在windbg中调试Internet Explorer
我正在使用 Windbg 进行一些崩溃分析。假设堆栈跟踪表明崩溃发生在 mshtml!CBase::put_String 处,有没有办法找出哪些 javascript 或 DOM 操作导致了该函数?
I was doing some crash analysis using windbg. Suppose the stack trace indicates the crash is at mshtml!CBase::put_String ,is there a way to figure out what javascript or DOM manipulation leads to the function?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
根据堆栈,您有时可以做出很好的猜测。由于您只能获得公共符号,因此您无法轻松获得有关对象内部状态的详细信息。如果您发布整个堆栈,我也许可以帮助您解决问题。
如果有一些识别特征,您也许可以调用 getter。您可以使用 .call 来做到这一点。请参阅 Raymonds 帖子 描述 .call。
如果您认为在 IE 中发现了真正的错误,您可以随时将其发布到 http://connect.microsoft。 com/ie 供 IE 团队查看。请务必包含该网站的链接或最少的 HTML 重现...
Based on the stack you can sometimes make a pretty good guess. Since you only get public symbols you don't have the ability to easily get detailed information about the internal state of the objects. If you post your whole stack I may be able to help you figure it out.
If there is some identifying characteristic, you may be able to call the getter. You can use .call to do that. See Raymonds post describing .call.
If you think you've found a real bug in IE, you can always post it to http://connect.microsoft.com/ie for the IE team to have a look at. Be sure to include a link to the site or minimal HTML repro...