<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      Getting the right Exception Context from a Memory dump Fixed

      吃飯回來,看到Share Source CLI團(tuán)隊(duì)的rss聚合上面Debug團(tuán)隊(duì)的juqiang發(fā)了一篇文章,說抓了一個(gè)minidump出現(xiàn)了:
      WARNING: Unable to verify timestamp for mscorwks.dll的錯(cuò)誤。上次我在查看一個(gè)mini Dump的時(shí)候,ntdll.dll好像也出現(xiàn)過這個(gè)問題,當(dāng)時(shí)把符號(hào)文件重新加載了一次就OK了。這次看到他出現(xiàn)了同樣的問題,忍不住要看看到底是什么原因?qū)е逻@個(gè)問題,很幸運(yùn)在Junfeng Zhang's Windows Programming Notes上面找到了一個(gè)完整的相同比較經(jīng)典的案例,才貼上去的就被我找到了,:),貼出來一看就知道了:

      When debug a memory dump, the dump may not in the right exception context when it is first loaded in the debugger. However, we can figure out the right context from the dump.

      Let's load the dump.

      c:\debuggers>cdb -z c:\temp\foo.dmp

      Symbol search path is: *** Invalid ***
      ****************************************************************************
      * Symbol loading may be unreliable without a symbol search path.           *
      * Use .symfix to have the debugger choose a symbol path.                   *
      * After setting your symbol path, use .reload to refresh symbol locations. *
      ****************************************************************************
      Executable search path is:
      Windows XP Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
      Product: WinNt, suite: SingleUserTS
      Debug session time: Tue Feb 26 07:14:42.000 2008 (GMT-8)
      System Uptime: not available
      Process Uptime: 0 days 2:07:05.000
      ......................................
      This dump file has an exception of interest stored in it.
      The stored exception information can be accessed via .ecxr.
      (8c4.3d8): Wake debugger - code 80000007 (first/second chance not available)
      eax=00000000 ebx=7c884700 ecx=0006ee6c edx=7c90eb94 esi=00000000 edi=0006f40c
      eip=7c90eb94 esp=0006ee78 ebp=0006f528 iopl=0         nv up ei pl zr na pe nc
      cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
      *** WARNING: Unable to verify timestamp for ntdll.dll
      *** ERROR: Module load completed but symbols could not be loaded for ntdll.dll
      ntdll+0xeb94:
      7c90eb94 c3              ret

      Let’s load symbols first.

      0:000> .sympath SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
      Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
      0:000> .reload

      ......................................

      Unfortunately .ecxr did not give us the right context.

      0:000> .ecxr
      eax=00000000 ebx=7c884700 ecx=0006ee6c edx=7c90eb94 esi=00000000 edi=0006f40c
      eip=7c90eb94 esp=0006ee78 ebp=0006f528 iopl=0         nv up ei pl zr na pe nc
      cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
      ntdll!KiFastSystemCallRet:
      7c90eb94 c3              ret
      0:000> kb
      ChildEBP RetAddr  Args to Child             
      0006ee74 7c90e273 7c863487 d0000144 00000004 ntdll!KiFastSystemCallRet
      0006ee78 7c863487 d0000144 00000004 00000000 ntdll!NtRaiseHardError+0xc
      //這個(gè)Filter是dbghelp.dll里面的MiniDumpWriteDump()方法來處理的。
      0006f528 77c32f0f 0006f578 00000000 00000000 kernel32!UnhandledExceptionFilter+0x653
      0006f544 01006484 80000003 0006f578 01009818 msvcrt!_XcptFilter+0x161
      WARNING: Stack unwind information not available. Following frames may be wrong.
      0006ffc0 7c816fd7 00000016 03d7f12c 7ffd6000 foo+0x6484
      0006fff0 00000000 0100660c 00000000 00000000 kernel32!BaseProcessStart+0x23

      However, Kernel32!UnhandledExceptionFilter is on the stack. UnhandledExceptionFilter takes an EXCEPTION_POINTERS structure as its parameter, which contains the exception context.

      0:000> dc 0006f578
      0006f578  0006f69c 0006f6bc 01013ea4 00000001  .........>......
      0006f588  fffffffe 0006f5b0 0006f5b0 01009c32  ............2...
      0006f598  01015100 010066ff 0006f69c 0006ffb0  .Q...f..........
      0006f5a8  0006f6bc 0006f670 0006f5d4 7c9037bf  ....p........7.|
      0006f5b8  0006f69c 0006ffb0 0006f6bc 0006f670  ............p...
      0006f5c8  0006fd4c 7c9037d8 0006ffb0 0006f684  L....7.|........
      0006f5d8  7c90378b 0006f69c 0006ffb0 0006f6bc  .7.|............
      0006f5e8  0006f670 01009c12 00000001 0006f69c  p...............

      We can change to the exception context.


      0:000> .cxr 0006f6bc
      eax=0006a1fa ebx=6a803bd8 ecx=00353ee8 edx=00080608 esi=6a8043d8 edi=6a8045c0
      eip=7c901230 esp=0006f988 ebp=0006fca4 iopl=0         nv up ei pl zr na pe nc
      cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
      ntdll!DbgBreakPoint:
      7c901230 cc              int     3

      Now we have the correct exception context.


      0:000> k
        *** Stack trace for last set context - .thread/.cxr resets it
      ChildEBP RetAddr 
      0006f984 6a870952 ntdll!DbgBreakPoint
      WARNING: Stack unwind information not available. Following frames may be wrong.
      0006fca4 6a8755f9 bar+0x70952
      0006fcd4 6a8757ae bar+0x755f9
      0006fcf0 6a86f49e bar+0x757ae
      0006fcfc 6a86fc06 bar+0x6f49e
      0006fd5c 7c9011a7 bar+0x6fc06
      0006fd7c 7c923f31 ntdll!LdrpCallInitRoutine+0x14
      0006fe00 7c81cd76 ntdll!LdrShutdownProcess+0x14f
      0006fef4 7c81cdee kernel32!_ExitProcess+0x42
      0006ff08 77c39d45 kernel32!ExitProcess+0x14
      0006ff14 77c39e78 msvcrt!__crtExitProcess+0x32
      0006ff24 77c39e90 msvcrt!_cinit+0xee
      0006ff38 0100645e msvcrt!exit+0x12
      0006ffc0 7c816fd7 foo+0x645e
      0006fff0 00000000 kernel32!BaseProcessStart+0x23

      posted on 2008-03-13 14:00  lbq1221119  閱讀(3254)  評(píng)論(1)    收藏  舉報(bào)

      導(dǎo)航

      主站蜘蛛池模板: 国产在线视频www色| 亚洲av乱码一区二区| 日本久久99成人网站| 吴川市| 国产精品日韩中文字幕熟女| 视频二区中文字幕在线| 舞阳县| 亚洲精品无码你懂的| 国产午夜亚洲精品国产成人| 弋阳县| 人人妻人人澡人人爽人人精品av| 久久精品国产久精国产69| 97成人碰碰久久人人超级碰oo| 国产精品进线69影院| 一卡2卡三卡4卡免费网站| 城市| 中文国产不卡一区二区| 国产一精品一av一免费| 亚洲aⅴ男人的天堂在线观看| 成熟熟女国产精品一区二区| 久章草这里只有精品| 亚洲中文无码手机永久| 风流老熟女一区二区三区 | 国产亚洲精品一区二区无| 99热精品毛片全部国产无缓冲| 亚洲熟妇精品一区二区| 狠狠色丁香婷婷综合尤物| 蜜桃久久精品成人无码av| 久久国产乱子精品免费女| 日韩av在线不卡一区二区| 久久这里都是精品二| 欧美级特黄aaaaaa片| 国产美女精品自在线拍免费| 亚洲欧美综合一区二区三区| 国产偷国产偷亚洲清高| 办公室强奷漂亮少妇视频| 国产成人无码精品亚洲| 激情综合网激情激情五月天| 亚洲精品宾馆在线精品酒店| 免费无码AV一区二区波多野结衣 | 国产美女午夜福利视频|