Skip to content

Commit 206ded3

Browse files
committed
Learn Editor: Update use-dumpchk-to-check-memory-dump-file.md
1 parent 5fc508e commit 206ded3

1 file changed

Lines changed: 21 additions & 84 deletions

File tree

support/windows-server/performance/use-dumpchk-to-check-memory-dump-file.md

Lines changed: 21 additions & 84 deletions
Original file line numberDiff line numberDiff line change
@@ -16,110 +16,47 @@ This article describes how to check a memory dump file by using Dumpchk.
1616

1717
_Original KB number:_   156280
1818

19-
> [!NOTE]
20-
>
2119
## Summary
2220

23-
Dumpchk is a command-line utility you can use to verify that a memory dump file has been created correctly. Dumpchk does not require access to symbols.
21+
Dumpchk is a command-line utility you can use to verify that a memory dump file has been created correctly. If a memory dump file is corrupt, it cannot be analyzed in a debugger. Using dumpchk to verify a dump file is in a good state is helpful as it will save time and effort in uploading corrupt dump files to be analyzed by support professionals. Dumpchk does not require access to symbols.
2422

25-
Dumpchk is part of the Windows Debugging Tools. Follow the instructions in this link to install the tool.
23+
Dumpchk is part of the Windows Debugging Tools. There are two versions of the Windows Debugger.
2624

27-
[https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/dumpchk](/windows-hardware/drivers/debugger/dumpchk)
25+
You must install the version of the Windows Debugging Tools included in the Windows SDK - [Windows SDK - Windows app development | Microsoft Developer](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdeveloper.microsoft.com%2Fen-us%2Fwindows%2Fdownloads%2Fwindows-sdk%2F&data=05%7C02%7CWarren.Williams%40microsoft.com%7C50935613ca604985339808dd5bdf9a6a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638767738151340942%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=bFHDAUD4S%2Fr83YtkM47ejDZryVRp2VLfjioX1txssPI%3D&reserved=0).
2826

29-
## Dumpchk command-line switches
27+
1. Download the SDK installer
3028

31-
Dumpchk has the following command-line switches:
29+
1. Lauch the installer and select "Windows Debugging Tools" and anything else you would like to install
3230

33-
DUMPCHK [options] \<CrashDumpFile>
31+
1. After the installation completes, dumchk.exe will be in the directory that you installed the Windows Debugging in. Use the version that matches your hardware platform.
3432

35-
- -? Display the command syntax.
33+
When Dumpchk runs, it displays some basic information from the memory dump file, then verifies all the virtual and physical addresses in the file. You will see a lot of symbol errors if a symbol path is not specified but those can be ignored as we are checking the dump file for corruption. If any errors are found in the memory dump file, Dumpchk reports them.
3634

37-
- -p Prints the header only (with no validation).
35+
If there is an error during any portion of the output displayed above, the dump file is corrupted, and analysis cannot be performed.
3836

39-
- -v Specifies verbose mode.
37+
When dumpchk is finished it will display the stop code and any parameters.
4038

41-
- -q Performs a quick test.
4239

43-
- -c Do dump validation.
44-
45-
- -x Extra file validation. Takes several minutes.
46-
47-
- -e Do dump exam.
48-
49-
- -y <Path> Set the symbol search path for dump exam.
50-
51-
- If the symbol search path is empty, the CD-ROM
52-
- is used for symbols.
53-
54-
- -b <Path> Set the image search path for dump exam.
55-
56-
- If the symbol search path is empty, <SystemRoot>\system32
57-
58-
- is used for symbols.
59-
60-
- -k <File> Set the name of the kernel to File.
40+
```
41+
BUGCHECK_CODE: 1e
42+
43+
BUGCHECK_P1: ffffffffc0000420
6144
62-
- -h <File> Set the name of the hal to File.
45+
BUGCHECK_P2: fffff8004dbab02a
6346
64-
Dumpchk displays some basic information from the memory dump file, then verifies all the virtual and physical addresses in the file. If any errors are found in the memory dump file, Dumpchk reports them. The following is an example of the output of a Dumpchk command:
47+
BUGCHECK_P3: 0 BUGCHECK_P4: fffff8003a6d5f20
6548
66-
```output
67-
Filename . . . . . . .memory.dmp
68-
Signature. . . . . . .PAGE
69-
ValidDump. . . . . . .DUMP
70-
MajorVersion . . . . .free system
71-
MinorVersion . . . . .1057
72-
DirectoryTableBase . .0x00030000
73-
PfnDataBase. . . . . .0xffbae000
74-
PsLoadedModuleList . .0x801463d0
75-
PsActiveProcessHead. .0x801462c8
76-
MachineImageType . . .i386
77-
NumberProcessors . . .1
78-
BugCheckCode . . . . .0xc000021a
79-
BugCheckParameter1 . .0xe131d948
80-
BugCheckParameter2 . .0x00000000
81-
BugCheckParameter3 . .0x00000000
82-
BugCheckParameter4 . .0x00000000
49+
SYMBOL_NAME: nt_symbols!72291DF0104D000
8350
84-
ExceptionCode. . . . .0x80000003
85-
ExceptionFlags . . . .0x00000001
86-
ExceptionAddress . . .0x80146e1c
51+
PROCESS_NAME: ntoskrnl.exe
8752
88-
NumberOfRuns . . . . .0x3
89-
NumberOfPages. . . . .0x1f5e
90-
Run #1
91-
BasePage . . . . . .0x1
92-
PageCount. . . . . .0x9e
93-
Run #2
94-
BasePage . . . . . .0x100
95-
PageCount. . . . . .0xec0
96-
Run #3
97-
BasePage . . . . . .0x1000
98-
PageCount. . . . . .0x1000
53+
IMAGE_NAME: ntoskrnl.exe
9954
100-
**************--> Validating the integrity of the PsLoadedModuleList
101-
**************--> Performing a complete check (^C to end)
102-
**************--> Validating all physical addresses
103-
**************--> Validating all virtual addresses
104-
**************--> This dump file is good!
105-
```
55+
MODULE_NAME: <Module Name>
10656
107-
If there is an error during any portion of the output displayed above, the dump file is corrupted and analysis cannot be performed.
57+
FAILURE_BUCKET_ID: <Bucket Id>
10858
109-
In this example, the most important information (from a debugging standpoint) is the following:
59+
FAILURE_ID_HASH: {029f6661-9c67-6d47-23e5-a0398183d06e}
11060
111-
```output
112-
MajorVersion . . . . .free system
113-
MinorVersion . . . . .1057
114-
MachineImageType . . .i386
115-
NumberProcessors . . .1
116-
BugCheckCode . . . . .0xc000021a
117-
BugCheckParameter1 . .0xe131d948
118-
BugCheckParameter2 . .0x00000000
119-
BugCheckParameter3 . .0x00000000
120-
BugCheckParameter4 . .0x00000000
12161
```
12262

123-
This information can be used to determine what Kernel STOP Error occurred and, to a certain extent, what version of Windows was in use.
124-
125-
The information in this article is from the Windows NT Resource Kit. For more information on Dumpchk.exe and other debugging utilities, see Appendix A in the Windows NT 3.51 Resource Kit Update and Update 2.

0 commit comments

Comments
 (0)