StackOverflow 和进程关闭后的 Windbg 线程 ID
使用 ADPlus(在故障转储模式下)生成 .dmp 文件。 未处理异常的最终序列(产生完整的内存转储文件)是...
第一次机会 DLL 卸载:包含线程 ID,但不包含 StackOverflowException(我不希望它出现,因为此时异常还没有包含)还被扔了)。
第一次机会 Stackoverflow:包含线程 ID,但不包含 StackOverflowException。
第一次机会进程关闭(shutdown):包含 StackOverflowException 但不包含线程 id。
???
是否有某种方法(通过配置 ADPlus 或通过在 Windbg 中运行命令)来捕获异常并访问线程 ID?
针对 Magnus,如果线程 id 不可用,是否有一些有用的信息? 运行 !threads 返回一些信息,但没有线程 id 和异常,似乎没有其他地方可以从那里开始。 在这种情况下,运行 !clrstack 似乎比运行 !threads 更有用。
Using ADPlus (in crash dump mode) to generate .dmp files. The final sequence of unhandled exceptions (that produce full memory dump files) is...
1st chance DLL unload: contains thread id's but doesn't contain the StackOverflowException (I wouldn't expect it to since at this point the exception hasn't been thrown yet).
1st chance Stackoverflow: contains thread id's but doesn't contain the StackOverflowException.
1st chance Process Shut Down (shutdown): contains the StackOverflowException but doesn't contain the thread id's.
???
Is there some way, either by configuring ADPlus or by running commands in Windbg, to capture the exception and have access to the thread id's?
In response to Magnus, is there some useful information if the thread id isn't available? Running !threads returns some info, but without both the thread id and the exception, there doesn't seem to be anywhere else to go from there. Running !clrstack seems more useful than running !threads, in this case.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(3)
以下帖子提供了有关捕获 StackOverflowException 的更多信息,但它从未完全解决
帮助使用 WinDbg 和 ADPlus 捕获 StackOverflowException
The following post has a little more information on capturing a StackOverflowException, however it was never fully resolved
Help catching StackOverflowException with WinDbg and ADPlus
您在对转储文件进行事后调试期间是否尝试过 WinDbg 中的 !thread 命令?
Have you tried the !thread command in WinDbg during post mortem debugging of your dump file?
打开第二个转储并输入命令.ecxr[enter]
现在dds esp[输入]
要继续查看调用堆栈,只需输入 dds[enter]
[输入]....[输入]....
您可能会发现该线程正在调用已卸载的 DLL。
Open the second dump and enter the command .ecxr[enter]
Now dds esp[enter]
To continue viewing the callstack just write dds[enter]
[enter]....[enter]....
You will probaby find this thread was in the middle of calling the unloaded DLL.