Reading BSOD crash files

rive0108

Vista Guru
Gold Member
This Microsoft software will allow the reading of crash Dumps. Simplifying the issues with Blue-Screen driver/hardware exceptions, and providing the data necessary for resolution for the problem(s).

To use it Run the executable as "Admin", Click "file" and "open Crash Dump" navigate to the Windows\Minidump file (or other location)

Vista x64 systems:
http://www.microsoft.com/whdc/devtools/debugging/install64bit.mspx

Vista x86/XP:
Install Debugging Tools for Windows 32-bit Version

note- for futher info on overriding the default Install location and setting dump files for default handling by the debugger (advanced Users) see:http://www.vistax64.com/tutorials/221510-crash-dumps-analyse-bugcheck-process.html
Any questions/advanced dump file analysis/troubleshooting/Install/default handling Issues should be directed to the Tutorial for proper resolution.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Step 1
Download the debugging tool for your system

Step 2
Override installation/or Install to default Location

Step 3
Create symbol cache folder

Step 4
Set the debuggging tool path for for the symbol cache
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------



Download the debugger package that matches YOUR machine's architecture


In other words, if you're running 32-bit Vista, install the 32-bit version of the "Debugging Tools for Windows", irrespective of whether you intend to debug 32-bit or 64-bit code. Vice versa for x64 - download and install the x64 package, and you'll still be able to debug 32-bit dumps. I suspect that few people would be running Itaniums around here, so don't grab the IA-64 build. "IA-64" (Itanium) is a vastly different architecture to "x64" (AMD64, a.k.a. EM64T when sold by Intel).


Override the default install path and install to 'c:\debuggers' instead
Or Install into default Programs location

This is entirely optional but you'll be happier, especially if you intend to do a fair amount of dump gazing. Choose the "custom" install option and use c:\debuggers (or d:\debuggers or whatever drive) as the install path. It makes it easier to work with the tools and removes that pesky "Program Files" space from the path name. The debugger package is a lot more command-line oriented than many apps nowadays.


Set your symbol path (critical- and not optional)

- Start WinDBG
- WITHOUT opening any dump files, click File, "Symbol File Path..."
- Set the path to be the following:
SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols

note-this works if you set "c:\SymCache" as you local file path (creating the file), If for example, you use "c:\windows\symbols" the path would be:
SRV*c:\windows\symbols*http://msdl.microsoft.com/download/symbols

It can be any valid local path, c:\Symbols or e:\MySymbols or whatever, but the SRV and http bits must be exactly as above. Don't move the local path around too much though because the idea is to build up a local cache of symbols that minimises your waiting time while symbols are being downloaded from MS. That local cache can grow quite large over time, if you do a lot of this.

- Exit WinDBG. It should ask you whether you wish to save workspace settings. "Yes" is the answer.
- Check that from now onwards the symbol file path is always set that way whenever you start WinDBG.


Opening and analysing dumps

Once you've done the preparatory steps above, "File | Open Crash Dump..." in WinDBG to get it to open up and analyse a minidump or any other memory dump, including crashes from user-mode processes. If you want to re-invoke its automated analysis engine, use the !ANALYZE -V command. The "v" switch stands for "verbose" - it spews out a bit more detail.

Your done!!
[Thanks to H2S04 for the Walkthrough.]
 
Last edited:

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics Card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB)
    and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive:
    Panasonic UJ-220 DL BD-RE (Blu-Ray)
Yes and probably best to put in link to path instead of downloading - they say many things on that MS page about symbols http://support.microsoft.com/kb/311503 -
Code:
SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
as path should be enough.

2i27urr.jpg
 

My Computer

System One

  • CPU
    AMD X2 6000
    Motherboard
    Gigabyte GA-MA790FX-DS5
    Memory
    Corsair 4x1gb 6400C4
    Graphics Card(s)
    XFX 8800GTS XT 320mb, Generic Nvidia 6200 PCI 128mb
    Sound Card
    Onboard Realtek ALC889A
    Monitor(s) Displays
    24" Samsung 245b, 20" Dell 2007WFP, 19" Samsung 193P
    Hard Drives
    WD Raptor 74gb, Maxtor 300gb, WD Caviar 16SE 500gb
    PSU
    Corsair 520W
    Case
    Cooler Master Centurion 532
    Keyboard
    Logitech G15
    Mouse
    Logitech MX1100R
    Internet Speed
    20mb down, 1mb up
What dk70 said. If the symbol path is configured that way, whenever the debugger encounters a new binary for which it must find symbols, it will:

1) Check first in C:\symbols. If a matching symbol is not found...
2) Check whether the symbol is available from the MS symbol server. If it is, copy it down to C:\symbols so it can be cached.

In practice, the MS symbol server will contain symbols for MS binaries (exe, dll, sys), but not for 3rd-party modules, obviously.

To have WinDBG attempt analysis of a crash dump, either a BSoD or a usermode process dump, simply open the dump via File | Open, or pass it as a command-line arg. The debugger will attempt to find the relevant symbols and it will then produce a diagnosis, to the best of its automated abilities. Look for a line like this in the output:

Probably caused by : win32k.sys ( win32k!FindTimer+57 )
If that references a non-default driver, the first thing to do is to update the driver. If that doesn't help and subsequent dumps all point at the same driver again, try removing it as a test.

In the example above, it's win32k.sys and that's a rather important system driver. When the "probably caused by" verdict points at an OS binary, the situation is far more complex and minidump analysis cannot always pinpoint the true cause.
 

My Computer

More Debugger Trickery For The Interested

A minidump contains 3 main items of information:

1) The stack of the thread which directly caused the crash. This can be viewed with the various 'k' (stack unwind) commands:

1: kd> kL
Child-SP RetAddr Call Site
fffffa60`09cd0528 fffff800`01cb60ee nt!KeBugCheckEx
fffffa60`09cd0530 fffff800`01cb5abc nt!KiBugCheckDispatch+0x6e
fffffa60`09cd0670 fffff800`01cc96bd nt!KiSystemServiceHandler+0x7c
fffffa60`09cd06b0 fffff800`01cd0cff nt!RtlpExecuteHandlerForException+0xd
fffffa60`09cd06e0 fffff800`01c8dd83 nt!RtlDispatchException+0x22f
fffffa60`09cd0dd0 fffff800`01cb61a9 nt!KiDispatchException+0xc3
fffffa60`09cd13d0 fffff800`01cb4d8d nt!KiExceptionDispatch+0xa9
fffffa60`09cd15b0 fffff960`0011c947 nt!KiGeneralProtectionFault+0xcd
fffffa60`09cd1740 fffff960`00121e2d win32k!FindTimer+0x57
fffffa60`09cd1790 fffff800`01cb5df3 win32k!NtUserKillTimer+0x5d
fffffa60`09cd17d0 00000000`7790c24a nt!KiSystemServiceCopyEnd+0x13

2) The processor register context of that thread:

1: kd> r
rax=fffffa6009cd0630 rbx=fffffa6009cd17d0 rcx=000000000000003b
rdx=00000000c0000005 rsi=fffff80001cb5df3 rdi=fffff80001e64df4
rip=fffff80001cb6350 rsp=fffffa6009cd0528 rbp=fffffa6009cd1508
r8=fffff9600011c947 r9=fffffa6009cd0ee0 r10=0000000000000000
r11=0000000000000001 r12=fffffa6009cc4000 r13=fffffa6009cd4000
r14=fffff80001c61000 r15=fffff80001daf4ec
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000286
nt!KeBugCheckEx:
fffff800`01cb6350 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa60`09cd0530=000000000000003b

In this case, the 64-bit instruction pointer (RIP) was in nt!KeBugCheckEx at the time of the crash, which is not surprising given that's the "bluescreen" function.

3) A list of loaded modules at the time of the crash. The 'lm' (list modules) command can show these:

1: kd> lm
start end module name
fffff800`01c1b000 fffff800`01c61000 hal (deferred)
fffff800`01c61000 fffff800`02179000 nt (pdb symbols) c:\symcache\ntkrnlmp.pdb\149C563625CA49CEA2881CEDF5D55CCF2\ntkrnlmp.pdb
fffff960`00050000 fffff960`00301000 win32k (pdb symbols) c:\symcache\win32k.pdb\97A727330C184A9B9E1BDA0C3293AA142\win32k.pdb
fffff960`00410000 fffff960`0041a000 TSDDD (deferred)
fffff960`00620000 fffff960`00631000 cdd (deferred)
...

In the example above, the debugger has only encountered "nt" (NTOSKRNL itself) and win32k.sys code in the stack, which is why it has downloaded symbols (they have a PDB extension) from the MS symbol server for those two binaries, but not for hal.dll, TSDDD.dll, and cdd.dll. Their symbol status is listed as "deferred".

Even More Debugger Trickery For The Really Interested

Minidumps can also easily reveal basic information about the Windows version, service pack level, time of the crash, and system uptime:

1: kd> vertarget
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
Machine Name:
Kernel base = 0xfffff800`01c61000 PsLoadedModuleList = 0xfffff800`01e26db0
Debug session time: Thu Apr 2 07:07:55.076 2009 (GMT+11)
System Uptime: 0 days 0:02:00.122

Say you've identified a driver that you believe to be responsible, and now you want to see more particulars about that binary. Use 'lmvm' with the module name:

1: kd> lmvm tdrpm147
start end module name
fffffa60`0140c000 fffffa60`01590000 tdrpm147 (deferred)
Image path: \SystemRoot\system32\DRIVERS\tdrpm147.sys
Image name: tdrpm147.sys
Timestamp: Mon Oct 13 21:14:16 2008 (48F31F78)
CheckSum: 0018472C
ImageSize: 00184000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

To get more info on the processor(s):

1: kd> !cpuinfo
CP F/M/S Manufacturer MHz PRCB Signature MSR 8B Signature Features
1 6,15,11 GenuineIntel 2405 000000b600000000 20193ffe
Cached Update Signature 000000b600000000
Initial Update Signature 000000b600000000


To see the writeup for a given bugcheck code:

1: kd> !analyze -show D1
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

And the most useful command of all (try it):

windbg> .hh

=============================================

Full dumps allow for much more meaningful analysis but they're hundreds of MB or even several GB in size, depending on the dump type, and for a 2-minute look at someone's BSoD problem a minidump is perfectly sufficient. If their system is going up and down like a yo-yo and the dumps all point at the same 3rd-party driver - bingo. Otherwise, if virtually every dump points at a different culprit and they mostly look odd, chances are it's a hardware issue.
 
Last edited by a moderator:

My Computer

H2SO4-

How about providing the entire "Admin:Command Prompt" Run Command for registering the dump files at the installed location?
 

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics Card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB)
    and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive:
    Panasonic UJ-220 DL BD-RE (Blu-Ray)
How about making this thread sticky?
 

My Computer

System One

  • Manufacturer/Model
    Dell XPS720
    CPU
    Intel Quad Q6600 2.40GHz
    Motherboard
    Dell 0YU822, NVIDIA nForce 680i SLI SPP / SLI MCP
    Memory
    4GB DDR2 800MHz
    Graphics Card(s)
    Gainward GeForce GTX 560 Ti, 1024 MB GDDR5
    Sound Card
    Creative SB X-Fi Xtreme Gamer
    Monitor(s) Displays
    Dell 2407WFP-HC
    Screen Resolution
    1920x1200
    Hard Drives
    NVIDIA 640GB SATA Raid 0 (2x320GB) (7200 rpm) for Vista,
    Intel X25-M G2 160 GB for W7,
    Maxtor OT III External HDD,
    WD Elements 1 TB External HDD
    Internet Speed
    100/20
    Other Info
    M779 PCIe PAL/SECAM/DVB-T Desktop TV Tuner. Broadcom NetXtreme 57xx Gigabit Controller.
Sorry Rive0108, I forgot about that before. OK, rewinding a bit to the beginning...


Download the debugger package that matches YOUR machine's architecture

http://www.microsoft.com/whdc/devtools/debugging/default.mspx

In other words, if you're running 32-bit Vista, install the 32-bit version of the "Debugging Tools for Windows", irrespective of whether you intend to debug 32-bit or 64-bit code. Vice versa for x64 - download and install the x64 package, and you'll still be able to debug 32-bit dumps. I suspect that few people would be running Itaniums around here, so don't grab the IA-64 build. "IA-64" (Itanium) is a vastly different architecture to "x64" (AMD64, a.k.a. EM64T when sold by Intel).


Override the default install path and install to c:\debuggers instead

This is entirely optional but you'll be happier, especially if you intend to do a fair amount of dump gazing. Choose the "custom" install option and use c:\debuggers (or d:\debuggers or whatever drive) as the install path. It makes it easier to work with the tools and removes that pesky "Program Files" space from the path name. The debugger package is a lot more command-line oriented than many apps nowadays.


Register WinDBG as the default handler for dump files

Another entirely optional step that makes life easier. By registering WinDBG (the main debugger you'll want to use) as the default handler for common dump file types, you'll be able to just double-click on a dump and have it open in WinDBG without having to go through the File | Open... rigmarole every time. This registration needs to be performed from an elevated CMD prompt (run CMD as administrator):
C:\>cd debuggers
C:\debuggers>windbg.exe -IA
WinDBG should fire up and pop up a dialog box that says this:
---------------------------
WinDbg:6.11.0001.402 AMD64
---------------------------
WinDbg successfully registered file assocations for .DMP, .HDMP, .MDMP, .KDMP and .WEW.
---------------------------
OK
---------------------------
Set your symbol path

This is NOT optional. In fact, getting it wrong is the #1 reason for frustration when learning to debug. There are several ways to get it right, but the one that dk70 already mentioned is possibly the simplest:

- Start WinDBG
- WITHOUT opening any dump files, click File, "Symbol File Path..."
- Set the path to be the following:
It can be any valid local path, c:\Symbols or e:\MySymbols or whatever, but the SRV and http bits must be exactly as above. Don't move the local path around too much though because the idea is to build up a local cache of symbols that minimises your waiting time while symbols are being downloaded from MS. That local cache can grow quite large over time, if you do a lot of this.

- Exit WinDBG. It should ask you whether you wish to save workspace settings. "Yes" is the answer.
- Check that from now onwards the symbol file path is always set that way whenever you start WinDBG.


Opening and analysing dumps

Once you've done the preparatory steps above, you can double-click (if registered) or "File | Open Crash Dump..." in WinDBG to get it to open up and analyse a minidump or any other memory dump, including crashes from user-mode processes. If you want to re-invoke its automated analysis engine, use the !ANALYZE -V command. The "v" switch stands for "verbose" - it spews out a bit more detail.
 

My Computer

this is fantastic never seen it before i must read more stickies , im trying to learn how to read crash dumps properly i figured out he software months ago i just need the time to research and figure out exactly what im looking at and how to interperate the info
 

My Computer

System One

  • Manufacturer/Model
    Custom Build
    CPU
    Intel Q9550 @ 4Gig / Titan Fenir
    Motherboard
    XFX 780i
    Memory
    4GB OCZ PC2-8500C5 DDR2
    Graphics Card(s)
    Gainward GTX260/216 SLI
    Sound Card
    Creative X-FI Xtreme Gamer
    Monitor(s) Displays
    Dell UltraSharp 2209WA 22"
    Screen Resolution
    1680x1050
    Hard Drives
    western digital raptor 10000rpm sata
    PSU
    OCZ Modstream 700w
    Cooling
    Titan Fenir
    Keyboard
    Razer Reclusa
    Mouse
    Logitech G5 Gamer
    Internet Speed
    8mb
this is fantastic never seen it before i must read more stickies , im trying to learn how to read crash dumps properly i figured out he software months ago i just need the time to research and figure out exactly what im looking at and how to interperate the info

Glad you're finding this interesting.

There's a tutorial with a tad more info. If you have more in-depth questions, please don't be bashful about asking. I live to prattle ;)
 

My Computer

Back
Top