<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 159)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Wed, 06 May 2026 17:19:14 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-767708</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Fri, 04 Feb 2022 16:03:29 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-767708</guid>
		<description>There is also !findthreads command</description>
		<content:encoded><![CDATA[<p>There is also !findthreads command</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-741715</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Mon, 19 Sep 2016 11:21:46 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-741715</guid>
		<description>If we have an object address we can use !findhandle to find its process container:

&lt;p align="left"&gt;002c: Object: fffffa80a95cb610  GrantedAccess: 001fffff Entry: fffff8a0000030b0
Object: fffffa80a95cb610  Type: (fffffa80a943bf30) Thread
    ObjectHeader: fffffa80a95cb5e0 (new version)
        HandleCount: 1  PointerCount: 2&lt;/p&gt;

0: kd&gt; !findhandle fffffa80a95cb610
Now checking process fffffa80a943b6d0...                                                              
                   [fffffa80a943b6d0 System]
    2c: Entry fffff8a0000030b0 Granted Access 1fffff</description>
		<content:encoded><![CDATA[<p>If we have an object address we can use !findhandle to find its process container:</p>
<p align="left">002c: Object: fffffa80a95cb610  GrantedAccess: 001fffff Entry: fffff8a0000030b0<br />
Object: fffffa80a95cb610  Type: (fffffa80a943bf30) Thread<br />
    ObjectHeader: fffffa80a95cb5e0 (new version)<br />
        HandleCount: 1  PointerCount: 2</p>
<p>0: kd> !findhandle fffffa80a95cb610<br />
Now checking process fffffa80a943b6d0&#8230;<br />
                   [fffffa80a943b6d0 System]<br />
    2c: Entry fffff8a0000030b0 Granted Access 1fffff</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-741674</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Fri, 12 Jun 2015 17:44:40 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-741674</guid>
		<description>If we have an object with handle references to it we can search for its process handle container, for example, for zombie processes, we can dump all handle tables from all processes:

!handle 0 3 0 Process</description>
		<content:encoded><![CDATA[<p>If we have an object with handle references to it we can search for its process handle container, for example, for zombie processes, we can dump all handle tables from all processes:</p>
<p>!handle 0 3 0 Process</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-446944</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Fri, 23 Mar 2012 13:22:18 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/05/crash-dump-analysis-patterns-part-159/#comment-446944</guid>
		<description>Useful command to find a value pointers in the whole virtual address space:

!heap -x -v &lt;value&gt;</description>
		<content:encoded><![CDATA[<p>Useful command to find a value pointers in the whole virtual address space:</p>
<p>!heap -x -v <value></value></p>
]]></content:encoded>
	</item>
</channel>
</rss>
