O'Reilly logo

Memory Dump Analysis Anthology, Volume 5 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Crash Dump Analysis Patterns

Succession of Patterns

Here we resume previously introduced memory analysis succession patterns series (Volume 4, page 93). We introduce a case study where Wait Chains (executive resources, Volume 2, page 147) and Swarm of Shared Locks (Volume 3, page 107) were probably resulted from Spiking Thread (Volume 1, page 305). We have these resource locks:

 0: kd> !locks **** DUMP OF ALL RESOURCE OBJECTS **** Resource @ 0x808a6860 Shared 9 owning threads Threads: 8e739b40-01<*> 8e07db58-01<*> 8e455d18-01<*> 8df72958-01<*> 8e356620-01<*> 8d7e9700-01<*> 8e73a660-01<*> 8dbb0af0-01<*> 8e01c9b8-01<*> Resource @ 0xf7b6d5b0 Shared 2 owning threads Contention Count = 1 Threads: 8e741898-01<*> 8e73fb40-01<*> Resource @ 0x8e5a1534 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required