会隐藏呼叫堆叠上框架指标的建立。
不会散布呼叫堆叠。
呼叫堆叠视窗来检视目前堆叠上的函式或程序呼叫。
Call stack window, you can view the function or procedure calls that are currently on the stack.
呼叫堆叠视窗就无法显示该部分呼叫堆叠的正确资讯。
Call stack window might not be able to display correct information for that part of the call stack.
取得在掷回目前例外状况时,呼叫堆叠上框架的字串表示。
Gets a string representation of the frames on the call stack at the time the current exception was thrown.
程序码剖析工具会针对呼叫堆叠上所有其他函式递增内含样本计数。
The profiler increments the inclusive sample count of all other functions on the call stack.
将指定的委派伫列排入执行绪集区,但不会将呼叫堆叠散布到背景工作执行绪。
Queues the specified delegate to the thread pool, but does not propagate the calling stack to the worker thread.
与呼叫堆叠(由侦错工具显示)不同,“呼叫阶层架构”可以在设计阶段使用。
Call Hierarchy is available at design time, unlike the call stack that is displayed by the debugger.
这个需求会使执行阶段从组件E开始,检查呼叫堆叠中所有呼叫端的使用权限。
This demand causes the runtime to check the permissions of all callers in the call stack, starting with assembly E.
堆叠查核行程要求呼叫堆叠中的所有程式码都必须具有存取受保护资源的使用权限。
The stack walk requires that all code in the call stack has permission to access a protected resource.
呼叫堆叠]视窗会显示每一个函式的名称,以及撰写函式时所使用的程式设计语言。
TheCall Stack window displays the name of each function and the programming language that it is written in.
产生的资料会提供计数,表示在取样处理序时,有问题的函式位于呼叫堆叠顶端的频率。
The resulting data provides a count of how frequently the function in question was on top of the call stack when the process was sampled.
通常,呼叫堆叠表示为向下成长,以致呼叫堆叠较高层的方法可以呼叫在呼叫堆叠较低层的方法。
The call stack is typically represented as growing down, so that methods higher in the call stack call methods lower in the call stack.
例如,使用权限集上的要求会检查,是否所有呼叫堆叠中的呼叫端在使用权限集中有必要的使用权限。
For example, a demand on a permission set checks that all callers on the call stack have the necessary permissions in the permission set.
例如,呼叫堆叠中的方法可以使用一组具名为P SET1的使用权限拒绝它所有的呼叫端,如此一来,只要对这些呼叫端要求任何属于pset1一部分的使用权限都会失败。
For example, a method on the call stack might deny all of its callers a set of permissions named PSET1, such that any demand for a permission that is part of PSET1 fails for those callers.
这种想法是相当直接的︰在某处汇入一些攻击程式码(例如,呼叫shell 的程式码)并以将控制传递给攻击程式码的方式来覆写堆叠。
The idea is pretty straightforward: Insert some attack code (for example, code that invokes a shell) somewhere and overwrite the stack in such a way that control gets passed to the attack code.
在堆叠上宣告的变数会位于紧邻在函式之呼叫端返回位址的位置。
Variables declared on the stack are located next to the return address for the function's caller.
如果不是,则会将呼叫向下委派到堆叠中的下一层。
If not, it delegates the call down to the next layer in the stack.
被呼叫的方法一定是位于堆叠中的较高层。
需求将在您的程序码被呼叫时叫用堆叠查核行程,在堆叠上检查直接或间接呼叫程序码的所有呼叫端。
Demands invoke a stack walk, in which all callers that directly or indirectly call your code are checked on the stack when your code is called.
它们是用来停止堆叠查核行程,并限制已拥有特定使用权限的呼叫端存取。
They are used to stop stack walks and limit the access of callers who have already been granted certain permissions.
储存目前堆叠框架之呼叫端的参考。
Stores a reference to the caller of the current stack frame.
储存目前堆叠框架之呼叫端的参考。
Stores a reference to the caller of the current stack frame.
应用推荐