3

在 Windows 调试器中,我试图打印出传递给 ac 函数的数据。我对传递给 System_Data_SQLite!sqlite3_step+0x63 的数据感兴趣。

0:071> kv 20
Child-SP          RetAddr           : Args to Child                                                           : Call Site
00000000`11b82e28 00000642`ff864776 : 00000000`12f6f450 00000000`0092dcd8 00000000`11b83488 00000000`11b83480 : ntdll!NtGetContextThread+0xa
00000000`11b82e30 00000000`12f6f450 : 00000000`0092dcd8 00000000`11b83488 00000000`11b83480 00000000`11b83470 : <Unloaded_mscordacwks.dll>+0x154776
00000000`11b82e38 00000000`0092dcd8 : 00000000`11b83488 00000000`11b83480 00000000`11b83470 00000000`77ee2ae9 : 0x12f6f450
00000000`11b82e40 00000000`11b83488 : 00000000`11b83480 00000000`11b83470 00000000`77ee2ae9 00000000`12c1a970 : 0x92dcd8
00000000`11b82e48 00000000`11b83480 : 00000000`11b83470 00000000`77ee2ae9 00000000`12c1a970 00000000`ffffffff : 0x11b83488
00000000`11b82e50 00000000`11b83470 : 00000000`77ee2ae9 00000000`12c1a970 00000000`ffffffff 00000000`00920be8 : 0x11b83480
00000000`11b82e58 00000000`77ee2ae9 : 00000000`12c1a970 00000000`ffffffff 00000000`00920be8 00000000`00000000 : 0x11b83470
00000000`11b82e60 00000000`77ecff89 : 00000000`00920000 00000000`00920090 00000000`00920090 00000642`ff710000 : ntdll!RtlDeleteCriticalSection+0x11c
00000000`11b82e90 00000000`77d53f8a : 00000000`1279ba00 00000000`13129d30 00000000`00000000 00000000`00000000 : ntdll!RtlDestroyHeap+0x2b1
00000000`11b82f00 00000000`77ef7708 : 00000642`ff89b080 00000000`000000b0 00000000`1279ba0d 00000000`00000000 : kernel32!HeapDestroy+0xa
00000000`11b82f30 00000000`1279ba58 : 00000000`1279ba0f 00000642`ff710000 00000642`001bd000 00000000`00000001 : ntdll!LdrLockLoaderLock+0x15f
00000000`11b82f90 00000000`1279ba0f : 00000642`ff710000 00000642`001bd000 00000000`00000001 00000000`11b83488 : 0x1279ba58
00000000`11b82f98 00000642`ff710000 : 00000642`001bd000 00000000`00000001 00000000`11b83488 00000000`11b83480 : 0x1279ba0f
00000000`11b82fa0 00000642`001bd000 : 00000000`00000001 00000000`11b83488 00000000`11b83480 00000000`11b83470 : <Unloaded_mscordacwks.dll>
00000000`11b82fa8 00000000`00000001 : 00000000`11b83488 00000000`11b83480 00000000`11b83470 00000000`77eee1e5 : 0x642`001bd000
00000000`11b82fb0 00000000`11b83488 : 00000000`11b83480 00000000`11b83470 00000000`77eee1e5 00000000`1279ba10 : 0x1
00000000`11b82fb8 00000000`11b83480 : 00000000`11b83470 00000000`77eee1e5 00000000`1279ba10 00000000`11b83028 : 0x11b83488
00000000`11b82fc0 00000000`11b83470 : 00000000`77eee1e5 00000000`1279ba10 00000000`11b83028 00000000`00000000 : 0x11b83480
00000000`11b82fc8 00000000`77eee1e5 : 00000000`1279ba10 00000000`11b83028 00000000`00000000 00000000`11b83478 : 0x11b83470
00000000`11b82fd0 00000000`77d6d721 : 00000642`ff710000 00000000`03651690 00000000`11b834a0 00000642`ff710000 : ntdll!LdrUnloadDll+0x8ad
00000000`11b83150 000007ff`7252f5f3 : 00000000`03651690 00000000`03651690 00000000`03651690 00000642`ff710000 : kernel32!FreeLibrary+0x6b
00000000`11b83180 000007ff`7252cf60 : 00000000`11b83da0 00000642`82e30018 00000000`00002900 00000000`00000000 : dbghelp!NtWin32LiveSystemProvider::EnumFunctionTables+0x223
00000000`11b83430 000007ff`7252a6c9 : 00000000`123d8660 ffffffff`ffffffff 00000000`00000002 ffffffff`ffffffff : dbghelp!GenGetProcessInfo+0x860
00000000`11b83d30 000007ff`7252a89c : 00000000`00000002 00000001`5fff1fe0 00000000`00000000 00000000`0364f3b0 : dbghelp!MiniDumpProvideDump+0x639
00000000`11b83f30 00000000`0bd73939 : 00000000`11b84050 00000000`00000200 00000000`00000000 00000000`0c040be0 : dbghelp!MiniDumpWriteDump+0x13c
00000000`11b84000 00000000`0bd81e59 : 00000000`00000002 00000000`11b854f0 00000000`11b8b52c 00000000`0bdd0110 : System_Data_SQLite!CreateMinidumpHook+0x119 [c:\dev\sqlite\sqlite.interop\src\win\interop.c @ 117]
00000000`11b84490 00000000`0bd75483 : 00000000`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_SQLite!_VCrtDbgReportW+0x7a9 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c @ 589]
00000000`11b8c590 00000000`0bd7541d : 00000642`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_SQLite!_CrtDbgReportWV+0x43 [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c @ 242]
00000000`11b8c5d0 00000000`0bc85b12 : 00000000`00000002 00000000`0be029f0 00000000`000048b1 00000000`00000000 : System_Data_SQLite!_CrtDbgReportW+0x4d [f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c @ 258]
00000000`11b8c620 00000000`0bc8515c : 00000000`2cc67ca0 00000642`7f4ce081 00000000`00000000 00000000`00000000 : System_Data_SQLite!winMutexEnter+0xa2 [c:\dev\sqlite\sqlite.interop\src\core\sqlite3.c @ 18609]
00000000`11b8c670 00000000`0bcb3203 : 00000000`2cc67ca0 00000642`7f4ce0e4 00000000`00000000 00000000`00000000 : System_Data_SQLite!sqlite3_mutex_enter+0x1c [c:\dev\sqlite\sqlite.interop\src\core\sqlite3.c @ 17474]
00000000`11b8c6a0 00000642`7f6005f7 : 00000001`c14e4100 00000000`a4cc7610 00000001`c61d3750 00000642`782ea561 : System_Data_SQLite!sqlite3_step+0x63 [c:\dev\sqlite\sqlite.interop\src\core\sqlite3.c @ 64122]
4

1 回答 1

5

您可以输入:

kP

这将为每个格式化的调用转储参数

或者

dt System_Data_SQLite!<type> // replace <type> with whatever you are interested in

有关更多信息,请参见:http: //blogs.msdn.com/b/doronh/archive/2006/03/22/558329.aspx和此处:http://windbg.info/doc/1-common-cmds。 html#17_variables

于 2012-07-13T17:10:23.187 回答