soswindb

Information about object that thread is waiting for


If I have following stack trace where I see that a thread is waiting on certain lock. How can I get information about the object this thread is waiting for? I was thinking that I should be able to SyncBlk command but seem like it can only give information about the locks and its owner threads.

0:000> !CLRStack  
OS Thread Id: 0x25a8 (0)  
ESP       EIP       
001af038 77455e74 [GCFrame: 001af038]   
001af108 77455e74 [HelperMethodFrame_1OBJ: 001af108] System.Threading.Monitor.Enter(System.Object)  
001af160 00290192 ConsoleApplication1.MyClass.Main(System.String[])  
001af3c0 70fc1b4c [GCFrame: 001af3c0]   

Solution

  • To find out which object the thread is waiting for, you will have to do some debugging.

    First, start with the stack trace that you have:

    0:000> !CLRStack
    OS Thread Id: 0x25a8 (0)
    ESP EIP
    001af038 77455e74 [GCFrame: 001af038]
    001af108 77455e74 [HelperMethodFrame_1OBJ: 001af108] System.Threading.Monitor.Enter(System.Object)
    001af160 00290192 ConsoleApplication1.MyClass.Main(System.String[])
    001af3c0 70fc1b4c [GCFrame: 001af3c0]

    Find out the frame that is calling Monitor.Enter(). In this case it is MyClass::Main(string [] args)

    001af160 00290192 ConsoleApplication1.MyClass.Main(System.String[])

    Now you need to disassemble the caller. Use !sos.u [eip] to do that.

    
    0:000> !u 00d10177 
    Normal JIT generated code
    Program.Main(System.String[])
    Begin 00d100f8, size 9d
    00d100f8 55              push    ebp
    00d100f9 8bec            mov     ebp,esp
    00d100fb 83ec10          sub     esp,10h
    00d100fe 894dfc          mov     dword ptr [ebp-4],ecx
    00d10101 833de430970000  cmp     dword ptr ds:[9730E4h],0
    00d10108 7405            je      00d1010f
    00d1010a e802a63b79      call    mscorwks!JIT_DbgIsJustMyCode (7a0ca711)
    00d1010f 33d2            xor     edx,edx
    00d10111 8955f8          mov     dword ptr [ebp-8],edx
    00d10114 90              nop
    *** WARNING: Unable to verify checksum for C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\mscorlib\7bffd7ff2009f421fe5d229927588496\mscorlib.ni.dll
    00d10115 b9fc7e3179      mov     ecx,offset mscorlib_ni+0x257efc (79317efc) (MT: System.Threading.ThreadStart)
    00d1011a e8ad1fc5ff      call    009620cc (JitHelp: CORINFO_HELP_NEWSFAST_CHKRESTORE)
    00d1011f 8945f4          mov     dword ptr [ebp-0Ch],eax
    00d10122 b858c09700      mov     eax,97C058h
    00d10127 50              push    eax
    00d10128 6864203b00      push    3B2064h
    00d1012d 8b4df4          mov     ecx,dword ptr [ebp-0Ch]
    00d10130 33d2            xor     edx,edx
    00d10132 e8b9a45678      call    mscorlib_ni+0x1ba5f0 (7927a5f0) (System.MulticastDelegate.CtorOpened(System.Object, IntPtr, IntPtr), mdToken: 060003bf)
    00d10137 b9f8103379      mov     ecx,offset mscorlib_ni+0x2710f8 (793310f8) (MT: System.Threading.Thread)
    00d1013c e8c3c41679      call    mscorwks!JIT_NewFast (79e7c604)
    00d10141 8945f0          mov     dword ptr [ebp-10h],eax
    00d10144 8b55f4          mov     edx,dword ptr [ebp-0Ch]
    00d10147 8b4df0          mov     ecx,dword ptr [ebp-10h]
    00d1014a e8e1685c78      call    mscorlib_ni+0x216a30 (792d6a30) (System.Threading.Thread..ctor(System.Threading.ThreadStart), mdToken: 060012ab)
    00d1014f 8b45f0          mov     eax,dword ptr [ebp-10h]
    00d10152 8945f8          mov     dword ptr [ebp-8],eax
    00d10155 8b4df8          mov     ecx,dword ptr [ebp-8]
    00d10158 3909            cmp     dword ptr [ecx],ecx
    00d1015a e861695c78      call    mscorlib_ni+0x216ac0 (792d6ac0) (System.Threading.Thread.Start(), mdToken: 060012b1)
    00d1015f 90              nop
    00d10160 8b0d30202e02    mov     ecx,dword ptr ds:[22E2030h] ("Acquiring lock")
    00d10166 e89d38a878      call    mscorlib_ni+0x6d3a08 (79793a08) (System.Console.WriteLine(System.String), mdToken: 060007c8)
    00d1016b 90              nop
    00d1016c 8b0dfc1e2e02    mov     ecx,dword ptr ds:[22E1EFCh] (Object: SyncBlock)
    00d10172 e8ae281679      call    mscorwks!JIT_MonEnterWorker (79e72a25)
    >>> 00d10177 90              nop
    00d10178 8b0d34202e02    mov     ecx,dword ptr ds:[22E2034h] ("Releasing lock")
    00d1017e e88538a878      call    mscorlib_ni+0x6d3a08 (79793a08) (System.Console.WriteLine(System.String), mdToken: 060007c8)
    00d10183 90              nop
    00d10184 8b0dfc1e2e02    mov     ecx,dword ptr ds:[22E1EFCh] (Object: SyncBlock)
    00d1018a e8102b1679      call    mscorwks!JIT_MonExitWorker (79e72c9f)
    00d1018f 90              nop
    00d10190 90              nop
    00d10191 8be5            mov     esp,ebp
    00d10193 5d              pop     ebp
    00d10194 c3              ret
    
    

    Note the call site. At this point you have the following debug spew:

    00d1016c 8b0dfc1e2e02    mov     ecx,dword ptr ds:[22E1EFCh] (Object: SyncBlock)
    00d10172 e8ae281679      call    mscorwks!JIT_MonEnterWorker (79e72a25)
    >>> 00d10177 90              nop
    00d10178 8b0d34202e02    mov     ecx,dword ptr ds:[22E2034h] ("Releasing lock")
    00d1017e e88538a878      call    mscorlib_ni+0x6d3a08 (79793a08) (System.Console.WriteLine(System.String), mdToken: 060007c8)
    00d10183 90              nop
    

    Just before the call to JitMon::Enter() you see the address of the object being moved into the ECX register. This is the object your thread is waiting on.