KD Memory.dmp debugging
One of our Citrix server encountered a BSOD, luckily we had RSA and managed to hard reboot the server.
I've gathered the memory dump to view the cause of BSOD and found the Symantec Antivirus has caused a module error on the NIC driver.
We have then disabled the Network Drives in the File System Auto Protect and it had not experienced the same ever since.
Did not find any help from Symantec regarding the root cause other than it's a known issue.
Below are some steps that you could use for debbuging:
Launch windbg passing it the location of the symbol files, the source files (i386 directory) and the dump file. Example: windbg -y dump\symbols -i SRC\i386 -z dump\Memory.dmp
At the bottom of the Command window there is a kd> prompt.
The commands are entered into that prompt: kd>!analyze -v
Two things to look for in the results: the memory referenced and the FAULTING_IP
The command: kd>lm - will produce a listing of modules and their memory location.
Look to see which module's memory the memory referenced identified above falls in.
That usually indicates the process that caused the crashed and will probably match the FAULTING_IP if listed.
Also informative: kd>.reload –v
No comments:
Post a Comment