<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 20b)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Mon, 18 May 2026 00:43:36 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-741682</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 12 Sep 2015 12:52:09 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-741682</guid>
		<description>Sometimes, there is not a leak but just some distribution anomaly: 
http://www.dumpanalysis.org/blog/index.php/2015/09/12/crash-dump-analysis-patterns-part-35b/</description>
		<content:encoded><![CDATA[<p>Sometimes, there is not a leak but just some distribution anomaly:<br />
<a href="http://www.dumpanalysis.org/blog/index.php/2015/09/12/crash-dump-analysis-patterns-part-35b/" rel="nofollow">http://www.dumpanalysis.org/blog/index.php/2015/09/12/crash-dump-analysis-patterns-part-35b/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-741660</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Mon, 15 Dec 2014 15:39:22 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-741660</guid>
		<description>We may also get specific objects by !DumpHeap -mt &lt;MT address&gt; and then their possible roots on specific stacks via !gcroot &lt;object address&gt;.</description>
		<content:encoded><![CDATA[<p>We may also get specific objects by !DumpHeap -mt <mt address> and then their possible roots on specific stacks via !gcroot <object address>.</object></mt></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 38)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-151912</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Icons for Memory Dump Analysis Patterns (Part 38)</dc:creator>
		<pubDate>Thu, 13 May 2010 16:02:31 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-151912</guid>
		<description>[...] we introduce an icon for Memory Leak (.NET heap) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] we introduce an icon for Memory Leak (.NET heap) [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Looking for abnormal: case study</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-72312</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Looking for abnormal: case study</dc:creator>
		<pubDate>Mon, 27 Apr 2009 11:39:34 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-72312</guid>
		<description>[...] of the growing memory and analyze it later as described in a heap leak pattern. This can also be a .NET leak too if unmanaged AppA.exe happened to load any managed components through 3rd-party DLLs. It could [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] of the growing memory and analyze it later as described in a heap leak pattern. This can also be a .NET leak too if unmanaged AppA.exe happened to load any managed components through 3rd-party DLLs. It could [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; First-order and second-order memory leaks</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-42361</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; First-order and second-order memory leaks</dc:creator>
		<pubDate>Thu, 11 Sep 2008 15:12:57 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2007/08/19/crash-dump-analysis-patterns-part-20b/#comment-42361</guid>
		<description>[...] Memory Leak (.NET heap) [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] Memory Leak (.NET heap) [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
