<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/2.3.3" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	>
<channel>
	<title>Comments on: Crash Dump Analysis Patterns (Part 160)</title>
	<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/</link>
	<description>Structural and Behavioral Patterns for Software Diagnostics, Forensics and Prognostics</description>
	<pubDate>Tue, 19 May 2026 00:14:15 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.3.3</generator>
		<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767744</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 15 Nov 2025 19:23:51 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767744</guid>
		<description>Another example from Windows ARM64: aligned local variable:

_Alignas(4096) long long ll = 1;

0:000&gt; dv /V
00000037`30b8e690 @x27+0x1000                    ll = 0n-3689348814741910324
00000037`30b8d8c0 @x27+0x0230                 align = 8

They are stored indirectly instead:

00007ff6`e7afafdc f9533f69 ldr         x9,[x27,#0x2678]
00007ff6`e7afafe0 d2800028 mov         x8,#1
00007ff6`e7afafe4 f9000128 str         x8,[x9]

0:000&gt; ? @x27+0x2678
Evaluate expression: 237040631048 = 00000037`30b8fd08
0:000&gt; dp 00000037`30b8fd08 L1
00000037`30b8fd08  00000037`30b8d000
0:000&gt; dpp 00000037`30b8fd08 L1
00000037`30b8fd08  00000037`30b8d000 00000000`00000001</description>
		<content:encoded><![CDATA[<p>Another example from Windows ARM64: aligned local variable:</p>
<p>_Alignas(4096) long long ll = 1;</p>
<p>0:000> dv /V<br />
00000037`30b8e690 @x27+0&#215;1000                    ll = 0n-3689348814741910324<br />
00000037`30b8d8c0 @x27+0&#215;0230                 align = 8</p>
<p>They are stored indirectly instead:</p>
<p>00007ff6`e7afafdc f9533f69 ldr         x9,[x27,#0&#215;2678]<br />
00007ff6`e7afafe0 d2800028 mov         x8,#1<br />
00007ff6`e7afafe4 f9000128 str         x8,[x9]</p>
<p>0:000> ? @x27+0&#215;2678<br />
Evaluate expression: 237040631048 = 00000037`30b8fd08<br />
0:000> dp 00000037`30b8fd08 L1<br />
00000037`30b8fd08  00000037`30b8d000<br />
0:000> dpp 00000037`30b8fd08 L1<br />
00000037`30b8fd08  00000037`30b8d000 00000000`00000001</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767735</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Tue, 07 Jan 2025 19:36:32 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767735</guid>
		<description>When the Linux crash tool crashes when asked to reconstruct the stack trace from the given RSP, we can dump raw stack data instead and reconstruct the stack trace ourselves.</description>
		<content:encoded><![CDATA[<p>When the Linux crash tool crashes when asked to reconstruct the stack trace from the given RSP, we can dump raw stack data instead and reconstruct the stack trace ourselves.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767712</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Sat, 28 May 2022 21:03:35 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767712</guid>
		<description>The recent bug is an inability to reconstruct 32-bit stack traces from the WOW64 process in both process and complete memory dumps.</description>
		<content:encoded><![CDATA[<p>The recent bug is an inability to reconstruct 32-bit stack traces from the WOW64 process in both process and complete memory dumps.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767704</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Wed, 24 Nov 2021 09:48:38 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767704</guid>
		<description>Another command !running is broken in WinDbg 10.0.22000.194 from SDK (but works in 10.0.22473.1005 version from WinDbg Preview):
0: kd&gt; !running
GetGlobalValue: unable to get nt!KiSubNodes type size
Could not get address of nt!KiSubNodes
Could not get idle processor summary.</description>
		<content:encoded><![CDATA[<p>Another command !running is broken in WinDbg 10.0.22000.194 from SDK (but works in 10.0.22473.1005 version from WinDbg Preview):<br />
0: kd> !running<br />
GetGlobalValue: unable to get nt!KiSubNodes type size<br />
Could not get address of nt!KiSubNodes<br />
Could not get idle processor summary.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767703</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Wed, 24 Nov 2021 09:48:19 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767703</guid>
		<description>WinDbg 10.0.22000.194 (and 10.0.22473.1005) cannot do ".thread /w" command correctly for complete dumps even from Windows 11, I have to revert back to 10.0.20348.1 for my forthcoming training...
; 10.0.22000.194
0: kd&gt; .thread /w ffffc38c2ecd4080 
0: kd:x86&gt; k
00 95d80609 00000000     0x6221d056
0: kd:x86&gt; .reload
0: kd:x86&gt; k
00 95d80609 00000000     0x6221d056
; 10.0.20348.1
0: kd&gt; .thread /w ffffc38c2ecd4080
0: kd:x86&gt; k
00 032bfaa0 74e7e768     0x7657112c
01 032bfad0 74ecb218     0x74e7e768
02 032bfb9c 74ec9f80     0x74ecb218
03 032bfcf8 74ecaa87     0x74ec9f80
04 032bfd80 74ecaaf5     0x74ecaa87
05 032bfda0 000211e4     0x74ecaaf5
06 032bfdd8 0002181a     0x211e4
07 032bfdf4 75bb6823     0x2181a
08 032bfe2c 75ca6739     0x75bb6823
09 032bfe3c 77058aff     0x75ca6739
0a 032bfe94 77058acd     0x77058aff
0b 032bfea4 00000000     0x77058acd
0: kd:x86&gt; .reload
0: kd:x86&gt; k
00 032bfa58 74e7e889     win32u!NtUserWaitMessage+0xc
01 032bfaa0 74e7e768     USER32!DialogBox2+0x10a
02 032bfad0 74ecb218     USER32!InternalDialogBox+0xd7
03 032bfb9c 74ec9f80     USER32!SoftModalMessageBox+0x718
04 032bfcf8 74ecaa87     USER32!MessageBoxWorker+0x314
05 032bfd80 74ecaaf5     USER32!MessageBoxTimeoutW+0x187
06 032bfda0 000211e4     USER32!MessageBoxW+0x45
07 032bfdd8 0002181a     AppA+0x11e4
08 032bfdf4 75bb6823     AppA+0x181a
09 032bfe2c 75ca6739     ucrtbase!thread_start&lt;unsigned int (__stdcall*)(void *),1&gt;+0x43
0a 032bfe3c 77058aff     KERNEL32!BaseThreadInitThunk+0x19
0b 032bfe94 77058acd     ntdll_76ff0000!__RtlUserThreadStart+0x2b
0c 032bfea4 00000000     ntdll_76ff0000!_RtlUserThreadStart+0x1b</description>
		<content:encoded><![CDATA[<p>WinDbg 10.0.22000.194 (and 10.0.22473.1005) cannot do &#8220;.thread /w&#8221; command correctly for complete dumps even from Windows 11, I have to revert back to 10.0.20348.1 for my forthcoming training&#8230;<br />
; 10.0.22000.194<br />
0: kd> .thread /w ffffc38c2ecd4080<br />
0: kd:x86> k<br />
00 95d80609 00000000     0&#215;6221d056<br />
0: kd:x86> .reload<br />
0: kd:x86> k<br />
00 95d80609 00000000     0&#215;6221d056<br />
; 10.0.20348.1<br />
0: kd> .thread /w ffffc38c2ecd4080<br />
0: kd:x86> k<br />
00 032bfaa0 74e7e768     0&#215;7657112c<br />
01 032bfad0 74ecb218     0&#215;74e7e768<br />
02 032bfb9c 74ec9f80     0&#215;74ecb218<br />
03 032bfcf8 74ecaa87     0&#215;74ec9f80<br />
04 032bfd80 74ecaaf5     0&#215;74ecaa87<br />
05 032bfda0 000211e4     0&#215;74ecaaf5<br />
06 032bfdd8 0002181a     0&#215;211e4<br />
07 032bfdf4 75bb6823     0&#215;2181a<br />
08 032bfe2c 75ca6739     0&#215;75bb6823<br />
09 032bfe3c 77058aff     0&#215;75ca6739<br />
0a 032bfe94 77058acd     0&#215;77058aff<br />
0b 032bfea4 00000000     0&#215;77058acd<br />
0: kd:x86> .reload<br />
0: kd:x86> k<br />
00 032bfa58 74e7e889     win32u!NtUserWaitMessage+0xc<br />
01 032bfaa0 74e7e768     USER32!DialogBox2+0&#215;10a<br />
02 032bfad0 74ecb218     USER32!InternalDialogBox+0xd7<br />
03 032bfb9c 74ec9f80     USER32!SoftModalMessageBox+0&#215;718<br />
04 032bfcf8 74ecaa87     USER32!MessageBoxWorker+0&#215;314<br />
05 032bfd80 74ecaaf5     USER32!MessageBoxTimeoutW+0&#215;187<br />
06 032bfda0 000211e4     USER32!MessageBoxW+0&#215;45<br />
07 032bfdd8 0002181a     AppA+0&#215;11e4<br />
08 032bfdf4 75bb6823     AppA+0&#215;181a<br />
09 032bfe2c 75ca6739     ucrtbase!thread_start<unsigned int (__stdcall*)(void *),1>+0&#215;43<br />
0a 032bfe3c 77058aff     KERNEL32!BaseThreadInitThunk+0&#215;19<br />
0b 032bfe94 77058acd     ntdll_76ff0000!__RtlUserThreadStart+0&#215;2b<br />
0c 032bfea4 00000000     ntdll_76ff0000!_RtlUserThreadStart+0&#215;1b</unsigned></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767702</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Wed, 24 Nov 2021 09:47:55 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-767702</guid>
		<description>A perennial WinDbg feature: to double each line of output after closing the debugging session (q command) and opening a new dump file.</description>
		<content:encoded><![CDATA[<p>A perennial WinDbg feature: to double each line of output after closing the debugging session (q command) and opening a new dump file.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dmitry Vostokov</title>
		<link>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-754258</link>
		<dc:creator>Dmitry Vostokov</dc:creator>
		<pubDate>Thu, 03 Dec 2020 11:30:35 +0000</pubDate>
		<guid>https://www.dumpanalysis.org/blog/index.php/2011/12/11/crash-dump-analysis-patterns-part-160/#comment-754258</guid>
		<description>&lt;p align="left"&gt;This is the example of a soft variant of Debugger Bug crash dump analysis pattern () but in a different binary media and OS https://arxiv.org/abs/2011.13994&lt;/p&gt;</description>
		<content:encoded><![CDATA[<p align="left">This is the example of a soft variant of Debugger Bug crash dump analysis pattern () but in a different binary media and OS <a href="https://arxiv.org/abs/2011.13994" rel="nofollow">https://arxiv.org/abs/2011.13994</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
