windows – 解决托管和本机堆栈跟踪 – 要使用哪个API?

前端之家收集整理的这篇文章主要介绍了windows – 解决托管和本机堆栈跟踪 – 要使用哪个API?前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
这是对我之前的问题的继续 – 第2阶段即可.

第一个问题在这里:Fast capture stack trace on windows / 64-bit / mixed mode

现在我已经解决了大量的堆栈跟踪,现在想知道如何解析托管堆栈帧的符号信息.

对于原生C方面,它相对简单 –

首先,您指定从哪里获取符号的过程:

  1. HANDLE g_hProcess = GetCurrentProcess();

您可以使用代码snipet在运行时替换进程,如下所示:

  1. g_hProcess = OpenProcess(PROCESS_ALL_ACCESS,FALSE,g_processId);
  2.  
  3. b = (g_hProcess != NULL );
  4.  
  5. if( !b )
  6. errInfo.AppendFormat(_T("Process id '%08X' is not running anymore."),g_processId );
  7. else
  8. InitSymbolLoad();

并初始化符号加载:

  1. void InitSymbolLoad()
  2. {
  3. SymInitialize(g_hProcess,NULL,TRUE);
  4. DWORD dwFlags = SymGetOptions();
  5. SymSetOptions(SymGetOptions() | SYMOPT_DEFERRED_LOADS | SYMOPT_NO_IMAGE_SEARCH);
  6. }

然后解决原生符号,不知何故这样:

  1. extern HANDLE g_hProcess;
  2.  
  3. void StackFrame::Resolve()
  4. {
  5. struct {
  6. union
  7. {
  8. SYMBOL_INFO symbol;
  9. char buf[sizeof(SYMBOL_INFO) + 1024];
  10. }u;
  11. }ImageSymbol = { 0 };
  12.  
  13. HANDLE hProcess = g_hProcess;
  14. DWORD64 offsetFromSymbol = 0;
  15.  
  16. ImageSymbol.u.symbol.SizeOfStruct = sizeof(SYMBOL_INFO);
  17. ImageSymbol.u.symbol.Name[0] = 0;
  18. ImageSymbol.u.symbol.MaxNameLen = sizeof(ImageSymbol) - sizeof(SYMBOL_INFO);
  19. SYMBOL_INFO* pSymInfo = &ImageSymbol.u.symbol;
  20.  
  21. // Get file / line of source code.
  22. IMAGEHLP_LINE64 lineStr = { 0 };
  23. lineStr.SizeOfStruct = sizeof(IMAGEHLP_LINE64);
  24.  
  25. function.clear();
  26.  
  27.  
  28. if( SymGetLineFromAddr64(hProcess,(DWORD64)ip,(DWORD*)&offsetFromSymbol,&lineStr) )
  29. {
  30. function = lineStr.FileName;
  31. function += "(";
  32. function += std::to_string((_ULonglong) lineStr.LineNumber).c_str();
  33. function += "): ";
  34. }
  35.  
  36. // Successor of SymGetSymFromAddr64.
  37. if( SymFromAddr(hProcess,&offsetFromSymbol,pSymInfo) )
  38. function += ImageSymbol.u.symbol.Name;
  39.  
  40. }

这看起来像工作.

但现在也管理堆栈帧.

我找到了两个接口:

> IDebugClient / GetNameByOffset

提到:

> http://www.codeproject.com/Articles/371137/A-Mixed-Mode-Stackwalk-with-the-IDebugClient-Inter
(*)(包括示例代码)
> http://blog.steveniemitz.com/building-a-mixed-mode-stack-walker-part-1/

使用者:

> https://github.com/okigan/CrashInsight(代码未触及4年)
>混合模式stackwalk文章提供了很好的例子.

> IXCLRDATAProcess / GetRuntimeNameByAddress

>上面提到的两个链接也提到了.
>由进程黑客使用(GPL许可证,C风格)

实现似乎存在于此:

> https://github.com/dotnet/coreclr/blob/master/src/debug/daccess/daccess.cpp
(根据提交,此代码非常活跃)

> ICorProfiler / ???

(*)文章末尾提到.

方法1似乎很老式,文章(*)也提到了一些问题.

方法3可能需要对分析API进行深入分析.
我还发现了一些关于这些API的内容 – 在这里:

https://naughter.wordpress.com/2015/05/24/changes-in-the-windows-10-sdk-compared-to-windows-8-1-part-two/

· cor.h,cordebug.h/idl,CorError.h,CorHdr.h,corhlpr.h,
corprof.h/idl,corpub.h/idl & corsym.h/idl: All of these header files
have been removed. They are all the native mode COM interface to .NET.

这句话我不太明白.这些接口是否已经死亡或被替换或者发生了什么?

所以我想基于我的简要分析方法2只是好/活的API接口值得使用?您是否遇到过与这些api相关的任何问题.

在浏览了大量代码示例和接口之后,我了解到没有任何简单易用的API接口.为本机C开发的代码和API仅适用于本机C,而为托管代码开发的代码和API仅适用于托管代码.

此外还有解决堆栈跟踪的问题可能无法解决.你看 – 开发人员可以使用Jit引擎/ IL生成器动态生成代码,并将其配置 – 所以在你有“void *”/指令地址后 – 你应该立即解决符号信息,而不是之后.但是我暂时不会这样做,会认为开发人员不是太花哨的编码器而且不会一直生成和处理新的代码,FreeLibrary也不会在没有需要的情况下被调用. (如果我挂钩FreeLibrary / Jit组件,我可以稍后解决这个问题.)

解析函数名称非常简单,通过IXCLRDataProcess带来一点魔力和运气 – 我能够获得函数名称,但是 – 我想将它更深入地扩展到确切的源代码路径和代码执行的源代码行,这个变成了相当复杂的功能.

最后,我找到了执行此类操作的源代码 – 这是在这里完成的:

https://github.com/dotnet/coreclr/blob/master/src/ToolBox/SOS/Strike/util.cpp

GetLineByOffset是该文件中的函数名称.

我已经分析,重新调整并从源代码中创建了我自己的解决方案,我现在正在这里附加:

可在此处找到更新的代码
https://sourceforge.net/projects/diagnostic/

但这里只是在某个时间点采用的相同代码的快照:

ResolveStackM.h:

  1. #pragma once
  2. #include <afx.h>
  3. #pragma warning (disable: 4091) //dbghelp.h(1544): warning C4091: 'typedef ': ignored on left of '' when no variable is declared
  4. #include <cor.h> //xclrdata.h requires this
  5. #include "xclrdata.h" //IXCLRDataProcess
  6. #include <atlbase.h> //CComPtr
  7. #include <afxstr.h> //CString
  8. #include <crosscomp.h> //TCONTEXT
  9. #include <Dbgeng.h> //IDebugClient
  10. #pragma warning (default: 4091)
  11.  
  12. class ResoveStackM
  13. {
  14. public:
  15. ResoveStackM();
  16. ~ResoveStackM();
  17. void Close(void);
  18.  
  19. bool InitSymbolResolver(HANDLE hProcess,CString& lastError);
  20. bool GetMethodName(void* ip,CStringA& methodName);
  21. bool GetManagedFileLineInfo(void* ip,CStringA& lineInfo);
  22.  
  23. HMODULE mscordacwks_dll;
  24. CComPtr<IXCLRDataProcess> clrDataProcess;
  25. CComPtr<ICLRDataTarget> target;
  26.  
  27. CComPtr<IDebugClient> debugClient;
  28. CComQIPtr<IDebugControl> debugControl;
  29. CComQIPtr<IDebugSymbols> debugSymbols;
  30. CComQIPtr<IDebugSymbols3> debugSymbols3;
  31. };
  32.  
  33. //
  34. // Typically applications don't need more than one instance of this. If you do,use your own copies.
  35. //
  36. extern ResoveStackM g_managedStackResolver;

ResolveStackM.cpp:

  1. #include "ResolveStackM.h"
  2. #include <Psapi.h> //EnumProcessModules
  3. #include <string> //to_string
  4. #pragma comment( lib,"dbgeng.lib" )
  5.  
  6.  
  7. class CLRDataTarget : public ICLRDataTarget
  8. {
  9. public:
  10. ULONG refCount;
  11. bool bIsWow64;
  12. HANDLE hProcess;
  13.  
  14. CLRDataTarget( HANDLE _hProcess,bool _bIsWow64 ) :
  15. refCount(1),bIsWow64(_bIsWow64),hProcess(_hProcess)
  16. {
  17. }
  18.  
  19. HRESULT STDMETHODCALLTYPE QueryInterface( REFIID riid,PVOID* ppvObject)
  20. {
  21. if ( IsEqualIID(riid,IID_IUnknown) || IsEqualIID(riid,__uuidof(ICLRDataTarget)) )
  22. {
  23. AddRef();
  24. *ppvObject = this;
  25. return S_OK;
  26. }
  27.  
  28. *ppvObject = NULL;
  29. return E_NOINTERFACE;
  30. }
  31.  
  32. ULONG STDMETHODCALLTYPE AddRef( void)
  33. {
  34. return ++refCount;
  35. }
  36.  
  37. ULONG STDMETHODCALLTYPE Release( void)
  38. {
  39. refCount--;
  40.  
  41. if( refCount == 0 )
  42. delete this;
  43.  
  44. return refCount;
  45. }
  46.  
  47. virtual HRESULT STDMETHODCALLTYPE GetMachineType( ULONG32 *machineType )
  48. {
  49. #ifdef _WIN64
  50. if (!bIsWow64)
  51. *machineType = IMAGE_FILE_MACHINE_AMD64;
  52. else
  53. *machineType = IMAGE_FILE_MACHINE_I386;
  54. #else
  55. *machineType = IMAGE_FILE_MACHINE_I386;
  56. #endif
  57.  
  58. return S_OK;
  59. }
  60.  
  61. virtual HRESULT STDMETHODCALLTYPE GetPointerSize( ULONG32* pointerSize )
  62. {
  63. #ifdef _WIN64
  64. if (!bIsWow64)
  65. #endif
  66. *pointerSize = sizeof(PVOID);
  67. #ifdef _WIN64
  68. else
  69. *pointerSize = sizeof(ULONG);
  70. #endif
  71. return S_OK;
  72. }
  73.  
  74. virtual HRESULT STDMETHODCALLTYPE GetImageBase( LPCWSTR imagePath,CLRDATA_ADDRESS *baseAddress )
  75. {
  76. HMODULE dlls[1024] = { 0 };
  77. DWORD nItems = 0;
  78. wchar_t path[ MAX_PATH ];
  79. DWORD whatToList = LIST_MODULES_ALL;
  80.  
  81. if( bIsWow64 )
  82. whatToList = LIST_MODULES_32BIT;
  83.  
  84. if( !EnumProcessModulesEx( hProcess,dlls,sizeof(dlls),&nItems,whatToList ) )
  85. {
  86. DWORD err = GetLastError();
  87. return HRESULT_FROM_WIN32(err);
  88. }
  89.  
  90. nItems /= sizeof(HMODULE);
  91. for( unsigned int i = 0; i < nItems; i++ )
  92. {
  93. path[0] = 0;
  94. if( GetModuleFileNameEx(hProcess,dlls[i],path,sizeof(path) / sizeof(path[0])) )
  95. {
  96. wchar_t* pDll = wcsrchr( path,L'\\');
  97. if (pDll) pDll++;
  98.  
  99. if (_wcsicmp(imagePath,path) == 0 || _wcsicmp(imagePath,pDll) == 0)
  100. {
  101. *baseAddress = (CLRDATA_ADDRESS) dlls[i];
  102. return S_OK;
  103. }
  104. }
  105. }
  106. return E_FAIL;
  107. }
  108.  
  109. virtual HRESULT STDMETHODCALLTYPE ReadVirtual( CLRDATA_ADDRESS address,BYTE *buffer,ULONG32 bytesRequested,ULONG32 *bytesRead )
  110. {
  111. SIZE_T readed;
  112.  
  113. if( !ReadProcessMemory(hProcess,(void*)address,buffer,bytesRequested,&readed) )
  114. return HRESULT_FROM_WIN32( GetLastError() );
  115.  
  116. *bytesRead = (ULONG32) readed;
  117. return S_OK;
  118. }
  119.  
  120. virtual HRESULT STDMETHODCALLTYPE WriteVirtual( CLRDATA_ADDRESS address,ULONG32 *bytesWritten )
  121. {
  122. return E_NOTIMPL;
  123. }
  124.  
  125. virtual HRESULT STDMETHODCALLTYPE GetTLSValue( ULONG32 threadID,ULONG32 index,CLRDATA_ADDRESS *value )
  126. {
  127. return E_NOTIMPL;
  128. }
  129.  
  130. virtual HRESULT STDMETHODCALLTYPE SetTLSValue( ULONG32 threadID,CLRDATA_ADDRESS value )
  131. {
  132. return E_NOTIMPL;
  133. }
  134.  
  135. virtual HRESULT STDMETHODCALLTYPE GetCurrentThreadID( ULONG32 *threadID )
  136. {
  137. return E_NOTIMPL;
  138. }
  139.  
  140. virtual HRESULT STDMETHODCALLTYPE GetThreadContext( ULONG32 threadID,ULONG32 contextFlags,ULONG32 contextSize,BYTE *context )
  141. {
  142. return E_NOTIMPL;
  143. }
  144.  
  145. virtual HRESULT STDMETHODCALLTYPE SetThreadContext( ULONG32 threadID,BYTE *context)
  146. {
  147. return E_NOTIMPL;
  148. }
  149.  
  150. virtual HRESULT STDMETHODCALLTYPE Request( ULONG32 reqCode,ULONG32 inBufferSize,BYTE *inBuffer,ULONG32 outBufferSize,BYTE *outBuffer)
  151. {
  152. return E_NOTIMPL;
  153. }
  154. }; //CLRDataTarget
  155.  
  156.  
  157.  
  158.  
  159.  
  160. ResoveStackM::ResoveStackM() :
  161. mscordacwks_dll(0)
  162. {
  163.  
  164. }
  165.  
  166. ResoveStackM::~ResoveStackM()
  167. {
  168. Close();
  169. }
  170.  
  171. void ResoveStackM::Close( void )
  172. {
  173. clrDataProcess.Release();
  174. target.Release();
  175. debugClient.Release();
  176.  
  177. if( mscordacwks_dll != 0 )
  178. {
  179. FreeLibrary(mscordacwks_dll);
  180. mscordacwks_dll = 0;
  181. }
  182. }
  183.  
  184. bool ResoveStackM::InitSymbolResolver(HANDLE hProcess,CString& lastError)
  185. {
  186. wchar_t path[ MAX_PATH ] = { 0 };
  187.  
  188. // According to process hacker - mscoree.dll must be loaded before loading mscordacwks.dll.
  189. // It's enough if base application is managed.
  190.  
  191. if( GetWindowsDirectoryW(path,sizeof(path)/sizeof(wchar_t) ) == 0 )
  192. return false; //Unlikely to fail.
  193.  
  194. #ifdef _WIN64
  195. wcscat(path,L"\\Microsoft.NET\\Framework64\\v4.0.30319\\mscordacwks.dll");
  196. #else
  197. wcscat(path,L"\\Microsoft.NET\\Framework\\v4.0.30319\\mscordacwks.dll");
  198. #endif
  199.  
  200. mscordacwks_dll = LoadLibraryW(path);
  201. PFN_CLRDataCreateInstance pCLRCreateInstance = 0;
  202.  
  203. if( mscordacwks_dll != 0 )
  204. pCLRCreateInstance = (PFN_CLRDataCreateInstance) GetProcAddress(mscordacwks_dll,"CLRDataCreateInstance");
  205.  
  206. if( mscordacwks_dll == 0 || pCLRCreateInstance == 0)
  207. {
  208. lastError.Format(L"required dll mscordacwks.dll from .NET4 installation was not found (%s)",path);
  209. Close();
  210. return false;
  211. }
  212.  
  213. BOOL isWow64 = FALSE;
  214. IsWow64Process(hProcess,&isWow64);
  215. target.Attach( new CLRDataTarget(hProcess,isWow64 != FALSE) );
  216.  
  217. HRESULT hr = pCLRCreateInstance(__uuidof(IXCLRDataProcess),target,(void**)&clrDataProcess );
  218.  
  219. if( Failed(hr) )
  220. {
  221. lastError.Format(L"Failed to initialize mscordacwks.dll for symbol resolving (%08X)",hr);
  222. Close();
  223. return false;
  224. }
  225.  
  226. hr = DebugCreate(__uuidof(IDebugClient),(void**)&debugClient);
  227. if (Failed(hr))
  228. {
  229. lastError.Format(_T("Could retrieve symbolic debug information using dbgeng.dll (Error code: 0x%08X)"),hr);
  230. return false;
  231. }
  232.  
  233. DWORD processId = GetProcessId(hProcess);
  234. const ULONG64 LOCAL_SERVER = 0;
  235. int flags = DEBUG_ATTACH_NONINVASIVE | DEBUG_ATTACH_NONINVASIVE_NO_SUSPEND;
  236.  
  237. hr = debugClient->AttachProcess(LOCAL_SERVER,processId,flags);
  238. if (hr != S_OK)
  239. {
  240. lastError.Format(_T("Could attach to process 0x%X (Error code: 0x%08X)"),hr);
  241. Close();
  242. return false;
  243. }
  244.  
  245. debugControl = debugClient;
  246.  
  247. hr = debugControl->SetExecutionStatus(DEBUG_STATUS_GO);
  248. if ((hr = debugControl->WaitForEvent(DEBUG_WAIT_DEFAULT,INFINITE)) != S_OK)
  249. {
  250. return false;
  251. }
  252.  
  253. debugSymbols3 = debugClient;
  254. debugSymbols = debugClient;
  255. // if debugSymbols3 == NULL - GetManagedFileLineInfo will not work
  256. return true;
  257. } //Init
  258.  
  259. struct ImageInfo
  260. {
  261. ULONG64 modBase;
  262. };
  263.  
  264. // Based on a native offset,passed in the first argument this function
  265. // identifies the corresponding source file name and line number.
  266. bool ResoveStackM::GetManagedFileLineInfo( void* ip,CStringA& lineInfo )
  267. {
  268. ULONG lineN = 0;
  269. char path[MAX_PATH];
  270. ULONG64 dispacement = 0;
  271.  
  272. CComPtr<IXCLRDataMethodInstance> method;
  273. if (!debugSymbols || !debugSymbols3)
  274. return false;
  275.  
  276. // Get managed method by address
  277. CLRDATA_ENUM methEnum;
  278. HRESULT hr = clrDataProcess->StartEnumMethodInstancesByAddress((ULONG64)ip,&methEnum);
  279. if( hr == S_OK )
  280. {
  281. hr = clrDataProcess->EnumMethodInstanceByAddress(&methEnum,&method);
  282. clrDataProcess->EndEnumMethodInstancesByAddress(methEnum);
  283. }
  284.  
  285. if (!method)
  286. goto lDefaultFallback;
  287.  
  288. ULONG32 ilOffsets = 0;
  289. hr = method->GetILOffsetsByAddress((CLRDATA_ADDRESS)ip,1,&ilOffsets);
  290.  
  291. switch( (long)ilOffsets )
  292. {
  293. case CLRDATA_IL_OFFSET_NO_MAPPING:
  294. goto lDefaultFallback;
  295.  
  296. case CLRDATA_IL_OFFSET_PROLOG:
  297. // Treat all of the prologue as part of the first source line.
  298. ilOffsets = 0;
  299. break;
  300.  
  301. case CLRDATA_IL_OFFSET_EPILOG:
  302. {
  303. // Back up until we find the last real IL offset.
  304. CLRDATA_IL_ADDRESS_MAP mapLocal[16];
  305. CLRDATA_IL_ADDRESS_MAP* map = mapLocal;
  306. ULONG32 count = _countof(mapLocal);
  307. ULONG32 needed = 0;
  308.  
  309. for( ; ; )
  310. {
  311. hr = method->GetILAddressMap(count,&needed,map);
  312.  
  313. if ( needed <= count || map != mapLocal)
  314. break;
  315.  
  316. map = new CLRDATA_IL_ADDRESS_MAP[ needed ];
  317. }
  318.  
  319. ULONG32 highestOffset = 0;
  320. for (unsigned i = 0; i < needed; i++)
  321. {
  322. long l = (long) map[i].ilOffset;
  323.  
  324. if (l == CLRDATA_IL_OFFSET_NO_MAPPING || l == CLRDATA_IL_OFFSET_PROLOG || l == CLRDATA_IL_OFFSET_EPILOG )
  325. continue;
  326.  
  327. if (map[i].ilOffset > highestOffset )
  328. highestOffset = map[i].ilOffset;
  329. } //for
  330.  
  331. if( map != mapLocal )
  332. delete[] map;
  333.  
  334. ilOffsets = highestOffset;
  335. }
  336. break;
  337. } //switch
  338.  
  339. mdMethodDef methodToken;
  340. void* moduleBase = 0;
  341. {
  342. CComPtr<IXCLRDataModule> module;
  343.  
  344. hr = method->GetTokenAndScope(&methodToken,&module);
  345. if( !module )
  346. goto lDefaultFallback;
  347.  
  348. //
  349. // Retrieve ImageInfo associated with the IXCLRDataModule instance passed in. First look for NGENed module,second for IL modules.
  350. //
  351. for (int extentType = CLRDATA_MODULE_PREJIT_FILE; extentType >= CLRDATA_MODULE_PE_FILE; extentType--)
  352. {
  353. CLRDATA_ENUM enumExtents;
  354. if (module->StartEnumExtents(&enumExtents) != S_OK )
  355. continue;
  356.  
  357. CLRDATA_MODULE_EXTENT extent;
  358. while (module->EnumExtent(&enumExtents,&extent) == S_OK)
  359. {
  360. if (extentType != extent.type )
  361. continue;
  362.  
  363. ULONG startIndex = 0;
  364. ULONG64 modBase = 0;
  365.  
  366. hr = debugSymbols->GetModuleByOffset((ULONG64) extent.base,&startIndex,&modBase);
  367. if( Failed(hr) )
  368. continue;
  369.  
  370. moduleBase = (void*)modBase;
  371.  
  372. if (moduleBase )
  373. break;
  374. }
  375. module->EndEnumExtents(enumExtents);
  376.  
  377. if( moduleBase != 0 )
  378. break;
  379. } //for
  380. } //module scope
  381.  
  382. DEBUG_MODULE_AND_ID id;
  383. DEBUG_SYMBOL_ENTRY symInfo;
  384. hr = debugSymbols3->GetSymbolEntryByToken((ULONG64)moduleBase,methodToken,&id);
  385. if( Failed(hr) )
  386. goto lDefaultFallback;
  387.  
  388. hr = debugSymbols3->GetSymbolEntryInformation(&id,&symInfo);
  389. if (Failed(hr))
  390. goto lDefaultFallback;
  391.  
  392. char* IlOffset = (char*)symInfo.Offset + ilOffsets;
  393.  
  394. //
  395. // Source maps for managed code can end up with special 0xFEEFEE markers that
  396. // indicate don't-stop points. Try and filter those out.
  397. //
  398. for (ULONG SkipCount = 64; SkipCount > 0; SkipCount--)
  399. {
  400. hr = debugSymbols3->GetLineByOffset((ULONG64)IlOffset,&lineN,sizeof(path),&dispacement );
  401. if( Failed( hr ) )
  402. break;
  403.  
  404. if (lineN == 0xfeefee)
  405. IlOffset++;
  406. else
  407. goto lCollectInfoAndReturn;
  408. }
  409.  
  410. if( !Failed(hr) )
  411. // Fall into the regular translation as a last-ditch effort.
  412. ip = IlOffset;
  413.  
  414. lDefaultFallback:
  415. hr = debugSymbols3->GetLineByOffset((ULONG64) ip,&dispacement);
  416.  
  417. if( Failed(hr) )
  418. return false;
  419.  
  420. lCollectInfoAndReturn:
  421. lineInfo += path;
  422. lineInfo += "(";
  423. lineInfo += std::to_string((_ULonglong) lineN).c_str();
  424. lineInfo += "): ";
  425. return true;
  426. }
  427.  
  428.  
  429. bool ResoveStackM::GetMethodName(void* ip,CStringA& symbol)
  430. {
  431. symbol.Empty();
  432.  
  433. GetManagedFileLineInfo(ip,symbol);
  434.  
  435. USES_CONVERSION;
  436. CLRDATA_ADDRESS displacement = 0;
  437. ULONG32 len = 0;
  438. wchar_t name[1024];
  439. if (!clrDataProcess )
  440. return false;
  441.  
  442. HRESULT hr = clrDataProcess->GetRuntimeNameByAddress( (CLRDATA_ADDRESS)ip,sizeof(name) / sizeof(name[0]),&len,name,&displacement );
  443.  
  444. if( Failed( hr ) )
  445. return false;
  446.  
  447. name[ len ] = 0;
  448. symbol += W2A(name);
  449. return true;
  450. } //GetMethodName
  451.  
  452.  
  453.  
  454. ResoveStackM g_managedStackResolver;

到目前为止只测试了一些较小的代码,只有64位(怀疑32位工作原理 – 我还没有调用堆栈确定).

这段代码可能包含错误,但我会试着困扰它们并修复它们.

我收集了很多代码,请将此答案标记为有用.

猜你在找的Windows相关文章