O'Reilly logo

Memory Dump Analysis Anthology, Volume 7 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Screwbolt Wait Chain

Here we introduce another Wait Chain (Volume 1, page 482) pattern where a client thread makes a request and a created server thread servicing the request makes another request to the client which creates a new client thread to service the server request. The new client thread makes a request to the server again and a new server thread is created which makes a new client request, and so on. The additional signs here may be an abnormal number of threads and possibly Handle Leak (page 164) pattern although the latter may be present only in a client or server process only. Thread Age (Volume 6, page 111), Waiting Thread Time (Volume 1, page 343), and common Blocking Module (Volume 6, page 54) patterns may be used to unwind ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required