O'Reilly logo

Memory Dump Analysis Anthology, Volume 7 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Memory Dump Analysis Best Practices

We continue with best practices, the previous was SCP (Volume 6, page 19). The second best practice is to check the system for additional patterns after the main pattern was found (similar to avoiding common mistake #8, Volume 5, page 24). For example, in the case of a bug check resulted from NULL pointer dereference or any other exception in some 3rd-party driver code don't stop but look at all CPUs, processes and threads to find any other patterns such as Spiking Threads (Volume 1, page 305), Busy System (Volume 1, page 449), and Contention (Volume 5, page 423). Inspection of associated thread stack traces might reveal the same module and/or give additional clues to system behavior prior to the fault. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required