<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 9c)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Sun, 17 May 2026 21:38:29 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Deadlock Patterns</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-197367</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Deadlock Patterns</dc:creator>
		<pubDate>Wed, 27 Oct 2010 16:03:10 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-197367</guid>
		<description>[...] Deadlock (mixed objects, user space) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Deadlock (mixed objects, user space) [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 15)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-139509</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 15)</dc:creator>
		<pubDate>Tue, 30 Mar 2010 13:57:34 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-139509</guid>
		<description>[...] we introduce an icon for Deadlock (mixed objects, user space) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] we introduce an icon for Deadlock (mixed objects, user space) [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: !analyze -v : Crash Dump Analysis Patterns (Part 9c)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-43191</link>
		<dc:creator>!analyze -v : Crash Dump Analysis Patterns (Part 9c)</dc:creator>
		<pubDate>Thu, 18 Sep 2008 07:53:32 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-43191</guid>
		<description>[...] Crash Dump Analysis Patterns (Part 9c) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Crash Dump Analysis Patterns (Part 9c) [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-30990</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Fri, 20 Jun 2008 16:34:06 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/07/28/crash-dump-analysis-patterns-part-9c/#comment-30990</guid>
		<description>Regarding thread#16 we can see the module it was trying to free if we dump parameters for FreeLibrary:

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;0581fe14 776b46fb kernel32!FreeLibrary+0x41&lt;/font&gt;&lt;/code&gt;

In another dump I had this:

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;  16  Id: 13d0.2780 Suspend: 1 Teb: 7ffa8000 Unfrozen
ChildEBP RetAddr  Args to Child              
0210fc98 7c942124 7c95970f 00000100 00000000 ntdll!KiFastSystemCallRet
0210fc9c 7c95970f 00000100 00000000 00000000 ntdll!NtWaitForSingleObject+0xc
0210fcd8 7c959620 00000000 00000004 00000000 ntdll!RtlpWaitOnCriticalSection+0x19c
0210fcf8 7c95a023 7c9a9d94 0210fe78 0210fea8 ntdll!RtlEnterCriticalSection+0xa8
0210fe00 7c827bcd 02a10000 0210fea8 0210fee4 ntdll!LdrUnloadDll+0x35 
0210fe14 775346eb &lt;font color="blue"&gt;&lt;strong&gt;02a10000&lt;/strong&gt;&lt;/font&gt; 0210ff0c 775346ff kernel32!FreeLibrary+0x41
[...]&lt;/font&gt;&lt;/code&gt;

&lt;p align="left"&gt;&lt;font size="1"&gt;&lt;code&gt;0:000&gt; lm 
start    end        module name
[...]
02a10000 02a19000   DLL_A   DLL_A.dll&lt;/font&gt;&lt;/code&gt;</description>
		<content:encoded><![CDATA[<p>Regarding thread#16 we can see the module it was trying to free if we dump parameters for FreeLibrary:</p>
<p align="left"><font size="1"><code>0581fe14 776b46fb kernel32!FreeLibrary+0x41</code></font></p>
<p>In another dump I had this:</p>
<p align="left"><font size="1"><code>  16  Id: 13d0.2780 Suspend: 1 Teb: 7ffa8000 Unfrozen<br />
ChildEBP RetAddr  Args to Child<br />
0210fc98 7c942124 7c95970f 00000100 00000000 ntdll!KiFastSystemCallRet<br />
0210fc9c 7c95970f 00000100 00000000 00000000 ntdll!NtWaitForSingleObject+0xc<br />
0210fcd8 7c959620 00000000 00000004 00000000 ntdll!RtlpWaitOnCriticalSection+0x19c<br />
0210fcf8 7c95a023 7c9a9d94 0210fe78 0210fea8 ntdll!RtlEnterCriticalSection+0xa8<br />
0210fe00 7c827bcd 02a10000 0210fea8 0210fee4 ntdll!LdrUnloadDll+0x35<br />
0210fe14 775346eb <font color="blue"><strong>02a10000</strong></font> 0210ff0c 775346ff kernel32!FreeLibrary+0&#215;41<br />
[&#8230;]</code></font></p>
<p align="left"><font size="1"><code>0:000> lm<br />
start    end        module name<br />
[...]<br />
02a10000 02a19000   DLL_A   DLL_A.dll</code></font></p>
]]></content:encoded>
	</item>
</channel>
</rss>
