Memory.DMP Debugging (ºí·ç½ºÅ©¸° ¹ß»ý½Ã ¿À·ùºÐ¼®)
Áö³´Þ¿¡ ÀÌ¾î ºí·ç½ºÅ©¸° Áï ¸Þ¸ð¸® ´ýÇÁ°¡ ¹ß»ýµÆÀ» °æ¿ì Debug ÇÏ¿© ¹®Á¦ÀÇ ¿øÀÎÀ» ÆľÇÇÏ´Â ¹æ¹ýÀ» ¾È³» ÇÕ´Ï´Ù.
Memory.dmp ÆÄÀÏÀ» °£´ÜÇÏ°Ô Ã¼Å©ÇÒ¼ö ÀÖ´Â ÅøÀº ÀÌ¹Ì ¾Ë·Áµå¸° ¹Ù¿Í°°ÀÌ Dumpchk.exe ¶õ ÅøÀÌ ÀÖ½À´Ï´Ù. ÀÌ Åø·Î ÀϹÝÀûÀΠüũ¸¦ ÇÏ¸é ¾Æ·¡¿Í °°Àº °á°ú¸¦ È®ÀÎÇÒ¼ö ÀÖ½À´Ï´Ù.
************************************************************ Filename . . . . . . .c:winntmemory.dmp Signature. . . . . . .PAGE ValidDump. . . . . . .DUMP MajorVersion . . . . .free system MinorVersion . . . . .2195 DirectoryTableBase . .0x00030000 PfnDataBase. . . . . .0x8188e000 PsLoadedModuleList . .0x8046e8f0 PsActiveProcessHead. .0x8046e728 MachineImageType . . .i386 NumberProcessors . . .1 BugCheckCode . . . . .0x000000d1 BugCheckParameter1 . .0x00000000 BugCheckParameter2 . .0x00000000 BugCheckParameter3 . .0x00000000 BugCheckParameter4 . .0x00000000
ExceptionCode. . . . .0x80000003 ExceptionFlags . . . .0x00000001 ExceptionAddress . . .0x804690f3
************** **************--> Validating the integrity of the PsLoadedModuleList ************** ************** **************--> No errors in the module list. ************** ************** **************--> This dump file is good! ************** ************************************************************
À§¿¡¼ ´«¿©°Ü º¼¸¸ÇÑ ºÎºÐÀº
BugCheckCode . . . . .0x000000d1 BugCheckParameter1 . .0x00000000 BugCheckParameter2 . .0x00000000 BugCheckParameter3 . .0x00000000 BugCheckParameter4 . .0x00000000
À§¿Í °°Àº Çü½ÄÀÇ ÄÚµåÀÔ´Ï´Ù. ÀÌ°ÍÀº ºí·ç½ºÅ©¸°ÀÌ ¶¸À»´ç½Ã ³ªÅ¸³ª´Â ÄÚµåÀÔ´Ï´Ù.
À̺¥Æ® ºä¾î¸¦ º¸½Ã¸é ÇØ´ç ¸Þ½ÃÁö¸¦ È®ÀÎÇϽǼö ÀÖ½À´Ï´Ù.
À̺¥Æ® Çü½Ä: Á¤º¸ À̺¥Æ® ¿øº»: Save Dump À̺¥Æ® ¹üÁÖ: ¾øÀ½ À̺¥Æ® ID: 1001 ³¯Â¥: 200X-00-00 ½Ã°£: ¿ÀÀü 1:44:24 »ç¿ëÀÚ: N/A ÄÄÇ»ÅÍ: XXXXXX ¼³¸í: ÄÄÇ»ÅÍ°¡ ¿À·ù °Ë»ç ÈÄ ´Ù½Ã ºÎÆ®µÇ¾ú½À´Ï´Ù. ¿À·ù °Ë»ç: 0x000000d1 (0x00000000, 0x00000000, 0x00000000, 0x00000000). Microsoft Windows 2000 [v15.2195]. ´ýÇÁ ÀúÀå À§Ä¡: C:WINNTMEMORY.DMP.
BugCheckCode ·Î MS Support page ¿¡¼ ¿À·ù°Ë»öÀ» ÇÏ½Ã°í µÚ¿¡ µû¶ó¿À´Â Parameter °ªµéÀº °¢°¢ ¾Æ·¡¿Í °°Àº °ªÀ» ³ªÅ¸³À´Ï´Ù.
1 - memory that is referenced 2 - IRQL 3 - value 0 = read operation, 1 = write operation 4 - address that referenced memory
±×¸®°í ÀÌÁ¦ Dump ÆÄÀÏÀ» µð¹ö±ë ÇÒ¼öÀÖ´Â ÅøÀ» ¾È³»ÇØ µå¸®°Ú½À´Ï´Ù.
ÇÊ¿äÇÑ ÆÄÀϵéÀº ¾Æ·¡¿Í °°½À´Ï´Ù.
1. ¼³Ä¡µÈ OS ÀÇ I386 Æú´õ (Áï OS CD ÀÇ I386) 2. Symbols ÆÄÀÏ 3. Debugging Tool 4. Memory.dmp ÆÄÀÏ
À§ ÆäÀÌÁö¿¡¼ ÇØ´ç OS ¹öÀüº° Symbols ÆÄÀÏÀ» ´Ù¿î¹ÞÀ¸½Ã±â ¹Ù¶ø´Ï´Ù.
* Symbols ¿Í Debugging tool Àº ÇØ´ç ¼¹ö¿¡ ¼³Ä¡ÇÕ´Ï´Ù.
³×°¡Áö ÀÚ·á°¡ ¸ðµÎ ÁغñµÇ¾ú´Ù¸é µð¹ö±ëÀ» ½ÃÀÛÇÕ´Ï´Ù.
¸í·É ÇÁ·ÒÇÁÆ® »óÅ¿¡¼ ¾Æ·¡ ¸í·ÉÇü½ÄÀ¸·Î µð¹ö±ëÀ» ÇÕ´Ï´Ù.
C:Program FilesDebugging Tools for Windows>windbg -y SymbolPath -i ImagePath -z DumpFilePath
C:Program FilesDebugging Tools for Windows>kd -y SymbolPath -i ImagePath -z DumpFilePath
¿¹Á¦> kd -y SRV*c:winntsymbols*http://msdl.microsoft.com/download/symbols -i c:i386 -z c:winntMemory.DMP
À§¿Í °°ÀÌ ¿Ï·á°¡ µÇ¸é µð¹ö±ë °á°ú¸¦ º¸½Ç¼ö ÀÖ½À´Ï´Ù.
°á°ú¿¡¼ Áß¿äÇÏ°Ô º¸¼Å¾ß ÇÒ ÀÚ·á´Â ¾Æ·¡ ³»¿ëµé ÀÔ´Ï´Ù.
-------------- Use !analyze -v to get detailed debugging information.
BugCheck D1, {000000, 000, 0, 00000000}
*** ERROR: Module load completed but symbols could not be loaded for xxxx.xxxx
Probably caused by : xxxx.xxxx ( xxxx+xx )
Followup: MachineOwner --------------
xxxx.xxx ÆÄÀÏÀÌ ±× ¹®Á¦ÀÇ ÆÄÀÏÀÌ µË´Ï´Ù ÇØ´ç ÆÄÀÏÀ» ¹®Á¦¼¹ö¿¡¼ °Ë»öÇÏ¿© Ãæµ¹À̳ª, ¿¡·¯°¡ ¾ø´ÂÁö È®ÀÎÇÕ´Ï´Ù.
±×¿Ü ¾Æ·¡ Á¤º¸¸¦ º¸½Ç¼ö ÀÖ½À´Ï´Ù. !analyze -show ¸í·ÉÀº Stop ¿À·ù ÄÚµå(¹ö±× È®ÀÎ ÄÚµå¶ó°íµµ ÇÔ)¿Í ¸Å°³ º¯¼ö¸¦ Ç¥½ÃÇÕ´Ï´Ù. !analyze -v ¸í·ÉÀº ÀÚ¼¼ÇÑ Á¤º¸ Ãâ·ÂÀ» Ç¥½ÃÇÕ´Ï´Ù. !drivers ¸í·ÉÀº ¹®Á¦°¡ ¹ß»ýÇÒ ¶§ ÇØ´ç ÄÄÇ»ÅÍ¿¡ ·ÎµåµÈ µå¶óÀ̹öÀÇ ¸ñ·ÏÀ» Ç¥½ÃÇÕ´Ï´Ù.
±×¸®°í Debugging Tool À» ¼³Ä¡ÇϽøé debugger.chm ÆÄÀÏ Áï µµ¿ò¸»ÀÌ ÀÖ½À´Ï´Ù.
ÀÌ°÷À» Àо½Ã´Â °Íµµ ¸¹Àº µµ¿òÀÌ µÉµí ÇÕ´Ï´Ù.
|