The IrqlRtlPassive rule specifies that the driver must call RtlDeleteRegistryValue only when IRQL = PASSIVE_LEVEL.
0x0002001F
(Windows 8 operating systems and later)
Pointer to the string that describes the violated rule condition.
Optional pointer to the rule state variable(s).
Reserved
The driver violated the DDI compliance rule IrqlZwPassive. The IrqlZwPassive rule specifies that the driver must call ZwClose only when IRQL = PASSIVE_LEVEL.
0x00020022
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Reserved (unused)
Reserved (unused)
The driver violated the DDI compliance rule IrqlIoDispatch.
0x00040003
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule CriticalRegions.
0x00040006
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule QueuedSpinLock.
0x00040007
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule QueuedSpinLockRelease.
0x00040009
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule SpinLock.
0x0004000B
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule SpinlockRelease.
0x0004000E
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule GuardedRegions.
0x0004100B
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Reserved
Reserved
The driver violated the DDI compliance rule RequestedPowerIrp.
0x0004100F
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule IoSetCompletionExCompleteIrp.
0x00043006
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Reserved
Reserved
The driver violated the DDI compliance rule PnpRemove.
0x00091001
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule NdisOidComplete.
0x00091002
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule NdisOidDoubleComplete.
0x0009100E
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the DDI compliance rule NdisOidDoubleRequest.
0x00092003
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule NdisTimedOidComplete.
0x0009200D
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule NdisTimedDataSend.
0x0009200F
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule NdisTimedDataHang.
0x00093004
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanAssociation.
0x00093005
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanConnectionRoaming.
0x00093006
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanDisassociation.
0x00094007
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanTimedAssociation.
0x00094008
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanTimedConnectionRoaming.
0x00094009
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanTimedConnectRequest.
0x0009400B
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanTimedLinkQuality.
0x0009400C
(Windows 8.1 operating systems and later)
Pointer to the string that describes the violated rule condition.
Address of internal rule state (second argument to !ruleinfo).
Address of supplemental states (third argument to !ruleinfo).
The driver violated the NDIS/WIFI verification rule WlanTimedScan.
Cause
See the description of each code in the Parameters section for a description of the cause. Further information can be obtained by using the!analyze -v extension.
Resolution
This bug check can only occur when Driver Verifier has been instructed to monitor one or more drivers. If you did not intend to use Driver Verifier, you should deactivate it. You might also consider removing the driver that caused this problem.
If you are the driver writer, use the information obtained through this bug check to fix the bugs in your code.
For full details on Driver Verifier, see the Driver Verifier section of the Windows Driver Kit (WDK).
Remarks
The _POOL_TYPE codes are enumerated in Ntddk.h. In particular, 0 (zero) indicates nonpaged pool and1 (one) indicates paged pool.
(Windows 8 and later versions of Windows) If DDI compliance checking causes a bug check, run Static Driver Verifier on the driver source code and specify the DDI compliance rule (identified by the parameter 1 value) that caused the bug check. Static Driver Verifier can help you locate the cause of the problem in your source code.
See also
- Handling a Bug Check When Driver Verifier is Enabled
- Bug Check 0xC4: DRIVER_VERIFIER_DETECTED_VIOLATION
- 内存泄漏 - DRIVER_VERIFIER_DETECTED_VIOLATION (C4): 0x62
- Bug Check 0xA: IRQL_NOT_LESS_OR_EQUAL
- Bug Check 0xC9: DRIVER_VERIFIER_IOMANAGER_VIOLATION
- Bug Check
- 奇妙的BSOD:Bug Check 0xDA
- Bug Check Code Reference
- 蓝屏 BUG Check 109
- 一种bug的check方式
- Determining the source of Bug Check 0x133 (DPC_WATCHDOG_VIOLATION) errors on Windows Server 2012
- UnicodeDecodeError: 'utf8' codec can't decode byte 0xc4 in position 0: i报错问题
- 'ascii' codec can't decode byte 0xc4 in position 27: ordinal not in range(128)
- TinyOS bug程序的执行01(T-Check中的bug)
- Python各种错误之 UnicodeDecodeError: 'ascii' codec can't decode byte 0xc4 in position 33: ordinal not in
- Python UnicodeDecodeError: 'ascii' codec can't decode byte 0xc4 in position 33: ordinal not in range
- python下的utf8' codec can't decode byte 0xc4 in position 52: invalid continuation byte错误
- Bug Check Code Reference记下方便以后查找蓝屏原因
- TinyOS论文01:T-Check:Bug Finding for Sensor Networks.
- 虚拟机下搭建JDK+Tomcat+Nginx环境【一】——安装准备工作
- Android 自定义SwipeRefreshLayout与ListView、ScrollView滑动兼容冲突
- cfile与cstdiofile区别
- Android 常用权限
- 笨叔叔,你给我虚拟内存,哄小孩啊?
- Bug Check 0xC4: DRIVER_VERIFIER_DETECTED_VIOLATION
- Nginx的配置使用,启动、重启、关闭,以及路径配置
- error : Incorrect table definition; there can be only one TIMESTAMP column with CURRENT_TIMESTAMP in
- opencv android java端开发demo
- Windows下cmd黑窗口命令及用法
- [笔记]: 线段树
- Integer to Roman
- 调试内存泄漏
- 中兴4g模块me3620拨号