January 9, 2017 http://ch9northcentralus.blob.core.windows.net/mfupload/bb6d365ca9c146a2ac35a6f201342dc4/DefragTools172.mp4 In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about Application Hangs. We collect a dump of a process and debug it with the Debugging Tools for Windows.Resources:Defrag Tools: #24 – WinDbg – Critical SectionsDefrag Tools: #25 – WinDbg – EventsDefrag Tools: #26 – WinDbg – Semaphores, Mutexes and TimersTimeline:[00:00] Happy New Year![01:20] Tools for Application Hang analysis[02:36] Analyze Wait Chain in Task Manager[04:36] Sysinternals ProcDump[07:00] Thread List: ~[07:34] Call Stack of each thread: ~*k[08:28] Unique Call Stacks (filtering): !uniqstack[11:26] Call Stacks (with N+ frames): !pde.deep [N][12:40] Call Stacks (with N+ frames) not on a wait: !pde.busy [N][15:20] Demo Apps and PDE are on the Defrag Tools OneDrive[17:45] View Critical Section Locking: !locks[21:48] ConclusionEmail us your questions and comments to [email protected] Source link