Un archivo de registro de Dr. Watson anotados

IMPORTANTE: Este artículo ha sido traducido por un software de traducción automática de Microsoft (http://support.microsoft.com/gp/mtdetails) en lugar de un traductor humano. Microsoft le ofrece artículos traducidos por un traductor humano y artículos traducidos automáticamente para que tenga acceso en su propio idioma a todos los artículos de nuestra base de conocimientos (Knowledge Base). Sin embargo, los artículos traducidos automáticamente pueden contener errores en el vocabulario, la sintaxis o la gramática, como los que un extranjero podría cometer al hablar el idioma. Microsoft no se hace responsable de cualquier imprecisión, error o daño ocasionado por una mala traducción del contenido o como consecuencia de su utilización por nuestros clientes. Microsoft suele actualizar el software de traducción frecuentemente.

81142
Este artículo se ha archivado. Se ofrece "tal cual" y no se volverá a actualizar.
Resumen
Dr. Watson es una utilidad que registra información acerca de las aplicaciones que no. Este artículo presenta un archivo de registro de ejemplo y explica lo que indicar las diversas entradas. Comentarios en el archivo de registro se inicie con signo de libra (#).
Más información
En este artículo se anota un archivo de registro de la aplicación BICHO, que prueba Windows por errores de distintas maneras. Bicho es inofensiva Boliviano para "error" o "critter."
# Dr. Watson writes the following line each time it starts execution# unless the [dr. watson] section of the WIN.INI file contains the# line SkipInfo=time:Start Dr. Watson 0.80 - Thu Sep 26 10:51:28 1991# These lines mark the beginning of a Dr. Watson failure report# They report the version of Dr. Watson and the date and time of the# reported event.**********************************************************************Dr. Watson 0.80 Failure Report - Thu Sep 26 10:51:36 1991# The next line reports that an application named "BICHO" encountered# an "Exceed Segment Bounds" fault while reading memory. The precise# point of failure was also in BICHO, 0x6b bytes after the start of# the DoCommand function.BICHO had a 'Exceed Segment Bounds (Read)' fault at BICHO_DoCommand+006b# The following line repeats the previous information formatted for# automatic parsing code. It also includes the instruction that caused# the fault (a push instruction in this case).$tag$BICHO$Exceed Segment Bounds (Read)$BICHO _DoCommand+006b$pushword ptr [fffe]$Thu Sep 26 10:51:36 1991# The following lines report the contents of the CPU registers:CPU Registers (regs)# The 16-bit registers are listed first. This information can be# useful to determine what address an instruction modified when the# fault occurred.ax=1e54  bx=0014  cx=0d7f  dx=0111  si=1e54  di=0111# The next items are the instruction pointer (otherwise known as the# program counter), stack pointer, and base pointer. This line also# lists the state of the flag bits. In this example, the Overflow,# Direction, Sign, Zero, and Carry bits are Clear (0), while the# Interrupt, Auxcarry, and Parity bits are Set (1).ip=02fd  sp=230c  bp=237a  O- D- I+ S- Z- A+ P+ C-# The code segment selector is 0e57, linear address is 8059fbc0. The# code segment's limit is 83f. (Enhanced mode linear addresses often# start with 8xxx.) Accessing a code or data segment beyond its limit# is a common cause of GP faults.cs = 0e57  8059fbc0:083f Code Ex/R# The next line provides information about the stack segment selector.ss = 0d7f  8059d5e0:25df Data R/W# The following line provides information about the data segment# selector. Note that the limit is 25df, while the application# attempted to read the value at fffe, which is beyond the segment's# limit.ds = 0d7f  8059d5e0:25df Data R/W# The following line provides information about the extra segment# selector:es = 0d7f  8059d5e0:25df Data R/W# The next lines provide information about the 32-bit registers.# If a selector is 0, it corresponds to the null pointer. Attempting# to use a null pointer is another common cause of GP faults.CPU 32 bit Registers (32bit)eax = 00001e54  ebx = 00000014  ecx = ffff0d7f  edx = 00000111esi = 00001e54  edi = 00000111  ebp = 0000237a  esp = 800422fcfs = 0000         0:0000 Null Ptrgs = 0000         0:0000 Null Ptreflag = 00000002# The next lines provide information about the Windows installation.System Info (info)Windows version 3.10Debug build  # The debug version of windows (from the SDK) was runningWindows Build 3.1.048 # This is a prerelease build of Windows, #48Username Unknown User               # Your Name HereOrganization Unknown Organization   # Your Organization HereSystem Free Space 7131008# The following provides the stack size for the current task:Stack base 1122, top 9164, lowest 7504, size 8042# Dr. Watson records some statistics about the Windows environment:System resources:  USER: 87% free, seg 0777  GDI: 85% free, seg 05d7LargestFree 6594560, MaxPagesAvail 1610, MaxPagesLockable 267TotalLinear 1948, TotalUnlockedPages 274, FreePages 52TotalPages 614, FreeLinearSpace 1611, SwapFilePages 7158Page Size 40964 tasks executing.WinFlags -  Math coprocessor  80386 or 80386 SX  Enhanced mode  Protect mode# The following records the contents of the stack to determine what# code called the routine that failed:Stack Dump (stack)# Stack frame 0 indicates that the failure occurred in BICHO, 0x6b# bytes after the start of the DoCommand function, as reported# earlier.Stack Frame 0 is BICHO _DoCommand+006b        ss:bp 0d7f:237a# The offending instruction is disassembled in context, as follows:0e57:02f0  e9 02b9               jmp    near 05ac0e57:02f3  6a 00                 push   000e57:02f5  9a 8db0 0477          callf  0477:8db00e57:02fa  e9 02af               jmp    near 05ac(BICHO:_DoCommand+006b)0e57:02fd  ff 36 fffe            push   word ptr [fffe]0e57:0301  68 0110               push   01100e57:0304  e8 fe5d               call   near 01640e57:0307  83 c4 04              add    sp, 04# The application tried to read a value from memory at address DS:fffe# and to push that value on the stack. However, the limit of the DS# segment is 25df. The next stack frame documents that the BICHO# application MainWndProc called DoCommand:Stack Frame 1 is BICHO MAINWNDPROC+0027       ss:bp 0d7f:23880e57:0670  eb 16                 jmp    short 06880e57:0672  ff 76 0a              push   word ptr [bp+0a]0e57:0675  56                    push   si0e57:0676  e8 fc19               call   near 0292(BICHO:MAINWNDPROC+0027)0e57:0679  83 c4 04              add    sp, 040e57:067c  99                    cwd0e57:067d  eb 1f                 jmp    short 069e0e57:067f  6a 00                 push   00# "USER" in the next stack frame is the Windows module USER.EXE. It# calls application window and dialog procedures. In this case, USER# called the BICHO application's MainWndProc.Stack Frame 2 is USER IDISPATCHMESSAGE+007e   ss:bp 0d7f:239e# In the next stack frame, the BICHO application's WinMain function# called DispatchMessage, which called MainWndProc.Stack Frame 3 is BICHO WINMAIN+0050           ss:bp 0d7f:23bc# In the last stack frame, the Windows start-up code calls the# application's WinMain function.Stack Frame 4 is BICHO 1:00a3                 ss:bp 0d7f:23ca# The next lines list all the tasks running in the system when the# fault occurred. Dr. Watson itself, the shell application, and the# faulting application will always be included.System Tasks (tasks)Task  WINEXIT, Handle 0daf, Flags 0001, Info    9248 08-09-90 16:52  FileName C:\MS\WIN\DON\WINEXIT.EXETask DRWATSON, Handle 0ea7, Flags 0001, Info   26256 09-23-91 12:00  FileName C:\WIN31\DRWATSON.EXETask  PROGMAN, Handle 060f, Flags 0001, Info  110224 09-23-91 12:02  FileName C:\WIN31\PROGMAN.EXETask    BICHO, Handle 0da7, Flags 0001, Info   16537 09-11-91  8:45  FileName D:\BICHO.EXE# The last part of a failure report is any information typed in the# "Dr. Watson's Clues" dialog box.1> I ran a test app that accessed a value2> beyond the limits of the segment bounds.# Dr. Watson writes this line when it shuts down.Stop Dr. Watson 0.80 - Thu Sep 26 10:52:10 1991				
3.10

Advertencia: este artículo se ha traducido automáticamente

Propiedades

Id. de artículo: 81142 - Última revisión: 02/06/2014 21:51:12 - Revisión: 1.0

  • Microsoft Windows Software Development Kit 3.1
  • kbnosurvey kbarchive kbmt kb16bitonly KB81142 KbMtes
Comentarios