一、简介
今天是《Net 高级调试》的第十六篇文章,也是这个系列的最后一篇文章了 。既然是最后一篇文章,我需要在这里说明一下,我当前的这个系列,不是针对《Net 高级调试》这本书来的,而是根据"一线码农"的视频做的这个系列。当然了,他的视频是根据《Net 高级调试》这本书来的,内容上做了一些调整,可以说是与时俱进的。说实在的,我第一次看《Net 高级调试》这个本书是蒙的,不知道从何处入手,有一个视频带我入门,相对而言是更容易下一下。入门之后,在深入研究《Net 高级调试这个本书》。 好了废话就说这么多。今天是这个系列的最后一章,主要说一下【互用性】调试相关的内容,比如:P/Invoke调用的调试,互操作中的内存泄漏,COM互用性中终结操作的调试。我们写 C# 代码的,有时候也会用到P/Invoke调用的,多积累点经验是好事,我们可以做到有事不怕事,来者不拒。这些底层的东西,肯定不是一次就能接受的,所以,我们需要多次调试,才能慢慢体会其中之意,俗话说的好,书读千遍,其意自现。
如果在没有说明的情况下,所有代码的测试环境都是 Net Framewok 4.8,但是,有时候为了查看源码,可能需要使用 Net Core 的项目,我会在项目章节里进行说明。好了,废话不多说,开始我们今天的调试工作。
调试环境我需要进行说明,以防大家不清楚,具体情况我已经罗列出来。
操作系统:Windows Professional 10
** 调试工具:Windbg Preview(可以去Microsoft Store 去下载)**
** 开发工具:Visual Studio 2022**
** Net 版本:Net Framework 4.8**
** CoreCLR源码:源码下载**
二、基础知识
1、平台调用 P/Invoke
1.1、简介
平台调用服务 P/Invoke 是 CLR 的一部分,负责确保托管代码可以调用从非托管程序集中导出的各种函数,原因很简单,托管类型参数和非托管类型参数是不一致的,比如:托管的引用类型是带有附加信息的,二非托管类型是不可能有的。
2、P/Invoke 的崩溃
2.1、调用协定引发的崩溃。
很多时候调用协定不一致容易造成程序的崩溃,这种问题需要通过【调试器】检查。
2.2、委托异步引发的崩溃
【托管代码】到【非托管代码】的切换过程中,对象的固定是有 P/Invoke 层全权负责的,但是这个固定的范围这个同步的 Request-Response 周期,如果超过请求相应周期,那就容易出现各种问题,比如:Example_16_1_4。
2.3、非托管内存泄漏
非托管内存泄露,这里就不多说,我们举例说明,直接看调试代码。(这个方案没有完全解决,有些命令没有执行结果。)
三、源码调试
废话不多说,这一节是具体的调试过程,又可以说是眼见为实的过程,在开始之前,我还是要啰嗦两句,这一节分为两个部分,第一部分是测试的源码部分,没有代码,当然就谈不上测试了,调试必须有载体。第二部分就是根据具体的代码来证实我们学到的知识,是具体的眼见为实。
1、项目源码
1.1、Example_16_1_1
1 using System;
2 using System.Diagnostics;
3 using System.Runtime.InteropServices;
4
5 namespace Example_16_1_1
6 {
7 internal class Program
8 {
9 /// <summary>
10 ///
11 /// </summary>
12 /// <param name="freq"></param>
13 /// <param name="dur"></param>
14 /// <returns></returns>
15 [DllImport("Kernel32.dll", SetLastError = true)]
16 private static extern bool Beep(uint freq, uint dur);
17
18
19 static void Main(string[] args)
20 {
21 Debugger.Break();
22
23 Beep(1000, 1000);
24
25 Console.ReadLine();
26 }
27 }
28 }
View Code
1.2、Example_16_1_2
1 using System;
2 using System.Runtime.InteropServices;
3
4 namespace Example_16_1_2
5 {
6 internal class Program
7 {
8 [DllImport("Example_16_1_3.dll", CallingConvention = CallingConvention.ThisCall, CharSet = CharSet.Unicode)]
9 //[DllImport("Example_16_1_3.dll", CallingConvention = CallingConvention.Cdecl, CharSet = CharSet.Unicode)]
10 public static extern void Alloc(string str);
11 static void Main(string[] args)
12 {
13 var str = "hello world";
14
15 Alloc(str);
16
17 Console.ReadLine();
18 }
19 }
20 }
View Code
1.3、Example_16_1_3(C++项目)
1 // Example_16_1_3.cpp : 此文件包含 "main" 函数。程序执行将在此处开始并结束。
2
3 extern "C"
4 {
5 __declspec(dllexport) void Alloc(wchar_t* c);
6 }
7
8 #include "iostream"
9 #include <Windows.h>
10
11 using namespace std;
12
13 void Alloc(wchar_t* c)
14 {
15 wprintf(L"%s \n", c);
16 }
View Code
1.4、Example_16_1_4
1 using System;
2 using System.Runtime.InteropServices;
3
4 namespace Example_16_1_4
5 {
6 internal class Program
7 {
8 public delegate void Callback(uint i);
9 static void Main(string[] args)
10 {
11 Test();
12 GC.Collect(); //不出问题的情况。
13 Console.ReadLine();
14 }
15
16 //static GCHandle handle;
17 private static void Test()
18 {
19 Callback callback = MyRun;
20
21 //handle=GCHandle.Alloc(callback, GCHandleType.Normal);
22 AsyncProcess(callback);
23
24 callback = null;
25 }
26
27 private static void MyRun(uint i)
28 {
29 Console.WriteLine("这是非托管代码回调我的实现!");
30 }
31
32 private static void MyCallback(string result)
33 {
34 Console.WriteLine($"Result={result}");
35 }
36
37 [DllImport("Example_16_1_5", CallingConvention = CallingConvention.StdCall)]
38 private static extern void AsyncProcess(Callback callback);
39 }
40 }
View Code
1.5、Example_16_1_5(C++项目)
1 // Example_16_1_5.cpp : 此文件包含 "main" 函数。程序执行将在此处开始并结束。
2 //
3
4 #include <iostream>
5 #include <Windows.h>
6
7 using namespace std;
8
9 typedef void(__stdcall* PCallback)(UINT result);
10
11 extern "C"
12 {
13 _declspec(dllexport) void __stdcall AsyncProcess(PCallback ptr);
14 }
15
16 DWORD WINAPI ThreadWorkItem(LPVOID lpParameter)
17 {
18 printf("我是非托管的工作线程,tid=%d \n", GetCurrentThreadId());
19
20 Sleep(2000);
21
22 PCallback callback = (PCallback)lpParameter;
23
24 callback(0);
25
26 return 0;
27 }
28
29 void __stdcall AsyncProcess(PCallback ptr)
30 {
31 HANDLE hThread = CreateThread(NULL, 0, ThreadWorkItem, ptr, 0, NULL);
32 }
View Code
1.6、Example_16_1_6
1 using System;
2 using System.Runtime.InteropServices;
3 using System.Threading.Tasks;
4
5 namespace Example_16_1_6
6 {
7 internal class Program
8 {
9 [DllImport("Example_16_1_7", CallingConvention = CallingConvention.StdCall)]
10 private static extern int InitData(int len);
11
12 static void Main(string[] args)
13 {
14 var task = Task.Factory.StartNew(() =>
15 {
16 for (int i = 0; i < int.MaxValue; i++)
17 {
18 InitData(10000);
19
20 Console.WriteLine($"i={i} 次操作!");
21 }
22 });
23
24 Console.ReadLine();
25 }
26 }
27 }
View Code
1.7、Example_16_1_7(C++项目)
1 // Example_16_1_7.cpp : 此文件包含 "main" 函数。程序执行将在此处开始并结束。
2 //
3
4 #include <iostream>
5 #include <Windows.h>
6
7 using namespace std;
8
9 extern "C"
10 {
11 _declspec(dllexport) int __stdcall InitData(int len);
12 }
13
14 int __stdcall InitData(int len) {
15 char* c = new char[len];
16 return 1;
17 }
View Code
2、眼见为实
项目的所有操作都是一样的,所以就在这里说明一下,但是每个测试例子,都需要重新启动,并加载相应的应用程序,加载方法都是一样的。流程如下:我们编译项目,打开 Windbg,点击【文件】----》【launch executable】附加程序,打开调试器的界面,程序已经处于中断状态。
我们需要使用【g】命令,继续运行程序,然后到达指定地点停止后,我们可以点击【break】按钮,就可以调试程序了。有时候可能需要切换到主线程,可以使用【~0s】命令。
2.1、如何观察 P/Invoke 是CLR的一部分。
调试源码:Example_16_1_1
因为【Beep】是Windows 提供的蜂鸣函数,可以直接用【bp】命令下断点,过了这么多年,这个函数的名称也有了变化,现在是【KERNEL32!BeepImplementation】。
当我们进入 Windbg 调试器界面后,我们使用【x】命令,查找一下【Beep】这个函数。
1 0:000> x kernel32!*beep*
2 7771194c KERNEL32!_imp__Beep = <no type information>
3 776c0660 KERNEL32!BeepImplementation (_BeepImplementation@8)
然后我们在这个方法上下断点,通过【bp KERNEL32!BeepImplementation 】命令下断点,然后继续【g】运行调试器。
1 0:000> bp KERNEL32!BeepImplementation
2 0:000> g
3 ModLoad: 75760000 757d9000 C:\Windows\SysWOW64\ADVAPI32.dll
4 ModLoad: 76de0000 76e9f000 C:\Windows\SysWOW64\msvcrt.dll
5 ModLoad: 75a10000 75a85000 C:\Windows\SysWOW64\sechost.dll
6 ModLoad: 754c0000 7557a000 C:\Windows\SysWOW64\RPCRT4.dll
7 ModLoad: 750f0000 7517d000 C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
8 ModLoad: 75ed0000 75f15000 C:\Windows\SysWOW64\SHLWAPI.dll
9 ModLoad: 76400000 7640f000 C:\Windows\SysWOW64\kernel.appcore.dll
10 ModLoad: 75340000 75348000 C:\Windows\SysWOW64\VERSION.dll
11 ModLoad: 74740000 74ef0000 C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr.dll
12 ModLoad: 75a90000 75c24000 C:\Windows\SysWOW64\USER32.dll
13 ModLoad: 75f90000 75fa8000 C:\Windows\SysWOW64\win32u.dll
14 ModLoad: 739c0000 73a6b000 C:\Windows\SysWOW64\ucrtbase_clr0400.dll
15 ModLoad: 73a70000 73a84000 C:\Windows\SysWOW64\VCRUNTIME140_CLR0400.dll
16 ModLoad: 75c30000 75c53000 C:\Windows\SysWOW64\GDI32.dll
17 ModLoad: 76410000 764eb000 C:\Windows\SysWOW64\gdi32full.dll
18 ModLoad: 76360000 763db000 C:\Windows\SysWOW64\msvcp_win.dll
19 ModLoad: 755a0000 756c0000 C:\Windows\SysWOW64\ucrtbase.dll
20 ModLoad: 75fb0000 75fd5000 C:\Windows\SysWOW64\IMM32.DLL
21 ModLoad: 760d0000 76350000 C:\Windows\SysWOW64\combase.dll
22 (ef0.18fc): Unknown exception - code 04242420 (first chance)
23 ModLoad: 72340000 7374e000 C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\218db16dceaef380c6daf35c6a48f313\mscorlib.ni.dll
24 ModLoad: 75890000 75973000 C:\Windows\SysWOW64\ole32.dll
25 ModLoad: 760d0000 76350000 C:\Windows\SysWOW64\combase.dll
26 ModLoad: 764f0000 7654c000 C:\Windows\SysWOW64\bcryptPrimitives.dll
27 ModLoad: 71c00000 71c8a000 C:\Windows\Microsoft.NET\Framework\v4.0.30319\clrjit.dll
28 ModLoad: 770d0000 7716b000 C:\Windows\SysWOW64\OLEAUT32.dll
29 (ef0.18fc): Break instruction exception - code 80000003 (first chance)
30 eax=00f3f358 ebx=00000000 ecx=01045e60 edx=00f3f530 esi=02f524d4 edi=00f3f39c
31 eip=75e0f262 esp=00f3f2f0 ebp=00f3f37c iopl=0 nv up ei pl zr na pe nc
32 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
33 KERNELBASE!wil::details::DebugBreak+0x2:
34 75e0f262 cc int 3
这个断点,还没有到我们的Beep方法,到了【Debugger.Break();】这行代码,然后,我们继续【g】。
1 0:000> g
2 Breakpoint 0 hit
3 eax=776c0660 ebx=00f3f460 ecx=74813ac3 edx=00000000 esi=01045e60 edi=00f3f3d0
4 eip=776c0660 esp=00f3f340 ebp=00f3f3a4 iopl=0 nv up ei pl zr na pe nc
5 cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246
6 KERNEL32!BeepImplementation:
7 776c0660 8bff mov edi,edi
红色标注的就是我们想要断住的方法。到了这里,我们看看当前的调用栈,使用【!clrstack】命令。
1 0:000> !clrstack
2 OS Thread Id: 0x18fc (0)
3 Child SP IP Call Site
4 00f3f350 776c0660 [InlinedCallFrame: 00f3f350]
5 00f3f34c 02db092d DomainBoundILStubClass.IL_STUB_PInvoke(UInt32, UInt32)
6 00f3f350 02db087a [InlinedCallFrame: 00f3f350] Example_16_1_1.Program.Beep(UInt32, UInt32)
7 00f3f3ac 02db087a Example_16_1_1.Program.Main(System.String[]) [E:\Visual Studio 2022\...\Example_16_1_1\Program.cs @ 23]
8 00f3f530 7474f036 [GCFrame: 00f3f530]
InlinedCallFrame: 00f3f350 这样有一个地址,就是一个栈针,这个栈针就是 CLR 里面的部分,这个栈针地址就会调用 LoadLibrary方法,加载【Kernel32.dll】,如果加载了这个dll,就不需要在加载了,如果没有加载才加载。加载了 dll 找到 Beep 方法的方发表,调用执行就可以了。
我们可以使用【dp】命令查看一下这个指针。我执行了两次,大家不用这样执行。选择自己喜欢的。
1 0:000> dp 00f3f350
2 00f3f350 7474fd74 00f3f530 00000008 00f3f344
3 00f3f360 02db092d 00f3f3a4 02d24d58 01045e60
4 00f3f370 00f3f310 00f3f3d0 776c0660 ffffffff
5 00f3f380 747ff800 000003e8 000003e8 00000000
6 00f3f390 000003e8 000003e8 00f3f460 00000000
7 00f3f3a0 00f3f3d0 00f3f3b8 02db087a 00000000
8 00f3f3b0 00000000 02f524c8 00f3f3c4 7474f036
9 00f3f3c0 01045e60 00f3f418 747522da 00f3f460
10 0:000> dp 00f3f350 L1
11 00f3f350 7474fd74
然后,我们在使用【ln 7474fd74】命令,查看具体详情。
1 0:000> ln 7474fd74
2 Browse module
3 Set bu breakpoint
4
5 (7474fd74) clr!InlinedCallFrame::`vftable' | (7474fdc0) clr!HelperMethodFrame_1OBJ::`vftable'
6 Exact matches:
当然,我们也可以使用【u】命令,查看 clr!InlinedCallFrame 方法的源码。当然,这个源码是汇编源码。
1 0:000> u 7474fd74
2 clr!InlinedCallFrame::`vftable':
3 7474fd74 30a1757490ba xor byte ptr [ecx-456F8B8Bh],ah
4 7474fd7a 7574 jne clr!HelperMethodFrame_1OBJ::`vftable'+0x30 (7474fdf0)
5 7474fd7c b019 mov al,19h
6 7474fd7e 7574 jne clr!HelperMethodFrame_1OBJ::`vftable'+0x34 (7474fdf4)
7 7474fd80 1061a0 adc byte ptr [ecx-60h],ah
8 7474fd83 7460 je clr!HelperMethodFrame_1OBJ::`vftable'+0x25 (7474fde5)
9 7474fd85 f9 stc
10 7474fd86 7f74 jg clr!HelperMethodFrame_1OBJ::`vftable'+0x3c (7474fdfc)
2.2、调用协定造成的崩溃。
调试源码:Example_16_1_2 和 Example_16_1_3(C++)
我们【Example_16_1_2】项目的 Program 类声明了一个Alloc方法,是C++ 的。这个方法的调用协定就是【CallingConvention = CallingConvention.Cdecl、CallingConvention.StdCall、CallingConvention.ThisCall】这个3中协定都是正常执行的,说明一下:和视频中使用【CallingConvention.ThisCall】协定程序会崩溃是不一致的,本人亲测 ,传递字符的规格是【CharSet = CharSet.Unicode】,也就是双字节。
我们的C++项目【Example_16_1_3】的【Example_16_1_3.cpp】类就定义了 Alloc 方法。我们为了传递和接受双字节的字符,在C++ 里面需要使用【wchar_t】类型,这个函数导出的时候格式是以【extern "C"】C语言的格式为标准的。
到现在,我们可以直接运行【Example_16_1_2】项目的 exe 程序,(说明:调用协定是CallingConvention.Cdecl,才可以调用成功,CallingConvention.ThisCall是举例调用协定不一致出现问题,大家要熟悉),我们看看运行结果,效果如图:
现在,我们把调用协定修改为【CallingConvention.FastCall】,在我测测试中,这些调用协定【CallingConvention.StdCall、CallingConvention.ThisCall、CallingConvention.Cdecl、CallingConvention.Winapi】都是正常执行的,所以,我只能换【CallingConvention.FastCall】,通过 Windbg 调试器查看一些运行结果。
当把我们的项目加载到 Windebug 调试中直接运行,会抛出异常,和视频中抛出的【访问违例:Access violation】异常是不一样的。
1 0:000> g
2 ModLoad: 00007ffd`15bf0000 00007ffd`15c9a000 C:\Windows\System32\ADVAPI32.dll
3 ModLoad: 00007ffd`166f0000 00007ffd`1678e000 C:\Windows\System32\msvcrt.dll
4 ModLoad: 00007ffd`168c0000 00007ffd`1695b000 C:\Windows\System32\sechost.dll
5 ModLoad: 00007ffd`17550000 00007ffd`17673000 C:\Windows\System32\RPCRT4.dll
6 ModLoad: 00007ffc`fd320000 00007ffc`fd3ca000 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscoreei.dll
7 ModLoad: 00007ffd`16960000 00007ffd`169b5000 C:\Windows\System32\SHLWAPI.dll
8 ModLoad: 00007ffd`152c0000 00007ffd`152d3000 C:\Windows\System32\kernel.appcore.dll
9 ModLoad: 00007ffd`14c80000 00007ffd`14c8a000 C:\Windows\SYSTEM32\VERSION.dll
10 ModLoad: 00007ffc`fbfa0000 00007ffc`fca62000 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\clr.dll
11 ModLoad: 00007ffd`17320000 00007ffd`174c0000 C:\Windows\System32\USER32.dll
12 ModLoad: 00007ffd`15240000 00007ffd`15262000 C:\Windows\System32\win32u.dll
13 ModLoad: 00007ffc`fba00000 00007ffc`fbabd000 C:\Windows\SYSTEM32\ucrtbase_clr0400.dll
14 ModLoad: 00007ffc`fcd00000 00007ffc`fcd16000 C:\Windows\SYSTEM32\VCRUNTIME140_CLR0400.dll
15 ModLoad: 00007ffd`15bb0000 00007ffd`15bda000 C:\Windows\System32\GDI32.dll
16 ModLoad: 00007ffd`153b0000 00007ffd`154ba000 C:\Windows\System32\gdi32full.dll
17 ModLoad: 00007ffd`15310000 00007ffd`153ad000 C:\Windows\System32\msvcp_win.dll
18 ModLoad: 00007ffd`154c0000 00007ffd`155c0000 C:\Windows\System32\ucrtbase.dll
19 ModLoad: 00007ffd`16650000 00007ffd`16680000 C:\Windows\System32\IMM32.DLL
20 ModLoad: 00007ffd`17970000 00007ffd`17cc4000 C:\Windows\System32\combase.dll
21 (3cf8.225c): Unknown exception - code 04242420 (first chance)
22 ModLoad: 00007ffc`f3650000 00007ffc`f4c50000 C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\....\mscorlib.ni.dll
23 ModLoad: 00007ffd`16790000 00007ffd`168b9000 C:\Windows\System32\ole32.dll
24 ModLoad: 00007ffd`17970000 00007ffd`17cc4000 C:\Windows\System32\combase.dll
25 ModLoad: 00007ffd`15b30000 00007ffd`15baf000 C:\Windows\System32\bcryptPrimitives.dll
26 ModLoad: 00007ffc`f2c50000 00007ffc`f2d9f000 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\clrjit.dll
27 (3cf8.225c): C++ EH exception - code e06d7363 (first chance)
28 ModLoad: 0000017d`c7a10000 0000017d`c7b0a000 image0000017d`c7a10000
29 ModLoad: 0000017d`c7b10000 0000017d`c7c0a000 image0000017d`c7b10000
30 (3cf8.225c): CLR exception - code e0434352 (first chance)
31 ModLoad: 00007ffc`a83f0000 00007ffc`a855a000 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\diasymreader.dll
32 ModLoad: 00007ffc`f1fe0000 00007ffc`f2c50000 C:\Windows\assembly\NativeImages_v4.0.30319_64\System\...\System.ni.dll
33 ModLoad: 00007ffc`f14b0000 00007ffc`f1f25000 C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\...\System.Core.ni.dll
34 ModLoad: 00007ffd`14a40000 00007ffd`14a58000 C:\Windows\SYSTEM32\CRYPTSP.dll
35 ModLoad: 00007ffd`141e0000 00007ffd`14214000 C:\Windows\system32\rsaenh.dll
36 ModLoad: 00007ffd`152e0000 00007ffd`15307000 C:\Windows\System32\bcrypt.dll
37 ModLoad: 00007ffd`14a60000 00007ffd`14a6c000 C:\Windows\SYSTEM32\CRYPTBASE.dll
38 (3cf8.225c): CLR exception - code e0434352 (!!! second chance !!!)
39 KERNELBASE!RaiseException+0x69:
40 00007ffd`156d3e49 0f1f440000 nop dword ptr [rax+rax]
当然,我们直接运行程序,抛出的异常会更加直接。效果如图:
所以说,我们可以直接看程序抛出的异常,更能说明直接的问题,使用 Windebug 有点多此一举。再次强调一下:我的结果和视频的结果是不一样的,原因未知。
当然,虽然出错了,我们也可以看看当前的调用栈。
1 0:000> !clrstack
2 OS Thread Id: 0x225c (0)
3 Child SP IP Call Site
4 00000034903fe910 00007ffd156d3e49 [PrestubMethodFrame: 00000034903fe910] Example_16_1_2.Program.Alloc(System.String)
5 00000034903febd0 00007ffc9ca708d1 Example_16_1_2.Program.Main(System.String[]) [E:\Visual Studio 2022\...\Example_16_1_2\Program.cs @ 17]
6 00000034903fedf8 00007ffcfbfa6913 [GCFrame: 00000034903fedf8]
7
8 0:000> dp 00000034903fe910 l1
9 00000034`903fe910 00007ffc`fc7711c0
10 0:000> ln 00007ffc`fc7711c0
11 Browse module
12 Set bu breakpoint
13
14 (00007ffc`fc7711c0) clr!PrestubMethodFrame::`vftable' | (00007ffc`fc771260) clr!ExternalMethodFrame::`vftable'
15 Exact matches:
16
17 0:000> u 00007ffc`fc7711c0
18 clr!PrestubMethodFrame::`vftable':
19 00007ffc`fc7711c0 70b6 jo clr!FaultingExceptionFrame::`vftable'+0x50 (00007ffc`fc771178)
20 00007ffc`fc7711c2 0ffcfc paddb mm7,mm4
21 00007ffc`fc7711c5 7f00 jg clr!PrestubMethodFrame::`vftable'+0x7 (00007ffc`fc7711c7)
22 00007ffc`fc7711c7 004007 add byte ptr [rax+7],al
23 00007ffc`fc7711ca fb sti
24 00007ffc`fc7711cb fb sti
25 00007ffc`fc7711cc fc cld
26 00007ffc`fc7711cd 7f00 jg clr!PrestubMethodFrame::`vftable'+0xf (00007ffc`fc7711cf)
2.3、委托异步引发的崩溃。
调试源码:Example_16_1_4 和 Example_16_1_5(C++)
我们编译我们的两个项目,直接 ctrol+f5 运行 Example_16_1_4 项目,我们先看运行正常的情况,如果项正常运行,这个行代码【GC.Collect();】需要注释掉。运行结果如图:
这是正常的情况,接下来,我们取消对【GC.Collect();】这行代码的注释,就是可以执行垃圾回收。我们重新编译项目,ctrol+f5运行项目,执行效果如图:
在这里,我需要说明一下,我的演示结果和【一线码农】的视频演示的结果是不一样的,他的系统也崩溃了,提示的错误消息是【未经处理的异常:System.AccessviolationException:尝试读取或者写入受保护的内存,这通常指示其他内存已损坏】。这个问题我还没搞清楚,如果有知道的可以告诉我。
上面是运行程序出现的问题,接下来,我们使用 Windbg 查找一下问题。
我们编译项目 Example_16_1_4,打开 Windbg,点击【文件】----》【launch executable】附加程序,打开调试器的界面,程序已经处于中断状态。我本来想使用【bp Example_16_1_4!AsyncProcess】命令给【AsyncProcess】方法下断点,但是执行不成功。
1 0:000> bp Example_16_1_4!AsyncProcess
2 Couldn't resolve error at 'Example_16_1_4!AsyncProcess'
那我们就通过源码的方式直接给 C++ AsyncProcess 方法下断点。我们点击 Windbg 菜单栏,依次选择【Source】--->【Open Source File】,打开选择我们的 C++ 项目中的 Example_16_1_5.cpp 文件。效果如图:
断点设置完成后,我们直接执行【g】命令,继续运行调试器。效果如图:
我们继续执行【dv】命令,可以看到有一个 ptr,那就是我们从托管代码中传递到非托管代码中的委托,就是一个指针。
1 0:000> dv
2 ptr = 0x000001cc`459a090c
3 hThread = 0x00007ff8`5aa40f58
我们可以使用【u 1cc459a090c】命令,查看一下这个 ptr 是什么。
1 0:000> u 1cc459a090c
2 000001cc`459a090c 49bae0089a45cc010000 mov r10,1CC459A08E0h
3 000001cc`459a0916 48b8c021275af87f0000 mov rax,offset clr!UMThunkStub (00007ff8`5a2721c0)
4 000001cc`459a0920 48ffe0 jmp rax
5 000001cc`459a0923 0000 add byte ptr [rax],al
6 000001cc`459a0925 0000 add byte ptr [rax],al
7 000001cc`459a0927 00ababababab add byte ptr [rbx-54545455h],ch
8 000001cc`459a092d ab stos dword ptr [rdi]
9 000001cc`459a092e ab stos dword ptr [rdi]
我们在【PCallback callback = (PCallback)lpParameter;】这行代码在下一个断点,也就是2秒后会执行这个回调。效果如图:
断点设置成功后,我们继续执行调试器,使用【g】命令。
1 0:000> g
2 Breakpoint 1 hit
3 Example_16_1_5!ThreadWorkItem+0x3e:
4 00007fff`d444172e 488b8500010000 mov rax,qword ptr [rbp+100h] ss:0000000a`735ffb60=000001cc459a090c
我们继续执行,会在我们设置断点的地方成功断住。效果如图:
到了这里,我们在使用【u 1cc459a090c】命令,查看一下这个 ptr 是什么东西。
1 0:007> u 1cc459a090c
2 000001cc`459a090c ee out dx,al
3 000001cc`459a090d fe ???
4 000001cc`459a090e ee out dx,al
5 000001cc`459a090f fe ???
6 000001cc`459a0910 ee out dx,al
7 000001cc`459a0911 fe ???
8 000001cc`459a0912 ee out dx,al
9 000001cc`459a0913 fe ???
都是乱码了,都是 ??? 问号了,就是说 ptr 不存在了。说明已经被我们 GC 回收了。我们也可以使用【dv】命令查看一下变化。
1 0:007> dv
2 lpParameter = 0x000001cc`459a090c
3 callback = 0x00000000`00000000
callback 是空值了。
如果遇到这样的情况,我们怎么解决呢?其实很简单,在我们的 C# 代码中,声明一个静态的 handle 就可以了,如:static GCHandle handle;在我的代码中,注释的部分就是解决办法。
2.4、非托管内存泄露
调试源码:Example_16_1_6 和 Example_16_1_7(C++)项目
在C++ 项目中,如果我们声明了【数组】,是需要自己释放的,如果忘记释放,内存就会暴涨了。我们直接运行项目【Example_16_1_6】,看一下效果:
大家可以试试,内存涨得很快。
这次我们是通过 dump 文件进行分析的,生成 dump 文件有两种方式,第一种是通过【任务管理器】来生成的。第二种是通过【ProcessExplorer】工具来生成。
第一种: 我们首先运行我们的项目 Example_16_1_6.exe,然后,我们打开【任务管理器】,找到我们的项目进程,我的进程名是【Example_16_1_6】,如果左侧有箭头,点击打开折叠的内容,在项目地址名字上点击右键,选择保存【创建转出文件】,保存成功,会弹出提示框文件的位置,效果如下:
弹出保存数据对话框,保存对话框运行时间的长短是有你保存的数据多少决定的。如图:
这个保存的过程,和你的程序运行时间的长短有关系。保存成功,如图:
我们的 dump 文件如图:
第二种: 我们使用【ProcessExplorer】工具抓 dump 文件,个人感觉这个更好的,抓的文件更好用、更可靠。
首先运行我们的项目 Example_16_1_6.exe,然后打开【ProcessExplorer】工具,然后,在右侧的【Filter by name】过滤进程,输入我们的进程名称,比如:Example_16,不用输入全名,当然输入全名也可以。如图:
我们找到了我们的项目进程,在项目上点击右键,依次选择【Create Dump】----》【Create MiniDump】或者【Create Full Dump】,我选择的是【Create Full Dump】创建完整的 dump 文件,选择保存的文件路径就可以了。
在开始之前,我们需要做一些准备工作,否则,调试结果有些数据是看不到的,我第一次就是这样的,原来是漏了步骤了,切记,切记。我们必须打开【栈追踪】。我已经安装了 【Windows Kits】,如果没有安装的,就请去微软官网下载安装一下,毕竟 gflags.exe 包含在这个集合中。
** Windows Kits 官网下载地址:https://learn.microsoft.com/zh-cn/windows-hardware/drivers/download-the-wdk**
** 我的安装目录在:D:\Windows Kits\10\Debuggers ,大家根据自己的情况去查找。为了避免每次都进入安装目录,最好把 gflags.exe 的安装目录配置到【环境变量】里面,使用就方便了。针对我们的项目执行一下命令:gflags /i Example_16_1_6.exe +ust 。效果如图:**
有了 Dump 文件就容易了,我们就可以使用 Windbg 调试了。我们打开 Windbg,点击【文件】----》【Open dump file】打开我们的 Dump 文件,打开调试器的界面,程序已经处于中断状态。我们先看看托管堆的情况,执行命令【!heap -s】。
1 0:000> !heap -s
2
3
4 ************************************************************************************************************************
5 NT HEAP STATS BELOW
6 ************************************************************************************************************************
7 NtGlobalFlag enables following debugging aids for new heaps:
8 stack back traces(必须开启栈跟踪,否则后面的操作有些不能输出)
9 LFH Key : 0xb1c3e0529717db20
10 Termination on corruption : ENABLED
11 Heap Flags Reserv Commit Virt Free List UCR Virt Lock Fast
12 (k) (k) (k) (k) length blocks cont. heap
13 -------------------------------------------------------------------------------------
14 000001f3651e0000 08000002 3869212 3843092 3869108 58051 283 243 1 3 LFH
15 000001f363950000 08008000 64 4 64 2 1 1 0 0
16 000001f3655b0000 08001002 164 36 60 5 2 1 0 0 LFH
17 000001f365420000 08001002 164 36 60 4 2 1 0 0 LFH
18 000001f366df0000 08001002 60 8 60 2 1 1 0 0
19 000001f366f70000 08041002 60 8 60 5 1 1 0 0
20 000001f37f8b0000 08041002 60 8 60 2 1 1 0 0
21 -------------------------------------------------------------------------------------
我们使用【!heap -h 000001f3651e0000】命令查看一下句柄,发现内容太多了,我就不一一展示了。
1 0:000> !heap -h 000001f3651e0000
2 HEAPEXT: Unable to get address of ntdll!RtlpHeapInvalidBadAddress.
3 Index Address Name Debugging options enabled
4 1: 1f3651e0000
5 Segment at 000001f3651e0000 to 000001f3652df000 (000ff000 bytes committed)
6 Segment at 000001f37f300000 to 000001f37f3ff000 (000e7000 bytes committed)
7 Segment at 000001f37f8c0000 to 000001f37fabf000 (001d6000 bytes committed)
8 Segment at 000001f37fac0000 to 000001f37febf000 (003ee000 bytes committed)
9 Segment at 000001f300000000 to 000001f3007ff000 (007db000 bytes committed)
10 Segment at 000001f300800000 to 000001f3017cf000 (00fb5000 bytes committed)
11 Segment at 000001f3017d0000 to 000001f30279f000 (00fb5000 bytes committed)
12 Segment at 000001f3027a0000 to 000001f30376f000 (00fb5000 bytes committed)
13 Segment at 000001f303770000 to 000001f30473f000 (00fb5000 bytes committed)
14 Segment at 000001f304740000 to 000001f30570f000 (00fb5000 bytes committed)
15 Segment at 000001f305710000 to 000001f3066df000 (00fb5000 bytes committed)
16 Segment at 000001f3066e0000 to 000001f3076af000 (00fb5000 bytes committed)
17 Segment at 000001f3076b0000 to 000001f30867f000 (00fb5000 bytes committed)
18 Segment at 000001f308680000 to 000001f30964f000 (00fb5000 bytes committed)
19 Segment at 000001f309650000 to 000001f30a61f000 (00fb5000 bytes committed)
20 Segment at 000001f30a620000 to 000001f30b5ef000 (00fb5000 bytes committed)
21 Segment at 000001f30b5f0000 to 000001f30c5bf000 (00fb5000 bytes committed)
22 Segment at 000001f30c5c0000 to 000001f30d58f000 (00fb5000 bytes committed)
23 Segment at 000001f30d590000 to 000001f30e55f000 (00fb5000 bytes committed)
24 Segment at 000001f30e560000 to 000001f30f52f000 (00fb5000 bytes committed)
25 Segment at 000001f30f530000 to 000001f3104ff000 (00fb5000 bytes committed)
26 Segment at 000001f310500000 to 000001f3114cf000 (00fb5000 bytes committed)
27 Segment at 000001f3114d0000 to 000001f31249f000 (00fb5000 bytes committed)
28 Segment at 000001f3124a0000 to 000001f31346f000 (00fb5000 bytes committed)
29 Segment at 000001f313470000 to 000001f31443f000 (00fb5000 bytes committed)
30 Segment at 000001f314440000 to 000001f31540f000 (00fb5000 bytes committed)
31 Segment at 000001f315410000 to 000001f3163df000 (00fb5000 bytes committed)
32 Segment at 000001f3163e0000 to 000001f3173af000 (00fb5000 bytes committed)
33 Segment at 000001f3173b0000 to 000001f31837f000 (00fb5000 bytes committed)
34 Segment at 000001f318380000 to 000001f31934f000 (00fb5000 bytes committed)
35 Segment at 000001f319350000 to 000001f31a31f000 (00fb5000 bytes committed)
36 Segment at 000001f31a320000 to 000001f31b2ef000 (00fb5000 bytes committed)
37 Segment at 000001f31b2f0000 to 000001f31c2bf000 (00fb5000 bytes committed)
38 Segment at 000001f31c2c0000 to 000001f31d28f000 (00fb5000 bytes committed)
39 Segment at 000001f31d290000 to 000001f31e25f000 (00fb5000 bytes committed)
40 Segment at 000001f31e260000 to 000001f31f22f000 (00fb5000 bytes committed)
41 Segment at 000001f31f230000 to 000001f3201ff000 (00fb5000 bytes committed)
42 Segment at 000001f320200000 to 000001f3211cf000 (00fb5000 bytes committed)
43 Segment at 000001f3211d0000 to 000001f32219f000 (00fb5000 bytes committed)
44 Segment at 000001f3221a0000 to 000001f32316f000 (00fb5000 bytes committed)
45 Segment at 000001f323170000 to 000001f32413f000 (00fb5000 bytes committed)
46 Segment at 000001f324140000 to 000001f32510f000 (00fb5000 bytes committed)
47 Segment at 000001f325110000 to 000001f3260df000 (00fb5000 bytes committed)
48 Segment at 000001f3260e0000 to 000001f3270af000 (00fb5000 bytes committed)
49 Segment at 000001f3270b0000 to 000001f32807f000 (00fb5000 bytes committed)
50 Segment at 000001f328080000 to 000001f32904f000 (00fb5000 bytes committed)
51 Segment at 000001f329050000 to 000001f32a01f000 (00fb5000 bytes committed)
52 Segment at 000001f32a020000 to 000001f32afef000 (00fb5000 bytes committed)
53 Segment at 000001f32aff0000 to 000001f32bfbf000 (00fb5000 bytes committed)
54 Segment at 000001f32bfc0000 to 000001f32cf8f000 (00fb5000 bytes committed)
55 Segment at 000001f32cf90000 to 000001f32df5f000 (00fb5000 bytes committed)
56 Segment at 000001f32df60000 to 000001f32ef2f000 (00fb5000 bytes committed)
57 Segment at 000001f32ef30000 to 000001f32feff000 (00fb5000 bytes committed)
58 Segment at 000001f32ff00000 to 000001f330ecf000 (00fb5000 bytes committed)
59 Segment at 000001f330ed0000 to 000001f331e9f000 (00fb5000 bytes committed)
60 Segment at 000001f331ea0000 to 000001f332e6f000 (00fb5000 bytes committed)
61 Segment at 000001f332e70000 to 000001f333e3f000 (00fb5000 bytes committed)
62 Segment at 000001f333e40000 to 000001f334e0f000 (00fb5000 bytes committed)
63 Segment at 000001f334e10000 to 000001f335ddf000 (00fb5000 bytes committed)
64 Segment at 000001f335de0000 to 000001f336daf000 (00fb5000 bytes committed)
65 Segment at 000001f336db0000 to 000001f337d7f000 (00fb5000 bytes committed)
66 Segment at 000001f337d80000 to 000001f338d4f000 (00fb5000 bytes committed)
67 Segment at 000001f338d50000 to 000001f339d1f000 (00fb5000 bytes committed)
68 Segment at 000001f339d20000 to 000001f33acef000 (00fb5000 bytes committed)
69 Segment at 000001f33acf0000 to 000001f33bcbf000 (00fb5000 bytes committed)
70 Segment at 000001f33bcc0000 to 000001f33cc8f000 (00fb5000 bytes committed)
71 Segment at 000001f33cc90000 to 000001f33dc5f000 (00fb5000 bytes committed)
72 Segment at 000001f33dc60000 to 000001f33ec2f000 (00fb5000 bytes committed)
73 Segment at 000001f33ec30000 to 000001f33fbff000 (00fb5000 bytes committed)
74 Segment at 000001f33fc00000 to 000001f340bcf000 (00fb5000 bytes committed)
75 Segment at 000001f340bd0000 to 000001f341b9f000 (00fb5000 bytes committed)
76 Segment at 000001f341ba0000 to 000001f342b6f000 (00fb5000 bytes committed)
77 Segment at 000001f342b70000 to 000001f343b3f000 (00fb5000 bytes committed)
78 Segment at 000001f343b40000 to 000001f344b0f000 (00fb5000 bytes committed)
79 Segment at 000001f344b10000 to 000001f345adf000 (00fb5000 bytes committed)
80 Segment at 000001f345ae0000 to 000001f346aaf000 (00fb5000 bytes committed)
81 Segment at 000001f346ab0000 to 000001f347a7f000 (00fb5000 bytes committed)
82 Segment at 000001f347a80000 to 000001f348a4f000 (00fb5000 bytes committed)
83 Segment at 000001f348a50000 to 000001f349a1f000 (00fb5000 bytes committed)
84 Segment at 000001f349a20000 to 000001f34a9ef000 (00fb5000 bytes committed)
85 Segment at 000001f34a9f0000 to 000001f34b9bf000 (00fb5000 bytes committed)
86 Segment at 000001f34b9c0000 to 000001f34c98f000 (00fb5000 bytes committed)
87 Segment at 000001f34c990000 to 000001f34d95f000 (00fb5000 bytes committed)
88 Segment at 000001f34d960000 to 000001f34e92f000 (00fb5000 bytes committed)
89 Segment at 000001f34e930000 to 000001f34f8ff000 (00fb5000 bytes committed)
90 Segment at 000001f34f900000 to 000001f3508cf000 (00fb5000 bytes committed)
91 Segment at 000001f3508d0000 to 000001f35189f000 (00fb5000 bytes committed)
92 Segment at 000001f3518a0000 to 000001f35286f000 (00fb5000 bytes committed)
93 Segment at 000001f352870000 to 000001f35383f000 (00fb5000 bytes committed)
94 Segment at 000001f353840000 to 000001f35480f000 (00fb5000 bytes committed)
95 Segment at 000001f354810000 to 000001f3557df000 (00fb5000 bytes committed)
96 Segment at 000001f3557e0000 to 000001f3567af000 (00fb5000 bytes committed)
97 Segment at 000001f3567b0000 to 000001f35777f000 (00fb5000 bytes committed)
98 Segment at 000001f357780000 to 000001f35874f000 (00fb5000 bytes committed)
99 Segment at 000001f358750000 to 000001f35971f000 (00fb5000 bytes committed)
100 Segment at 000001f359720000 to 000001f35a6ef000 (00fb5000 bytes committed)
101 Segment at 000001f35a6f0000 to 000001f35b6bf000 (00fb5000 bytes committed)
102 Segment at 000001f35b6c0000 to 000001f35c68f000 (00fb5000 bytes committed)
103 Segment at 000001f35c690000 to 000001f35d65f000 (00fb5000 bytes committed)
104 Segment at 000001f35d660000 to 000001f35e62f000 (00fb5000 bytes committed)
105 Segment at 000001f35e630000 to 000001f35f5ff000 (00fb5000 bytes committed)
106 Segment at 000001f35f600000 to 000001f3605cf000 (00fb5000 bytes committed)
107 Segment at 000001f3605d0000 to 000001f36159f000 (00fb5000 bytes committed)
108 Segment at 000001f3615a0000 to 000001f36256f000 (00fb5000 bytes committed)
109 Segment at 000001f362570000 to 000001f36353f000 (00fb5000 bytes committed)
110 Segment at 000001f37fec0000 to 000001f380e8f000 (00fb5000 bytes committed)
111 Segment at 000001f380e90000 to 000001f381e5f000 (00fb5000 bytes committed)
112 Segment at 000001f381e60000 to 000001f382e2f000 (00fb5000 bytes committed)
113 Segment at 000001f382e30000 to 000001f383dff000 (00fb5000 bytes committed)
114 Segment at 000001f383e00000 to 000001f384dcf000 (00fb5000 bytes committed)
115 Segment at 000001f384dd0000 to 000001f385d9f000 (00fb5000 bytes committed)
116 Segment at 000001f385da0000 to 000001f386d6f000 (00fb5000 bytes committed)
117 Segment at 000001f386d70000 to 000001f387d3f000 (00fb5000 bytes committed)
118 Segment at 000001f387d40000 to 000001f388d0f000 (00fb5000 bytes committed)
119 Segment at 000001f388d10000 to 000001f389cdf000 (00fb5000 bytes committed)
120 Segment at 000001f389ce0000 to 000001f38acaf000 (00fb5000 bytes committed)
121 Segment at 000001f38acb0000 to 000001f38bc7f000 (00fb5000 bytes committed)
122 Segment at 000001f38bc80000 to 000001f38cc4f000 (00fb5000 bytes committed)
123 Segment at 000001f38cc50000 to 000001f38dc1f000 (00fb5000 bytes committed)
124 Segment at 000001f38dc20000 to 000001f38ebef000 (00fb5000 bytes committed)
125 Segment at 000001f38ebf0000 to 000001f38fbbf000 (00fb5000 bytes committed)
126 Segment at 000001f38fbc0000 to 000001f390b8f000 (00fb5000 bytes committed)
127 Segment at 000001f390b90000 to 000001f391b5f000 (00fb5000 bytes committed)
128 Segment at 000001f391b60000 to 000001f392b2f000 (00fb5000 bytes committed)
129 Segment at 000001f392b30000 to 000001f393aff000 (00fb5000 bytes committed)
130 Segment at 000001f393b00000 to 000001f394acf000 (00fb5000 bytes committed)
131 Segment at 000001f394ad0000 to 000001f395a9f000 (00fb5000 bytes committed)
132 Segment at 000001f395aa0000 to 000001f396a6f000 (00fb5000 bytes committed)
133 Segment at 000001f396a70000 to 000001f397a3f000 (00fb5000 bytes committed)
134 Segment at 000001f397a40000 to 000001f398a0f000 (00fb5000 bytes committed)
135 Segment at 000001f398a10000 to 000001f3999df000 (00fb5000 bytes committed)
136 Segment at 000001f3999e0000 to 000001f39a9af000 (00fb5000 bytes committed)
137 Segment at 000001f39a9b0000 to 000001f39b97f000 (00fb5000 bytes committed)
138 Segment at 000001f39b980000 to 000001f39c94f000 (00fb5000 bytes committed)
139 Segment at 000001f39c950000 to 000001f39d91f000 (00fb5000 bytes committed)
140 Segment at 000001f39d920000 to 000001f39e8ef000 (00fb5000 bytes committed)
141 Segment at 000001f39e8f0000 to 000001f39f8bf000 (00fb5000 bytes committed)
142 Segment at 000001f39f8c0000 to 000001f3a088f000 (00fb5000 bytes committed)
143 Segment at 000001f3a0890000 to 000001f3a185f000 (00fb5000 bytes committed)
144 Segment at 000001f3a1860000 to 000001f3a282f000 (00fb5000 bytes committed)
145 Segment at 000001f3a2830000 to 000001f3a37ff000 (00fb5000 bytes committed)
146 Segment at 000001f3a3800000 to 000001f3a47cf000 (00fb5000 bytes committed)
147 Segment at 000001f3a47d0000 to 000001f3a579f000 (00fb5000 bytes committed)
148 Segment at 000001f3a57a0000 to 000001f3a676f000 (00fb5000 bytes committed)
149 Segment at 000001f3a6770000 to 000001f3a773f000 (00fb5000 bytes committed)
150 Segment at 000001f3a7740000 to 000001f3a870f000 (00fb5000 bytes committed)
151 Segment at 000001f3a8710000 to 000001f3a96df000 (00fb5000 bytes committed)
152 Segment at 000001f3a96e0000 to 000001f3aa6af000 (00fb5000 bytes committed)
153 Segment at 000001f3aa6b0000 to 000001f3ab67f000 (00fb5000 bytes committed)
154 Segment at 000001f3ab680000 to 000001f3ac64f000 (00fb5000 bytes committed)
155 Segment at 000001f3ac650000 to 000001f3ad61f000 (00fb5000 bytes committed)
156 Segment at 000001f3ad620000 to 000001f3ae5ef000 (00fb5000 bytes committed)
157 Segment at 000001f3ae5f0000 to 000001f3af5bf000 (00fb5000 bytes committed)
158 Segment at 000001f3af5c0000 to 000001f3b058f000 (00fb5000 bytes committed)
159 Segment at 000001f3b0590000 to 000001f3b155f000 (00fb5000 bytes committed)
160 Segment at 000001f3b1560000 to 000001f3b252f000 (00fb5000 bytes committed)
161 Segment at 000001f3b2530000 to 000001f3b34ff000 (00fb5000 bytes committed)
162 Segment at 000001f3b3500000 to 000001f3b44cf000 (00fb5000 bytes committed)
163 Segment at 000001f3b44d0000 to 000001f3b549f000 (00fb5000 bytes committed)
164 Segment at 000001f3b54a0000 to 000001f3b646f000 (00fb5000 bytes committed)
165 Segment at 000001f3b6470000 to 000001f3b743f000 (00fb5000 bytes committed)
166 Segment at 000001f3b7440000 to 000001f3b840f000 (00fb5000 bytes committed)
167 Segment at 000001f3b8410000 to 000001f3b93df000 (00fb5000 bytes committed)
168 Segment at 000001f3b93e0000 to 000001f3ba3af000 (00fb5000 bytes committed)
169 Segment at 000001f3ba3b0000 to 000001f3bb37f000 (00fb5000 bytes committed)
170 Segment at 000001f3bb380000 to 000001f3bc34f000 (00fb5000 bytes committed)
171 Segment at 000001f3bc350000 to 000001f3bd31f000 (00fb5000 bytes committed)
172 Segment at 000001f3bd320000 to 000001f3be2ef000 (00fb5000 bytes committed)
173 Segment at 000001f3be2f0000 to 000001f3bf2bf000 (00fb5000 bytes committed)
174 Segment at 000001f3bf2c0000 to 000001f3c028f000 (00fb5000 bytes committed)
175 Segment at 000001f3c0290000 to 000001f3c125f000 (00fb5000 bytes committed)
176 Segment at 000001f3c1260000 to 000001f3c222f000 (00fb5000 bytes committed)
177 Segment at 000001f3c2230000 to 000001f3c31ff000 (00fb5000 bytes committed)
178 Segment at 000001f3c3200000 to 000001f3c41cf000 (00fb5000 bytes committed)
179 Segment at 000001f3c41d0000 to 000001f3c519f000 (00fb5000 bytes committed)
180 Segment at 000001f3c51a0000 to 000001f3c616f000 (00fb5000 bytes committed)
181 Segment at 000001f3c6170000 to 000001f3c713f000 (00fb5000 bytes committed)
182 Segment at 000001f3c7140000 to 000001f3c810f000 (00fb5000 bytes committed)
183 Segment at 000001f3c8110000 to 000001f3c90df000 (00fb5000 bytes committed)
184 Segment at 000001f3c90e0000 to 000001f3ca0af000 (00fb5000 bytes committed)
185 Segment at 000001f3ca0b0000 to 000001f3cb07f000 (00fb5000 bytes committed)
186 Segment at 000001f3cb080000 to 000001f3cc04f000 (00fb5000 bytes committed)
187 Segment at 000001f3cc050000 to 000001f3cd01f000 (00fb5000 bytes committed)
188 Segment at 000001f3cd020000 to 000001f3cdfef000 (00fb5000 bytes committed)
189 Segment at 000001f3cdff0000 to 000001f3cefbf000 (00fb5000 bytes committed)
190 Segment at 000001f3cefc0000 to 000001f3cff8f000 (00fb5000 bytes committed)
191 Segment at 000001f3cff90000 to 000001f3d0f5f000 (00fb5000 bytes committed)
192 Segment at 000001f3d0f60000 to 000001f3d1f2f000 (00fb5000 bytes committed)
193 Segment at 000001f3d1f30000 to 000001f3d2eff000 (00fb5000 bytes committed)
194 Segment at 000001f3d2f00000 to 000001f3d3ecf000 (00fb5000 bytes committed)
195 Segment at 000001f3d3ed0000 to 000001f3d4e9f000 (00fb5000 bytes committed)
196 Segment at 000001f3d4ea0000 to 000001f3d5e6f000 (00fb5000 bytes committed)
197 Segment at 000001f3d5e70000 to 000001f3d6e3f000 (00fb5000 bytes committed)
198 Segment at 000001f3d6e40000 to 000001f3d7e0f000 (00fb5000 bytes committed)
199 Segment at 000001f3d7e10000 to 000001f3d8ddf000 (00fb5000 bytes committed)
200 Segment at 000001f3d8de0000 to 000001f3d9daf000 (00fb5000 bytes committed)
201 Segment at 000001f3d9db0000 to 000001f3dad7f000 (00fb5000 bytes committed)
202 Segment at 000001f3dad80000 to 000001f3dbd4f000 (00fb5000 bytes committed)
203 Segment at 000001f3dbd50000 to 000001f3dcd1f000 (00fb5000 bytes committed)
204 Segment at 000001f3dcd20000 to 000001f3ddcef000 (00fb5000 bytes committed)
205 Segment at 000001f3ddcf0000 to 000001f3decbf000 (00fb5000 bytes committed)
206 Segment at 000001f3decc0000 to 000001f3dfc8f000 (00fb5000 bytes committed)
207 Segment at 000001f3dfc90000 to 000001f3e0c5f000 (00fb5000 bytes committed)
208 Segment at 000001f3e0c60000 to 000001f3e1c2f000 (00fb5000 bytes committed)
209 Segment at 000001f3e1c30000 to 000001f3e2bff000 (00fb5000 bytes committed)
210 Segment at 000001f3e2c00000 to 000001f3e3bcf000 (00fb5000 bytes committed)
211 Segment at 000001f3e3bd0000 to 000001f3e4b9f000 (00fb5000 bytes committed)
212 Segment at 000001f3e4ba0000 to 000001f3e5b6f000 (00fb5000 bytes committed)
213 Segment at 000001f3e5b70000 to 000001f3e6b3f000 (00fb5000 bytes committed)
214 Segment at 000001f3e6b40000 to 000001f3e7b0f000 (00fb5000 bytes committed)
215 Segment at 000001f3e7b10000 to 000001f3e8adf000 (00fb5000 bytes committed)
216 Segment at 000001f3e8ae0000 to 000001f3e9aaf000 (00fb5000 bytes committed)
217 Segment at 000001f3e9ab0000 to 000001f3eaa7f000 (00fb5000 bytes committed)
218 Segment at 000001f3eaa80000 to 000001f3eba4f000 (00fb5000 bytes committed)
219 Segment at 000001f3eba50000 to 000001f3eca1f000 (00fb5000 bytes committed)
220 Segment at 000001f3eca20000 to 000001f3ed9ef000 (00fb5000 bytes committed)
221 Segment at 000001f3ed9f0000 to 000001f3ee9bf000 (00fb5000 bytes committed)
222 Segment at 000001f3ee9c0000 to 000001f3ef98f000 (00fb5000 bytes committed)
223 Segment at 000001f3ef990000 to 000001f3f095f000 (00fb5000 bytes committed)
224 Segment at 000001f3f0960000 to 000001f3f192f000 (00fb5000 bytes committed)
225 Segment at 000001f3f1930000 to 000001f3f28ff000 (00fb5000 bytes committed)
226 Segment at 000001f3f2900000 to 000001f3f38cf000 (00fb5000 bytes committed)
227 Segment at 000001f3f38d0000 to 000001f3f489f000 (00fb5000 bytes committed)
228 Segment at 000001f3f48a0000 to 000001f3f586f000 (00fb5000 bytes committed)
229 Segment at 000001f3f5870000 to 000001f3f683f000 (00fb5000 bytes committed)
230 Segment at 000001f3f6840000 to 000001f3f780f000 (00fb5000 bytes committed)
231 Segment at 000001f3f7810000 to 000001f3f87df000 (00fb5000 bytes committed)
232 Segment at 000001f3f87e0000 to 000001f3f97af000 (00fb5000 bytes committed)
233 Segment at 000001f3f97b0000 to 000001f3fa77f000 (00fb5000 bytes committed)
234 Segment at 000001f3fa780000 to 000001f3fb74f000 (00fb5000 bytes committed)
235 Segment at 000001f3fb750000 to 000001f3fc71f000 (00fb5000 bytes committed)
236 Segment at 000001f3fc720000 to 000001f3fd6ef000 (00fb5000 bytes committed)
237 Segment at 000001f3fd6f0000 to 000001f3fe6bf000 (00fb5000 bytes committed)
238 Segment at 000001f3fe6c0000 to 000001f3ff68f000 (00fb5000 bytes committed)
239 Segment at 000001f3ff690000 to 000001f40065f000 (00fb5000 bytes committed)
240 Segment at 000001f400660000 to 000001f40162f000 (00fb5000 bytes committed)
241 Segment at 000001f401630000 to 000001f4025ff000 (00fb5000 bytes committed)
242 Segment at 000001f402600000 to 000001f4035cf000 (00fb5000 bytes committed)
243 Segment at 000001f4035d0000 to 000001f40459f000 (00fb5000 bytes committed)
244 Segment at 000001f4045a0000 to 000001f40556f000 (00fb5000 bytes committed)
245 Segment at 000001f405570000 to 000001f40653f000 (00fb5000 bytes committed)
246 Segment at 000001f406540000 to 000001f40750f000 (00fb5000 bytes committed)
247 Segment at 000001f407510000 to 000001f4084df000 (00eec000 bytes committed)
248 Flags: 08000002
249 ForceFlags: 00000000
250 Granularity: 16 bytes
251 Segment Reserve: ec360000
252 Segment Commit: 00002000
253 DeCommit Block Thres: 00000400
254 DeCommit Total Thres: 00001000
255 Total Free Size: 0038b0df
256 Max. Allocation Size: 00007ffffffdefff
257 Lock Variable at: 000001f3651e02c0
258 Next TagIndex: 0000
259 Maximum TagIndex: 0000
260 Tag Entries: 00000000
261 PsuedoTag Entries: 00000000
262 Virtual Alloc List: 1f3651e0110
263 000001f366e09000: 00100000 [commited 101000, unused 1000] - busy (b)
264 Uncommitted ranges: 1f3651e00f0
265 FreeList[ 00 ] at 000001f3651e0150: 000001f301778010 . 000001f37f33fe80 (283 blocks)
266
267 Heap entries for Segment00 in Heap 000001f3651e0000
268 address: psize . size flags state (requested size)
269 000001f3651e0000: 00000 . 00740 [101] - busy (73f)
270 000001f3651e0740: 00740 . 00080 [101] - busy (50)
271 000001f3651e07c0: 00080 . 00060 [101] - busy (30)
272 000001f3651e0820: 00060 . 00030 [101] - busy (4)
273 000001f3651e0850: 00030 . 00130 [101] - busy (100)
274 000001f3651e0980: 00130 . 00200 [101] - busy (1d8)
275 000001f3651e0b80: 00200 . 00200 [101] - busy (1d8)
276 000001f3651e0d80: 00200 . 00070 [101] - busy (48)
277 000001f3651e0df0: 00070 . 00030 [101] - busy (4)
278 000001f3651e0e20: 00030 . 00040 [101] - busy (10)
279 000001f3651e0e60: 00040 . 00130 [101] - busy (100)
280 000001f3651e0f90: 00130 . 00130 [101] - busy (100)
281 000001f3651e10c0: 00130 . 01510 [101] - busy (14e8)
282 000001f3651e25d0: 01510 . 00950 [101] - busy (91c)
283 000001f3651e2f20: 00950 . 00070 [101] - busy (3c)
284 000001f3651e2f90: 00070 . 00060 [101] - busy (30)
285 000001f3651e2ff0: 00060 . 00090 [101] - busy (62)
286 000001f3651e3080: 00090 . 00150 [101] - busy (120)
287 000001f3651e31d0: 00150 . 00080 [101] - busy (50)
288 000001f3651e3250: 00080 . 00150 [101] - busy (120)
289 000001f3651e33a0: 00150 . 00080 [101] - busy (50)
290 000001f3651e3420: 00080 . 00260 [101] - busy (238)
291 000001f3651e3680: 00260 . 00060 [101] - busy (30)
292 000001f3651e36e0: 00060 . 00090 [101] - busy (68)
293 000001f3651e3770: 00090 . 00040 [101] - busy (10)
294 000001f3651e37b0: 00040 . 00150 [101] - busy (120)
295 000001f3651e3900: 00150 . 00080 [101] - busy (50)
296 000001f3651e3980: 00080 . 00070 [101] - busy (40)
297 000001f3651e39f0: 00070 . 00030 [101] - busy (8)
298 000001f3651e3a20: 00030 . 00050 [101] - busy (20)
299 000001f3651e3a70: 00050 . 00080 [101] - busy (50)
300 000001f3651e3af0: 00080 . 00090 [101] - busy (68)
301 000001f3651e3b80: 00090 . 00150 [101] - busy (120)
302 000001f3651e3cd0: 00150 . 00080 [101] - busy (50)
303 000001f3651e3d50: 00080 . 00070 [101] - busy (42)
304 000001f3651e3dc0: 00070 . 00130 [101] - busy (100)
305 000001f3651e3ef0: 00130 . 00130 [101] - busy (100)
306 000001f3651e4020: 00130 . 00060 [101] - busy (30)
307 000001f3651e4080: 00060 . 00070 [101] - busy (30)
308 000001f3651e40f0: 00070 . 00050 [101] - busy (20)
309 000001f3651e4140: 00050 . 00070 [101] - busy (42)
310 000001f3651e41b0: 00070 . 000a0 [101] - busy (75)
311 000001f3651e4250: 000a0 . 00150 [101] - busy (120)
312 000001f3651e43a0: 00150 . 00080 [101] - busy (50)
313 000001f3651e4420: 00080 . 00070 [101] - busy (46)
314 000001f3651e4490: 00070 . 00430 [101] - busy (400)
315 000001f3651e48c0: 00430 . 00430 [101] - busy (400)
316 000001f3651e4cf0: 00430 . 00130 [101] - busy (100)
317 000001f3651e4e20: 00130 . 00130 [101] - busy (100)
318 000001f3651e4f50: 00130 . 00060 [101] - busy (30)
319 000001f3651e4fb0: 00060 . 00060 [101] - busy (30)
320 000001f3651e5010: 00060 . 00060 [101] - busy (30)
321 000001f3651e5070: 00060 . 00060 [101] - busy (30)
322 000001f3651e50d0: 00060 . 00060 [101] - busy (30)
323 000001f3651e5130: 00060 . 00060 [101] - busy (30)
324 000001f3651e5190: 00060 . 00060 [101] - busy (30)
325 000001f3651e51f0: 00060 . 00060 [101] - busy (30)
326 000001f3651e5250: 00060 . 00060 [101] - busy (30)
327 000001f3651e52b0: 00060 . 00060 [101] - busy (30)
328 000001f3651e5310: 00060 . 00060 [101] - busy (30)
329 000001f3651e5370: 00060 . 00060 [101] - busy (30)
330 000001f3651e53d0: 00060 . 00060 [101] - busy (30)
331 000001f3651e5430: 00060 . 00810 [101] - busy (80f) Internal
332 000001f3651e5c40: 00810 . 01cb0 [101] - busy (1caf) Internal
333 000001f3651e78f0: 01cb0 . 00130 [101] - busy (108)
334 000001f3651e7a20: 00130 . 000b0 [101] - busy (88)
335 000001f3651e7ad0: 000b0 . 00830 [101] - busy (800) Internal
336 000001f3651e8300: 00830 . 00420 [101] - busy (3f0) Internal
337 000001f3651e8720: 00420 . 00050 [101] - busy (20)
338 000001f3651e8770: 00050 . 00120 [101] - busy (f0)
339 000001f3651e8890: 00120 . 00050 [101] - busy (1a)
340 000001f3651e88e0: 00050 . 00200 [101] - busy (1d8)
341 000001f3651e8ae0: 00200 . 00070 [101] - busy (48)
342 000001f3651e8b50: 00070 . 00120 [101] - busy (f0)
我们继续执行【!heap -x 0000022b076de000】看看,
1 0000022b0769c010: 42010 . 41ff0 [101] - busy (41fe0) Internal
2 0000022b076de000: 41ff0 . 00400 [101] - busy (3f0) Internal (我选的这个地址)
3 0000022b076de400: 00400 . 41c00 [101] - busy (41bf0) Internal
4 0000022b07720000: 41c00 . 10fc0 [100]
5 0000022b07730fc0: 10fc0 . 00040 [111] - busy (3d)
6 0000022b07731000: 00b9e000 - uncommitted bytes.
7 0:000> !heap -x 0000022b076de000(这个地址我是随便选的)
8 Entry User Heap Segment Size PrevSize Unused Flags
9 -------------------------------------------------------------------------------------------------------------
10 0000022b076de000 0000022b076de010 0000022a779a0000 0000022b07300000 400 41ff0 10 busy internal
说明,这里必须使用【gflags】注册跟踪数据库,否则这里是没有输出的,第一次,可把我搞蒙了。
我测试到这里,没有测试到我需要的结果,不知道原因为什么,和【一线码农】视频有差距。当我执行【!heap -x】 命令,没有得到我想要的结果,所以后面执行【!heap -p -a】命令就没有办法执行了。
四、总结
终于写完了,这个系列也终于写完了,我说的这个系列是基于视频的这个系列,因为我打算基于《Net 高级调试》这个本书,再出一个系列。底层的东西,一次肯定是理解不透的,需要深入、多次的操作和调试。学习过程真的没那么轻松,还好是自己比较喜欢这一行,否则真不知道自己能不能坚持下来。准备收拾心情,重新在写一个系列,完全是基于书本的,把每个章节都写出来,调试一下,感受一下,肯定收货更多。好了,不说了,不忘初心,继续努力,希望老天不要辜负努力的人。