亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? fastmm_fulldebugmode.dpr

?? 高效的內(nèi)存管理開源項(xiàng)目,完全取代BorladMM的內(nèi)存管理
?? DPR
?? 第 1 頁 / 共 2 頁
字號:
{

Fast Memory Manager: FullDebugMode Support DLL 1.42

Description:
 Support DLL for FastMM. With this DLL available, FastMM will report debug info
 (unit name, line numbers, etc.) for stack traces.

Usage:
 1) To compile you will need the JCL library (http://sourceforge.net/projects/jcl/)
 2) Place in the same location as the replacement borlndmm.dll or your
 application's executable module.

Change log:
 Version 1.00 (9 July 2005):
  - Initial release.
 Version 1.01 (13 July 2005):
  - Added the option to use madExcept instead of the JCL Debug library. (Thanks
    to Martin Aignesberger.)
 Version 1.02 (30 September 2005):
  - Changed options to display detail for addresses inside libraries as well.
 Version 1.03 (13 October 2005):
  - Added a raw stack trace procedure that implements raw stack traces.
 Version 1.10 (14 October 2005):
  - Improved the program logic behind the skipping of stack levels to cause
    less incorrect entries in raw stack traces. (Thanks to Craig Peterson.)
 Version 1.20 (17 October 2005):
  - Improved support for madExcept stack traces. (Thanks to Mathias Rauen.)
 Version 1.30 (26 October 2005):
  - Changed name to FastMM_FullDebugMode to reflect the fact that there is now
    a static dependency on this DLL for FullDebugMode. The static dependency
    solves a DLL unload order issue. (Thanks to Bart van der Werf.)
 Version 1.40 (31 October 2005):
  - Added support for EurekaLog. (Thanks to Fabio Dell'Aria.)
 Version 1.42 (23 June 2006):
  - Fixed a bug in the RawStackTraces code that may have caused an A/V in some
    rare circumstances. (Thanks to Primoz Gabrijelcic.)
 Version 1.44 (16 November 2006):
  - Changed the RawStackTraces code to prevent it from modifying the Windows
    "GetLastError" error code. (Thanks to Primoz Gabrijelcic.)

}

{--------------------Start of options block-------------------------}

{Select the stack tracing library to use. The JCL, madExcept and EurekaLog are
 supported. Only one can be used at a time.}
{$define JCLDebug}
{.$define madExcept}
{.$define EurekaLog}

{--------------------End of options block-------------------------}

library FastMM_FullDebugMode;

uses
  {$ifdef JCLDebug}JCLDebug{$endif}
  {$ifdef madExcept}madStackTrace{$endif}
  {$ifdef EurekaLog}ExceptionLog{$endif},
  SysUtils, Windows;

{$R *.res}

{$STACKFRAMES ON}

{--------------------------Frame Based Stack Tracing--------------------------}

{Dumps the call stack trace to the given address. Fills the list with the
 addresses where the called addresses can be found. This is the fast stack
 frame based tracing routine.}
procedure GetFrameBasedStackTrace(AReturnAddresses: PCardinal; AMaxDepth, ASkipFrames: Cardinal);
var
  LStackTop, LStackBottom, LCurrentFrame: Cardinal;
begin
  {Get the call stack top and current bottom}
  asm
    mov eax, FS:[4]
    sub eax, 3
    mov LStackTop, eax
    mov LStackBottom, ebp
  end;
  {Get the current frame start}
  LCurrentFrame := LStackBottom;
  {Fill the call stack}
  while (AMaxDepth > 0)
    and (LCurrentFrame >= LStackBottom)
    and (LCurrentFrame < LStackTop) do
  begin
    {Ignore the requested number of levels}
    if ASkipFrames = 0 then
    begin
      AReturnAddresses^ := PCardinal(LCurrentFrame + 4)^;
      Inc(AReturnAddresses);
      Dec(AMaxDepth);
    end
    else
      Dec(ASkipFrames);
    {Get the next frame}
    LCurrentFrame := PCardinal(LCurrentFrame)^;
  end;
  {Clear the remaining dwords}
  while (AMaxDepth > 0) do
  begin
    AReturnAddresses^ := 0;
    Inc(AReturnAddresses);
    Dec(AMaxDepth);
  end;
end;

{-----------------------------Raw Stack Tracing-----------------------------}

const
  {Hexadecimal characters}
  HexTable: array[0..15] of char = '0123456789ABCDEF';

type
  {The state of a memory page. Used by the raw stack tracing mechanism to
   determine whether an address is a valid call site or not.}
  TMemoryPageAccess = (mpaUnknown, mpaNotExecutable, mpaExecutable);

var
  {There are a total of 1M x 4K pages in the 4GB address space}
  MemoryPageAccessMap: array[0..1024 * 1024 - 1] of TMemoryPageAccess;

{Updates the memory page}
procedure UpdateMemoryPageAccessMap(AAddress: Cardinal);
var
  LMemInfo: TMemoryBasicInformation;
  LAccess: TMemoryPageAccess;
  LStartPage, LPageCount: Cardinal;
begin
  {Query the page}
  if VirtualQuery(Pointer(AAddress), LMemInfo, SizeOf(LMemInfo)) <> 0 then
  begin
    {Get access type}
    if (LMemInfo.State = MEM_COMMIT)
      and (LMemInfo.Protect and (PAGE_EXECUTE_READ or PAGE_EXECUTE_READWRITE
        or PAGE_EXECUTE_WRITECOPY or PAGE_EXECUTE) <> 0)
      and (LMemInfo.Protect and PAGE_GUARD = 0) then
    begin
      LAccess := mpaExecutable
    end
    else
      LAccess := mpaNotExecutable;
    {Update the map}
    LStartPage := Cardinal(LMemInfo.BaseAddress) div 4096;
    LPageCount := LMemInfo.RegionSize div 4096;
    if (LStartPage + LPageCount) < Cardinal(length(MemoryPageAccessMap)) then
      FillChar(MemoryPageAccessMap[LStartPage], LPageCount, ord(LAccess));
  end
  else
  begin
    {Invalid address}
    MemoryPageAccessMap[AAddress div 4096] := mpaNotExecutable;
  end;
end;

{Returns true if the return address is a valid call site. This function is only
 safe to call while exceptions are being handled.}
function IsValidCallSite(AReturnAddress: Cardinal): boolean;
var
  LCallAddress, LCode8Back, LCode4Back: Cardinal;
begin
  if (AReturnAddress and $ffff0000 <> 0) then
  begin
    {The call address is up to 8 bytes before the return address}
    LCallAddress := AReturnAddress - 8;
    {Update the page map}
    if MemoryPageAccessMap[LCallAddress div 4096] = mpaUnknown then
      UpdateMemoryPageAccessMap(LCallAddress);
    {Check the page access}
    if (MemoryPageAccessMap[LCallAddress div 4096] = mpaExecutable)
      and (MemoryPageAccessMap[(LCallAddress + 8) div 4096] = mpaExecutable) then
    begin
      {Read the previous 8 bytes}
      try
        LCode8Back := PCardinal(LCallAddress)^;
        LCode4Back := PCardinal(LCallAddress + 4)^;
        {Is it a valid "call" instruction?}
        Result :=
          {5-byte, CALL [-$1234567]}
          ((LCode8Back and $FF000000) = $E8000000)
          {2 byte, CALL EAX}
          or ((LCode4Back and $38FF0000) = $10FF0000)
          {3 byte, CALL [EBP+0x8]}
          or ((LCode4Back and $0038FF00) = $0010FF00)
          {4 byte, CALL ??}
          or ((LCode4Back and $000038FF) = $000010FF)
          {6-byte, CALL ??}
          or ((LCode8Back and $38FF0000) = $10FF0000)
          {7-byte, CALL [ESP-0x1234567]}
          or ((LCode8Back and $0038FF00) = $0010FF00);
      except
        {The access has changed}
        UpdateMemoryPageAccessMap(LCallAddress);
        {Not executable}
        Result := False;
      end;
    end
    else
      Result := False;
  end
  else
    Result := False;
end;

{Dumps the call stack trace to the given address. Fills the list with the
 addresses where the called addresses can be found. This is the "raw" stack
 tracing routine.}
procedure GetRawStackTrace(AReturnAddresses: PCardinal; AMaxDepth, ASkipFrames: Cardinal);
var
  LStackTop, LStackBottom, LCurrentFrame, LNextFrame, LReturnAddress,
    LStackAddress, LLastOSError: Cardinal;
begin
  {Are exceptions being handled? Can only do a raw stack trace if the possible
   access violations are going to be handled.}
  if Assigned(ExceptObjProc) then
  begin
    {Save the last Windows error code}
    LLastOSError := GetLastError;
    {Get the call stack top and current bottom}
    asm
      mov eax, FS:[4]
      sub eax, 3
      mov LStackTop, eax
      mov LStackBottom, ebp
    end;
    {Get the current frame start}
    LCurrentFrame := LStackBottom;
    {Fill the call stack}
    while (AMaxDepth > 0)
      and (LCurrentFrame < LStackTop) do
    begin
      {Get the next frame}
      LNextFrame := PCardinal(LCurrentFrame)^;
      {Is it a valid stack frame address?}
      if (LNextFrame < LStackTop)
        and (LNextFrame > LCurrentFrame) then
      begin
        {The pointer to the next stack frame appears valid: Get the return
         address of the current frame}
        LReturnAddress := PCardinal(LCurrentFrame + 4)^;
        {Does this appear to be a valid return address}
        if (LReturnAddress and $ffff0000) <> 0 then
        begin
          {Is the map for this return address incorrect? If may be unknown or marked
           as unexecutable because a library was previously not yet loaded, or
           perhaps this is not a valid stack frame.}
          if MemoryPageAccessMap[(LReturnAddress - 8) div 4096] <> mpaExecutable then
            UpdateMemoryPageAccessMap(LReturnAddress - 8);
          {Is this return address actually valid?}
          if IsValidCallSite(LReturnAddress) then
          begin
            {Ignore the requested number of levels}
            if ASkipFrames = 0 then
            begin
              AReturnAddresses^ := LReturnAddress;
              Inc(AReturnAddresses);
              Dec(AMaxDepth);

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩情涩欧美日韩视频| 亚洲国产综合91精品麻豆| 国产精品色眯眯| 日韩av在线免费观看不卡| 国产成人免费在线视频| 欧美日韩国产精品自在自线| 综合激情成人伊人| 国产美女一区二区三区| 欧美色精品在线视频| 国产精品天干天干在线综合| 久久精品999| 欧美老女人第四色| 一区二区国产视频| 99久久精品国产毛片| 久久蜜臀精品av| 久久精品av麻豆的观看方式| 欧美日本一区二区三区四区| 亚洲精品视频在线观看网站| 粉嫩蜜臀av国产精品网站| 日韩一区二区三区免费看| 亚洲午夜av在线| 色美美综合视频| 亚洲三级小视频| 91天堂素人约啪| 亚洲欧洲另类国产综合| 粉嫩一区二区三区在线看| 久久久综合激的五月天| 欧美aaaaaa午夜精品| 宅男噜噜噜66一区二区66| 亚洲国产精品久久人人爱| 在线中文字幕一区二区| 亚洲综合精品自拍| 欧美日韩亚洲综合| 无吗不卡中文字幕| 7777精品伊人久久久大香线蕉的 | 2023国产一二三区日本精品2022| 亚洲国产日韩a在线播放性色| 在线观看精品一区| 一区二区免费视频| 欧美日本精品一区二区三区| 日韩制服丝袜av| 日韩一区二区三区免费看 | 亚洲精品乱码久久久久久久久 | 国产精品嫩草影院av蜜臀| 高清免费成人av| 亚洲欧美国产高清| 欧洲一区在线观看| 午夜国产精品一区| wwwwww.欧美系列| 成人av网站在线| 亚洲一卡二卡三卡四卡五卡| 欧美日韩国产区一| 久久66热偷产精品| 国产精品视频麻豆| 欧美亚洲国产一区在线观看网站| 婷婷中文字幕一区三区| 亚洲精品一区二区三区在线观看| 国产91露脸合集magnet| 亚洲美女视频在线| 日韩欧美一区在线观看| 成人性生交大片免费看中文网站| 亚洲精品免费一二三区| 欧美第一区第二区| 99久久精品费精品国产一区二区| 亚洲图片自拍偷拍| 日韩一区二区在线看| av亚洲精华国产精华精华| 亚洲一区在线观看网站| 欧美精品一区二区久久婷婷| 成人午夜av影视| 日韩av电影免费观看高清完整版在线观看| 精品剧情在线观看| 日本道免费精品一区二区三区| 日本成人中文字幕| 日韩毛片一二三区| 精品国产sm最大网站| 91成人看片片| 成人高清免费观看| 狠狠色丁香久久婷婷综合_中| 亚洲欧美aⅴ...| 26uuu成人网一区二区三区| 色综合久久88色综合天天| 国产综合色在线| 视频一区视频二区中文字幕| 国产精品欧美久久久久一区二区| 91精品国产一区二区三区蜜臀| 99久久精品国产毛片| 国产曰批免费观看久久久| 丝袜美腿亚洲综合| 亚洲欧美日韩国产另类专区| 久久久一区二区三区捆绑**| 欧美区在线观看| 91免费观看视频| 成人涩涩免费视频| 久久成人精品无人区| 亚洲3atv精品一区二区三区| 国产精品乱人伦一区二区| 欧美mv日韩mv国产网站app| 欧美日韩国产一二三| 日本道精品一区二区三区| 972aa.com艺术欧美| 国产成人精品综合在线观看| 精品在线播放免费| 麻豆91精品91久久久的内涵| 五月婷婷综合网| 亚洲国产va精品久久久不卡综合| 亚洲欧洲国产日韩| 国产精品丝袜久久久久久app| 国产三级一区二区三区| 久久嫩草精品久久久久| 欧美不卡一区二区三区四区| 91精品国产91久久综合桃花 | 成av人片一区二区| 国产成人亚洲综合a∨婷婷| 国产精品一区2区| 国内精品嫩模私拍在线| 狠狠v欧美v日韩v亚洲ⅴ| 狠狠色丁香婷婷综合| 精品无码三级在线观看视频 | 久久久一区二区三区| 久久久久久久久伊人| 2021中文字幕一区亚洲| 国产亚洲一区二区三区四区 | 精品国产污污免费网站入口| 精品久久国产老人久久综合| 精品国产a毛片| 日本一区二区在线不卡| 亚洲天堂久久久久久久| 亚洲精品乱码久久久久久日本蜜臀 | 亚洲色图清纯唯美| 一区二区三区免费看视频| 艳妇臀荡乳欲伦亚洲一区| 亚洲成人三级小说| 蜜臀国产一区二区三区在线播放| 看片的网站亚洲| 成人一区二区视频| 日本国产一区二区| 日韩免费电影网站| 中文字幕欧美日本乱码一线二线| 1区2区3区国产精品| 亚洲成人av一区二区| 久久精品国产在热久久| 成人深夜视频在线观看| 欧美日韩综合色| 久久一留热品黄| 亚洲精品成人天堂一二三| 秋霞午夜av一区二区三区| 国产成人综合在线| 欧美日韩国产美女| 日本一区二区三区四区| 亚洲成国产人片在线观看| 国产一区亚洲一区| 欧美性欧美巨大黑白大战| 欧美va在线播放| 一区二区三区四区国产精品| 日本视频一区二区| hitomi一区二区三区精品| 欧美日韩成人一区二区| 亚洲国产精品激情在线观看| 午夜精品影院在线观看| 国产精品 欧美精品| 欧美久久久久久久久| 国产精品美女久久福利网站| 日韩av不卡一区二区| 91香蕉视频mp4| 久久久青草青青国产亚洲免观| 亚洲精品欧美在线| 成人在线综合网| 在线播放欧美女士性生活| 日韩美女视频一区| 国产精品亚洲а∨天堂免在线| 欧美三级电影在线看| 国产精品久久久久久久浪潮网站| 美日韩黄色大片| 欧美色综合天天久久综合精品| 国产精品网曝门| 韩国精品久久久| 日韩三级视频在线看| 一区二区高清免费观看影视大全| 国产成人精品亚洲日本在线桃色| 日韩一区二区精品在线观看| 一区二区不卡在线播放 | 中文字幕欧美国产| 国产一区二区三区四区五区入口| 欧美精品一二三区| 一区二区在线看| 99视频精品全部免费在线| 久久免费国产精品| 国产在线一区观看| 欧美成人三级在线| 免费在线成人网| 欧美一区2区视频在线观看| 婷婷丁香久久五月婷婷| 欧美亚洲综合在线| 亚洲综合免费观看高清在线观看| 在线一区二区视频| 一区二区免费看| 欧美日本免费一区二区三区| 五月天激情综合网| 欧美xxxxxxxxx|