<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 53)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Sun, 17 May 2026 22:46:03 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-481065</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Mon, 28 May 2012 22:12:52 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-481065</guid>
		<description>Another example of the blocked thread on a uniprocessor VM:

kd&#62; !running
 
System Processors: (00000001)
   Idle Processors: (00000000)
 
       Prcbs     Current   Next   
   0    82944d20  85a575c0            ................
 
&lt;p align="left"&gt;kd&#62; !thread
 THREAD 85a575c0  Cid 0004.00e0  Teb: 00000000 Win32Thread: 00000000 RUNNING on processor 0
 Not impersonating
 DeviceMap                 8a209d68
 Owning Process            8523e660       Image:         System
 Attached Process          N/A            Image:         N/A
 Wait Start TickCount      4392621        Ticks: 0
 Context Switch Count      414195            
 UserTime                  00:00:00.000
 KernelTime                17:59:14.739
 Win32 Start Address DriverA (0x8900ab4e)
 Stack Init 8d1c0fd0 Current 8d1c0950 Base 8d1c1000 Limit 8d1be000 Call 0
 Priority 16 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
 ChildEBP RetAddr  Args to Child             
 8d1c0c48 82c34117 ffd090f0 85a32008 85a5a000 nt!READ_REGISTER_ULONG+0x6 (FPO: [1,0,0])
 8d1c0c68 82c347a1 8d1c0c84 82c38b53 8d1c0c7c hal!HalpHpetQueryCount+0x4b (FPO: [Non-Fpo])
 8d1c0c70 82c38b53 8d1c0c7c 00da7a64 00000000 hal!HalpHpetQueryPerformanceCounter+0x1d (FPO: [Non-Fpo])
 8d1c0c84 89007e52 8d1c0cbc 85a5a0d0 85a5a000 hal!KeQueryPerformanceCounter+0x3d (FPO: [Non-Fpo])
 WARNING: Stack unwind information not available. Following frames may be wrong.
 8d1c0ce4 89007938 85a5a000 00000000 85a5a000 DriverA+0x7e52
 8d1c0cf8 8900ae9a 85a5a000 00000000 00000000 DriverA+0x7938
 8d1c0d50 82a23056 85a32008 a9492f18 00000000 DriverA+0xae9a
 8d1c0d90 828cb1a9 8900ab4e 85a5a000 00000000 nt!PspSystemThreadStartup+0x9e
 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
 
&lt;p align="left"&gt;kd&#62; !ready
 Processor 0: Ready Threads at priority 15
     THREAD 861a2590  Cid 0460.0464  Teb: 7ffdf000 Win32Thread: fe9dbb18 ????
     THREAD 853cac98  Cid 0460.0670  Teb: 7ffd6000 Win32Thread: 00000000 ????
     THREAD 852fda88  Cid 0004.0084  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 8534ad48  Cid 0004.0090  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 852f1d48  Cid 0004.0080  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 852fd4f0  Cid 0004.0088  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 85340020  Cid 0004.008c  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 852e67c8  Cid 0004.0078  Teb: 00000000 Win32Thread: 00000000 ????
     THREAD 85de77a8  Cid 01e4.026c  Teb: 7ffda000 Win32Thread: ffb2c008 ????
     THREAD 85da7d48  Cid 01e4.0234  Teb: 7ffdf000 Win32Thread: ffad0d38 ????
     THREAD 85a7c678  Cid 0004.00f0  Teb: 00000000 Win32Thread: 00000000 ????
[...]</description>
		<content:encoded><![CDATA[<p>Another example of the blocked thread on a uniprocessor VM:</p>
<p>kd&gt; !running</p>
<p>System Processors: (00000001)<br />
   Idle Processors: (00000000)</p>
<p>       Prcbs     Current   Next<br />
   0    82944d20  85a575c0            &#8230;&#8230;&#8230;&#8230;&#8230;.</p>
<p align="left">kd&gt; !thread<br />
 THREAD 85a575c0  Cid 0004.00e0  Teb: 00000000 Win32Thread: 00000000 RUNNING on processor 0<br />
 Not impersonating<br />
 DeviceMap                 8a209d68<br />
 Owning Process            8523e660       Image:         System<br />
 Attached Process          N/A            Image:         N/A<br />
 Wait Start TickCount      4392621        Ticks: 0<br />
 Context Switch Count      414195<br />
 UserTime                  00:00:00.000<br />
 KernelTime                17:59:14.739<br />
 Win32 Start Address DriverA (0&#215;8900ab4e)<br />
 Stack Init 8d1c0fd0 Current 8d1c0950 Base 8d1c1000 Limit 8d1be000 Call 0<br />
 Priority 16 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5<br />
 ChildEBP RetAddr  Args to Child<br />
 8d1c0c48 82c34117 ffd090f0 85a32008 85a5a000 nt!READ_REGISTER_ULONG+0&#215;6 (FPO: [1,0,0])<br />
 8d1c0c68 82c347a1 8d1c0c84 82c38b53 8d1c0c7c hal!HalpHpetQueryCount+0&#215;4b (FPO: [Non-Fpo])<br />
 8d1c0c70 82c38b53 8d1c0c7c 00da7a64 00000000 hal!HalpHpetQueryPerformanceCounter+0&#215;1d (FPO: [Non-Fpo])<br />
 8d1c0c84 89007e52 8d1c0cbc 85a5a0d0 85a5a000 hal!KeQueryPerformanceCounter+0&#215;3d (FPO: [Non-Fpo])<br />
 WARNING: Stack unwind information not available. Following frames may be wrong.<br />
 8d1c0ce4 89007938 85a5a000 00000000 85a5a000 DriverA+0&#215;7e52<br />
 8d1c0cf8 8900ae9a 85a5a000 00000000 00000000 DriverA+0&#215;7938<br />
 8d1c0d50 82a23056 85a32008 a9492f18 00000000 DriverA+0xae9a<br />
 8d1c0d90 828cb1a9 8900ab4e 85a5a000 00000000 nt!PspSystemThreadStartup+0&#215;9e<br />
 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0&#215;19</p>
<p align="left">kd&gt; !ready<br />
 Processor 0: Ready Threads at priority 15<br />
     THREAD 861a2590  Cid 0460.0464  Teb: 7ffdf000 Win32Thread: fe9dbb18 ????<br />
     THREAD 853cac98  Cid 0460.0670  Teb: 7ffd6000 Win32Thread: 00000000 ????<br />
     THREAD 852fda88  Cid 0004.0084  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 8534ad48  Cid 0004.0090  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 852f1d48  Cid 0004.0080  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 852fd4f0  Cid 0004.0088  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 85340020  Cid 0004.008c  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 852e67c8  Cid 0004.0078  Teb: 00000000 Win32Thread: 00000000 ????<br />
     THREAD 85de77a8  Cid 01e4.026c  Teb: 7ffda000 Win32Thread: ffb2c008 ????<br />
     THREAD 85da7d48  Cid 01e4.0234  Teb: 7ffdf000 Win32Thread: ffad0d38 ????<br />
     THREAD 85a7c678  Cid 0004.00f0  Teb: 00000000 Win32Thread: 00000000 ????<br />
[&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 53b)</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-166757</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Crash Dump Analysis Patterns (Part 53b)</dc:creator>
		<pubDate>Wed, 14 Jul 2010 15:31:01 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-166757</guid>
		<description>[...] is a specialization of Blocked Thread pattern where a thread is waiting for a hardware I/O response. For example, a frozen system [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] is a specialization of Blocked Thread pattern where a thread is waiting for a hardware I/O response. For example, a frozen system [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; WOW64, blocked threads and coupled processes: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-99936</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; WOW64, blocked threads and coupled processes: pattern cooperation</dc:creator>
		<pubDate>Tue, 20 Oct 2009 20:13:03 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-99936</guid>
		<description>[...] see that the main threads is blocked by sending a synchronous message via SendMessage Win32 API function call. The first argument to it [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] see that the main threads is blocked by sending a synchronous message via SendMessage Win32 API function call. The first argument to it [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Critical section high contention and wait chains, blocked threads, and periodic error: memory dump and trace analysis pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-98234</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Critical section high contention and wait chains, blocked threads, and periodic error: memory dump and trace analysis pattern cooperation</dc:creator>
		<pubDate>Fri, 09 Oct 2009 14:32:24 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-98234</guid>
		<description>[...] thread 86396db0 (TID 1c64) that blocked more than 50 threads (0&#215;34) was blocked itself sleeping for more than 6 [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] thread 86396db0 (TID 1c64) that blocked more than 50 threads (0&#215;34) was blocked itself sleeping for more than 6 [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Stack trace collection, suspended threads, not my version, special process, main thread and blocked LPC chain threads: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-97393</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Stack trace collection, suspended threads, not my version, special process, main thread and blocked LPC chain threads: pattern cooperation</dc:creator>
		<pubDate>Sat, 03 Oct 2009 22:05:22 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-97393</guid>
		<description>[...] follow LPC chain to csrss.exe to find out another blocked thread [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] follow LPC chain to csrss.exe to find out another blocked thread [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Inconsistent dump, blocked threads, wait chains, incorrect stack trace and process factory: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-78525</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Inconsistent dump, blocked threads, wait chains, incorrect stack trace and process factory: pattern cooperation</dc:creator>
		<pubDate>Tue, 09 Jun 2009 22:11:38 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-78525</guid>
		<description>[...] cases I often dump all processes and threads to look for anomalies and indeed we find plenty of blocked threads in several services. For example, ServiceA.exe has blocked threads waiting for critical sections [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] cases I often dump all processes and threads to look for anomalies and indeed we find plenty of blocked threads in several services. For example, ServiceA.exe has blocked threads waiting for critical sections [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Main blocked thread, missing component, execution residue and data contents locality: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-78298</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Main blocked thread, missing component, execution residue and data contents locality: pattern cooperation</dc:creator>
		<pubDate>Mon, 08 Jun 2009 16:35:34 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-78298</guid>
		<description>[...] monitor saved the process memory dump with the following stack trace of the main thread that was blocked by raising a [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] monitor saved the process memory dump with the following stack trace of the main thread that was blocked by raising a [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Stack trace collection, blocked threads, pass through functions and main thread: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-73784</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Stack trace collection, blocked threads, pass through functions and main thread: pattern cooperation</dc:creator>
		<pubDate>Fri, 08 May 2009 14:07:20 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-73784</guid>
		<description>[...] command detailed output of thread stacks showed that all these suspicious threads were in fact blocked when loading a [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] command detailed output of thread stacks showed that all these suspicious threads were in fact blocked when loading a [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Blocked thread, historical information, execution residue, hidden exception, dynamic memory corruption, incorrect stack trace and not my version: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-71973</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Blocked thread, historical information, execution residue, hidden exception, dynamic memory corruption, incorrect stack trace and not my version: pattern cooperation</dc:creator>
		<pubDate>Thu, 23 Apr 2009 20:59:53 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-71973</guid>
		<description>[...] One application was hanging after printing and its user dump was taken. Inspection of threads reveals only one blocked thread: [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] One application was hanging after printing and its user dump was taken. Inspection of threads reveals only one blocked thread: [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crash Dump Analysis &#187; Blog Archive &#187; Manual dump, wait chain, blocked thread, dynamic memory corruption and historical information: pattern cooperation</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-68190</link>
		<dc:creator>Crash Dump Analysis &#187; Blog Archive &#187; Manual dump, wait chain, blocked thread, dynamic memory corruption and historical information: pattern cooperation</dc:creator>
		<pubDate>Sat, 14 Mar 2009 07:37:58 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2008/02/27/crash-dump-analysis-patterns-part-53/#comment-68190</guid>
		<description>[...] #20 is waiting for the critical section 00370608 owned by the thread #17. The latter thread is blockedin an unhandled exception filter raising a hard error message box. Applying the new exception [...]</description>
		<content:encoded><![CDATA[<p>[&#8230;] #20 is waiting for the critical section 00370608 owned by the thread #17. The latter thread is blockedin an unhandled exception filter raising a hard error message box. Applying the new exception [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
