微信公众号搜"智元新知"关注
微信扫一扫可直接关注哦!

如何在Windbg中打印C结构的数据

在Windowsdebugging器中,我试图打印出传递给交streamfunction的数据。 我感兴趣的是传入System_Data_sqlite!sqlite3_step + 0x63的数据。

0:071> kv 20 Child-SP RetAddr : Args to Child : Call Site 00000000`11b82e28 00000642`ff864776 : 00000000`12f6f450 00000000`0092dcd8 00000000`11b83488 00000000`11b83480 : ntdll!NtGetContextThread+0xa 00000000`11b82e30 00000000`12f6f450 : 00000000`0092dcd8 00000000`11b83488 00000000`11b83480 00000000`11b83470 : <Unloaded_mscordacwks.dll>+0x154776 00000000`11b82e38 00000000`0092dcd8 : 00000000`11b83488 00000000`11b83480 00000000`11b83470 00000000`77ee2ae9 : 0x12f6f450 00000000`11b82e40 00000000`11b83488 : 00000000`11b83480 00000000`11b83470 00000000`77ee2ae9 00000000`12c1a970 : 0x92dcd8 00000000`11b82e48 00000000`11b83480 : 00000000`11b83470 00000000`77ee2ae9 00000000`12c1a970 00000000`ffffffff : 0x11b83488 00000000`11b82e50 00000000`11b83470 : 00000000`77ee2ae9 00000000`12c1a970 00000000`ffffffff 00000000`00920be8 : 0x11b83480 00000000`11b82e58 00000000`77ee2ae9 : 00000000`12c1a970 00000000`ffffffff 00000000`00920be8 00000000`00000000 : 0x11b83470 00000000`11b82e60 00000000`77ecff89 : 00000000`00920000 00000000`00920090 00000000`00920090 00000642`ff710000 : ntdll!RtlDeleteCriticalSection+0x11c 00000000`11b82e90 00000000`77d53f8a : 00000000`1279ba00 00000000`13129d30 00000000`00000000 00000000`00000000 : ntdll!RtlDestroyHeap+0x2b1 00000000`11b82f00 00000000`77ef7708 : 00000642`ff89b080 00000000`000000b0 00000000`1279ba0d 00000000`00000000 : kernel32!HeapDestroy+0xa 00000000`11b82f30 00000000`1279ba58 : 00000000`1279ba0f 00000642`ff710000 00000642`001bd000 00000000`00000001 : ntdll!LdrLockLoaderLock+0x15f 00000000`11b82f90 00000000`1279ba0f : 00000642`ff710000 00000642`001bd000 00000000`00000001 00000000`11b83488 : 0x1279ba58 00000000`11b82f98 00000642`ff710000 : 00000642`001bd000 00000000`00000001 00000000`11b83488 00000000`11b83480 : 0x1279ba0f 00000000`11b82fa0 00000642`001bd000 : 00000000`00000001 00000000`11b83488 00000000`11b83480 00000000`11b83470 : <Unloaded_mscordacwks.dll> 00000000`11b82fa8 00000000`00000001 : 00000000`11b83488 00000000`11b83480 00000000`11b83470 00000000`77eee1e5 : 0x642`001bd000 00000000`11b82fb0 00000000`11b83488 : 00000000`11b83480 00000000`11b83470 00000000`77eee1e5 00000000`1279ba10 : 0x1 00000000`11b82fb8 00000000`11b83480 : 00000000`11b83470 00000000`77eee1e5 00000000`1279ba10 00000000`11b83028 : 0x11b83488 00000000`11b82fc0 00000000`11b83470 : 00000000`77eee1e5 00000000`1279ba10 00000000`11b83028 00000000`00000000 : 0x11b83480 00000000`11b82fc8 00000000`77eee1e5 : 00000000`1279ba10 00000000`11b83028 00000000`00000000 00000000`11b83478 : 0x11b83470 00000000`11b82fd0 00000000`77d6d721 : 00000642`ff710000 00000000`03651690 00000000`11b834a0 00000642`ff710000 : ntdll!LdrUnloadDll+0x8ad 00000000`11b83150 000007ff`7252f5f3 : 00000000`03651690 00000000`03651690 00000000`03651690 00000642`ff710000 : kernel32!FreeLibrary+0x6b 00000000`11b83180 000007ff`7252cf60 : 00000000`11b83da0 00000642`82e30018 00000000`00002900 00000000`00000000 : dbghelp!NtWin32LiveSystemProvider::EnumFunctionTables+0x223 00000000`11b83430 000007ff`7252a6c9 : 00000000`123d8660 ffffffff`ffffffff 00000000`00000002 ffffffff`ffffffff : dbghelp!GenGetProcessInfo+0x860 00000000`11b83d30 000007ff`7252a89c : 00000000`00000002 00000001`5fff1fe0 00000000`00000000 00000000`0364f3b0 : dbghelp!MiniDumpProvideDump+0x639 00000000`11b83f30 00000000`0bd73939 : 00000000`11b84050 00000000`00000200 00000000`00000000 00000000`0c040be0 : dbghelp!MiniDumpWriteDump+0x13c 00000000`11b84000 00000000`0bd81e59 : 00000000`00000002 00000000`11b854f0 00000000`11b8b52c 00000000`0bdd0110 : System_Data_sqlite!CreateMinidumpHook+0x119 [c:devsqlitesqlite.interopsrcwininterop.c @ 117] 00000000`11b84490 00000000`0bd75483 : 00000000`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_sqlite!_VCrtDbgReportW+0x7a9 [f:ddvctoolscrt_bldself_64_amd64crtsrcdbgrptt.c @ 589] 00000000`11b8c590 00000000`0bd7541d : 00000642`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_sqlite!_CrtDbgReportWV+0x43 [f:ddvctoolscrt_bldself_64_amd64crtsrcdbgrpt.c @ 242] 00000000`11b8c5d0 00000000`0bc85b12 : 00000000`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_sqlite!_CrtDbgReportW+0x4d [f:ddvctoolscrt_bldself_64_amd64crtsrcdbgrpt.c @ 258] 00000000`11b8c620 00000000`0bc8515c : 00000000`2cc67ca0 00000642`7f4ce081 00000000`00000000 00000000`00000000 : System_Data_sqlite!winMutexEnter+0xa2 [c:devsqlitesqlite.interopsrccoresqlite3.c @ 18609] 00000000`11b8c670 00000000`0bcb3203 : 00000000`2cc67ca0 00000642`7f4ce0e4 00000000`00000000 00000000`00000000 : System_Data_sqlite!sqlite3_mutex_enter+0x1c [c:devsqlitesqlite.interopsrccoresqlite3.c @ 17474] 00000000`11b8c6a0 00000642`7f6005f7 : 00000001`c14e4100 00000000`a4cc7610 00000001`c61d3750 00000642`782ea561 : System_Data_sqlite!sqlite3_step+0x63 [c:devsqlitesqlite.interopsrccoresqlite3.c @ 64122]

在windows下列出c ++目录

在C ++中测量对system()的调用的执行时间

如何使用C ++在Win上编写和读取UTF16文件

我应该如何防止硬链接攻击?

如何强制两个进程在同一个cpu上运行?

您可以输入:

kP

这将转储格式化每个调用的参数

要么

dt System_Data_sqlite!<type> // replace <type> with whatever you are interested in

看到这个更多的信息: http : //blogs.msdn.com/b/doronh/archive/2006/03/22/558329.aspx和在这里: http : //windbg.info/doc/1-common-cmds 。 HTML#17_variables

版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 [email protected] 举报,一经查实,本站将立刻删除。

相关推荐