当服务器报告一个意外的异常时,您可以检查关联堆栈跟踪的类和方法,来确定哪个应用程序导致了异常或者与异常有关。
When the server reports an unexpected exception, you can examine the classes and methods of the associated stack trace to determine which application caused, or was involved in, the exception.
当在一个断点停止时,您还可以检查执行堆栈。
While stopped at a breakpoint, you can also inspect the execution stack.
您可能会奇怪为什么在开始参数大小计算时要检查方法是否是静态的,如果是静态的,将堆栈帧槽初始化为零(不是静态正好相反)。
You might wonder why I check whether the method is static at the start of my parameter size calculation, then initialize the stack frame slot to zero if it is (as opposed to one if it is not).
现在,您没有检查正在处理的内容的有效性,而是将256个字节复制到了仅为128个字节的保留堆栈空间内。
Now, without checking the validity of what you're doing, you copy 256 bytes into a stack area reserved at only 128 bytes.
例如,每当遇到断点时,您可能希望能同时检查某个特殊变量、检查某些寄存器的内容并转储堆栈。
For example, whenever you hit a breakpoint, you might wish to simultaneously check a particular variable, check the contents of some registers, and dump the stack.
ConsoleAPI内其他有用的特性还有堆栈跟踪、对象检查和字符串格式化。
Other useful features in the Console API are stack traces, object inspection, and string formatting.
修复这个错误的方法是检查造成ExceptionInInitializerError的异常(在堆栈跟踪的Causedby:下显示)并寻找阻止抛出这个异常的方式。
The way to fix it is to examine the exception that caused the ExceptionInInitializerError (shown in the stack trace under caused by:) and find a way to stop this exception from being thrown.
第i i种情况:应当只用与用户身份相关联的服务器端调用堆栈protectiondomain进行权限检查。
Case II: Only the server-side call stack ProtectionDomains that have been associated with the user identity should be used for the permission check.
mwarn-framesize=framesize和 -mwarn-dynamicstack:这些选项会引起在编译时检查函数是否超过给定的堆栈帧(stack frame)大小或使用动态调整的堆栈帧。
mwarn-framesize=framesize and -mwarn-dynamicstack: These options cause a compile-time check whether a function exceeds a given stack frame size or uses dynamically sized stack frames.
第一,将实例从堆栈弹出后,Dispose方法将检查堆栈中是否还存在任何剩余的实例。
First, after popping an instance from the stack, the Dispose method checks to see whether there are any remaining instances on the stack.
您还需要仔细检查错误日志以了解“泄密”消息和堆栈跟踪。
You'll also want to examine the error log closely for tell-tale messages and stack traces.
如果在许多地方调用了一个函数,可以使用堆栈跟踪检查调用序列。
If a function is called from many places, use the stack backtrace to determine the specific calling sequence.
当所进行的操作仅执行有限的安全检查(而非完全的堆栈审核请求)时,这会特别危险。
This is a special danger when doing something that involves a limited security check, as opposed to a full stack walk demand.
要仔细检查打印的堆栈跟踪,它们可能包括了错误来源信息。
Carefully inspect the printed stack traces - they may contain hints about where the error occurred.
开发文件很可能已启用调试,如果部署该开发文件,则用户可以在引发异常时检查调用堆栈。
It is likely that the development file has debugging enabled, which if deployed, would enable users to examine the call stack when an exception is thrown.
clr调试api使用经过优化的JIT编译代码来启用堆栈帧和局部变量检查。
The CLR debugging API enables inspection of stack frames and local variables with JIT-compiled code that has been optimized.
不会导致堆栈审核的要求只有链接要求,这些要求只检查直接调用方。
The only demands that do not result in a stack walk are link demands, which check only the immediate caller.
如果该主题没有涉及您的加载程序锁问题,您必须检查线程的堆栈,以确定出现加载程序锁的原因以及如何更正问题。
If that topic does not identify your loader lock problem, you have to examine the thread's stack to determine why the loader lock is occurring and how to correct the problem.
需要检查线程的堆栈,以确定出现加载程序锁的原因以及如何更正问题。
You need to examine the thread's stack to determine why the loader lock is occurring and how to correct the problem.
代码访问安全性的权限检查基于所有调用方对堆栈的权限进行。
Code access security bases its permission checks on the permissions of all the callers on the stack.
修正:删除堆栈中数据的一部分而不是全部来附加检查对NPC的操作以防止做弊。
Fixed: let delete part of item in stack instead deleting full stack, additional anti-cheating check for operations with NPC.
一个堆栈用户检查代码并告诉他得到完美的答案。
One of Stack user checked this code and told he's getting perfect answer.
用于检查和操作堆栈帧。
获取或设置导致安全检查失败的唯一允许堆栈帧的一部分权限、权限集或权限集集合。
Gets or sets the permission, permission set, or permission set collection that is part of the permit-only stack frame that caused a security check to fail.
接着,检查一码平面管理堆栈。
给孩子一个空白支票登记,创建一个堆栈的虚幻检查,把每月的总数注册,当他们需要钱的时候他们就会把写的东西拿给你检查。
Give children a blank checkbook register and create a stack of make-believe checks. Put a monthly total in the register and have them write you "checks" whenever they need cash.
在运行阶段对成员的每次调用都会提出此要求,此要求将检查调用堆栈中每个调用方的权限。
This demand occurs at run time for every invocation of the member, and checks every caller in the call stack for permission.
您可以让它撤消或重做动作,但您无法检查这些动作或选择性地将数据保存在当前的撤消堆栈中。
You can tell it to undo or redo actions, but you can't inspect those actions or selectively save data in the current undo stack.
通过检查调用堆栈上的调用方,安全请求有助于保护来自不受信任调用方的代码。
Security demands help protect code from untrusted callers by examining the callers on the call stack.
请检查堆栈跟踪更多关于错误的信息,它起源于代码。
Please review the stack trace for more information about the error and where it originated in the code.
应用推荐