Close

Results 1 to 4 of 4
  1. #1
    DF Founder Raptor's Avatar
    Join Date
    Nov 1999
    Location
    USA
    Posts
    93,833
    Thanks
    462
    Thanked:        1,837
    Karma Level
    5549

    Info How To Analyze Memory Dumps

    How To Analyze Memory Dumps
    When you get a stop error (Blue Screen of Deathor BSOD), your system writes a small file called a minidump. This is a small write up on how to debug memory dumps. This becomes extremely useful when you are trying to figure out what caused a particular stop error, and no filename was mentioned and/or it is undocumented.

    You could always let Microsoft do it for you, but there is no gurantee they will answer, and it takes a very long time (over a month in my case).


    Your first step is to download and install the Microsoft Debugging Tools found here: [Only registered and activated users can see links. ]

    Once you have downloaded and installed these tools, go to start, all programs, Debugging Tools For Windows, Windbg. Once you open Windbg, you will presented with a blank screen. Click on File, Symbol File Path. Here you will enter the symbols path. Symbols are needed to effectively debug.

    The path will be:

    SRV*c:\symbols*[Only registered and activated users can see links. ]

    Enter in this path and click OK. Now, go to File, Save Workspace so that your symbols path is saved for future use. Now what you want to do is locate your memory dumps. They are usually located in %systemroot%/minidump (in my case C:/windows/minidump).

    If you notice, they are usually named the date, and then a -*number* to indicate the order of minidumps that day. My example is called Mini061904-01.dmp (it happened today).

    Inside of Windbg, go to File, Open Crash Dump and load the file. You will get a message to save base workspace information. Choose no.

    Now you will get a debugging screen. Now it takes a little bit to run it, as the symbols have to be downloaded as they are needed. Then you will see information such as:

    Symbol search path is: SRV*c:\symbols*[Only registered and activated users can see links. ]

    Microsoft ® Windows Debugger Version 6.3.0017.0
    Copyright © Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\WINDOWS\Minidump\Mini061904-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*[Only registered and activated users can see links. ]
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp2.030422-1633
    Kernel base = 0x804d4000 PsLoadedModuleList = 0x80543530
    Debug session time: Sat Jun 19 19:06:57 2004
    System Uptime: 0 days 1:03:36.951
    Loading Kernel Symbols
    ................................................................................
    ....................................................
    Loading unloaded module list
    ..........
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 86427532, {1db, 2, 3, b} <--This is your stop code

    Unable to load image pavdrv51.sys, Win32 error 2
    *** WARNING: Unable to verify timestamp for pavdrv51.sys
    *** ERROR: Module load completed but symbols could not be loaded for pavdrv51.sys
    Probably caused by : pavdrv51.sys ( pavdrv51+7fc0 )

    Followup: MachineOwner
    ---------

    Now, we can already see what it was most likely caused by, in my case it was pavdrv51.sys, which is a Panda AV file.

    If we want to get further in depth, we can use the command, !analyze -v at the kd> prompt to delve more info about the error:

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Unknown bugcheck code (86427532)
    Unknown bugcheck description <--Its unknown, and not listed on the MS KB at all.
    Arguments:
    Arg1: 000001db
    Arg2: 00000002
    Arg3: 00000003
    Arg4: 0000000b

    Debugging Details:
    ------------------


    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x86427532

    LAST_CONTROL_TRANSFER: from f4198fc0 to 804f4103

    STACK_TEXT:
    f41f0964 f4198fc0 86427532 000001db 00000002 nt!KeBugCheckEx+0x19
    WARNING: Stack unwind information not available. Following frames may be wrong.
    f41f0ba0 f419920b 864db520 f419ccf0 00000000 pavdrv51+0x7fc0
    f41f0c34 804ea221 865b8910 864a52c0 806ad190 pavdrv51+0x820b
    f41f0c44 8055d0fe 864a5330 86305028 864a52c0 nt!IopfCallDriver+0x31
    f41f0c58 8055de46 865b8910 864a52c0 86305028 nt!IopSynchronousServiceTail+0x5e
    f41f0d00 80556cea 000000a4 00000000 00000000 nt!IopXxxControlFile+0x5c2
    f41f0d34 8052d571 000000a4 00000000 00000000 nt!NtDeviceIoControlFile+0x28
    f41f0d34 7ffe0304 000000a4 00000000 00000000 nt!KiSystemService+0xc4
    00cdff70 00000000 00000000 00000000 00000000 SharedUserData!SystemCallStub+0x4


    FOLLOWUP_IP:
    pavdrv51+7fc0
    f4198fc0 ?? ???

    SYMBOL_STACK_INDEX: 1

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: pavdrv51+7fc0

    MODULE_NAME: pavdrv51

    IMAGE_NAME: pavdrv51.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 3e8c072b

    STACK_COMMAND: kb

    BUCKET_ID: 0x86427532_pavdrv51+7fc0

    Followup: MachineOwner
    ---------

    After the intial run of the debug process, you can use the command !analyze -v to gather more information.

    Now that may be more infor than you need. This tutorial only covers minidumps, however, if needed, you could change your memory dump options to do a complete dump. This is useful, however, very cumbersome, as the file generated will be the same size as your amount of ram.

    Note: Make absolutely sure that your symbol path is correct. If it isn't, then you will get symbol errors and not likely be able to debug the dump to get the info you desire.

  2. #2
    Banned Goldberg's Avatar
    Join Date
    Jun 2001
    Location
    Mumsnet
    Posts
    14,430
    Thanks
    1,313
    Thanked:        1,535
    Karma Level
    0

    Default Re: How To Analyze Memory Dumps

    Top post. We use this at work when Customers server machines get the occasional BSOD.

  3. #3
    DF Super Moderator Over Carl's Avatar
    Join Date
    Apr 2006
    Location
    London
    Posts
    13,079
    Thanks
    3,829
    Thanked:        1,654
    Karma Level
    1270

    Default Re: How To Analyze Memory Dumps

    Thought it maybe handy trying to figure out wtf is going on a few times but never really bothered looking into it.

  4. #4
    DF Jedi TotallyRandom's Avatar
    Join Date
    Apr 2007
    Location
    Scotland
    Posts
    1,902
    Thanks
    152
    Thanked:        83
    Karma Level
    327

    Default Re: How To Analyze Memory Dumps

    Found this wee program on my tracks for Analysing Memory Dumps very handy quick and easy to export

    Click the loads button top left > Change the - Load From the following mini dump folder
    Point at your folder with the mini dumps are.

    then you can see all the mini dumps at once Stop code/Message and file that is causing it.
    Then View > HTML Report All times to export it all.
    Attached Files Attached Files

    Thanks to TotallyRandom

    lagigolo (13th September 2013) 


Similar Threads

  1. Dumps for tvx
    By kev121 in forum Digital Terrestrial TV
    Replies: 10
    Last Post: 30th April 2008, 10:22 PM
  2. Analyze This: Wrapping Up the Year in Gaming
    By ZX7R in forum Old Skool Gaming & Retro
    Replies: 1
    Last Post: 4th January 2007, 07:37 PM
  3. Firmware dumps?
    By Gunnzie in forum Sony Handhelds
    Replies: 5
    Last Post: 16th June 2006, 04:51 PM

Tags for this Thread

Social Networking Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •