****************************************************************
**
** Windows 2000 Crash Dump Analysis
**
****************************************************************
*
Filename . . . . . . .Mini082901-01.dmp
Signature. . . . . . .PAGE
ValidDump. . . . . . .DUMP
MajorVersion . . . . .free system
MinorVersion . . . . .2195
DirectoryTableBase . .0x00030000
PfnDataBase. . . . . .0x820bf000
PsLoadedModuleList . .0x8046ccf0
PsActiveProcessHead. .0x8046dbe0
MachineImageType . . .i386
NumberProcessors . . .1
BugCheckCode . . . . .0x00000000
BugCheckParameter1 . .0x0000000d
BugCheckParameter2 . .0x00000000
BugCheckParameter3 . .0xbe8d6ed4
BugCheckParameter4 . .0xbe8d6e6c
ExceptionCode. . . . .0x80000003
ExceptionFlags . . . .0x00000001
ExceptionAddress . . .0xf20f98c8
-------------------------------------------------------------------------
Mike Bates FlightSafety Simulation
Staff Engineer 2700 North Hemlock Circle
Computer Systems Group Broken Arrow, Oklahoma 74012
-------------------------------------------------------------------------
Use the debugging tools at http://www.microsoft.com/ddk/debugging.
Load te dump file in the debugger and that should give you a better idea as
to what is causing the crash.
The docs will give you details on how to do this.
-Andre
"Mike Bates" <mike...@ssdZZZ.fsiZZZ.comZZZ> wrote in message
news:3B9FCB96...@ssdZZZ.fsiZZZ.comZZZ...
Andre Vachon wrote:
>
> Yes, bugcheck code of 0 is unusual.
I understand that it's unusual, since I was unable to find it in
any of the lists of "common bugcheck codes". Is this bugcheck
code documented anywhere?
So what does bugcheck code == 0 mean? And what do the parameters
mean?
Thanks for the pointer to the debugging tools.
I missed the original post, but anyway. I think [sic!] I've seen a couple of
times when bugcodes stored in the dump were completely bogus, while those
recorded in the system log were correct.
Slava
In this case, the bugcodes in the dump and those in the system log are
identical.
Investigate these.
Best regards Leo Havmøller.
There are some general debugging articles once you get a look
at the actual stack that will tell you how to get the actual stack
and what was running if it's possible.
I think you need to go into the dump with windbg and get the
stack and either post it or search microsoft to see what articles
come up based on what function is at the top!
And don't forget kdex2x86.dll.
DMU
"Mike Bates" <mi...@ssd.fsi.com> wrote in message
news:3BA7C85E...@ssd.fsi.com...