none
Application Verifier for Mobile 5.0中无法显示函数名称 RRS feed

  • 问题

  • vs2008 + wm5 ppc sdk + verifier ce 5

    安装了app verifier ce工具来检查 mobile程序的内存泄漏问题,根据msdn上的文章,将程序编译生成的map文件copy到\windows目录,但是用vs2008调试运行后,在输出窗口显示相关map文件无法打开,另外调用堆栈里面的函数名称没有解析出来,无法提供足够的信息来定位泄漏的起因。

    请问有什么办法解决下面的问题:

    1.  vs的输出窗口显示 无法打开下面的map文件,这些文件从哪儿可以获得?或是需要做什么设置?
    \windows\gwes.map
    \windows\commctrl.map
    \windows\coredll.map
    \windows\ole32.map

    2.  callstack的函数名如何设置可以显示出来?

    下面是输出窗口的日志截取的一部分
    ----------------------------------------
    TrackedItem count: 1
    Callstack:
       0x29286b78: shim_heap.dll!APIHook_HeapAlloc + 680h
       0x2928984c: shim_heap.dll!APIHook_LocalAlloc + a8h
    Unable to open '\windows\ole32.map' (GLE: 2)
       0x02e95c38: ole32.dll!(null) + 5c38h
       0x02e92360: ole32.dll!(null) + 2360h
       0x02e92594: ole32.dll!(null) + 2594h
       0x280222e0: + 64h
    !(null) + 222e0h
       0x2801b354: + 64h
    !(null) + 1b354h
       0x28028d4c: + 64h
    !(null) + 28d4ch
       0x28107cb0: + 64h
    !(null) + 107cb0h
       0x281076d0: + 64h
    !(null) + 1076d0h
       0x280eec04: + 64h
    !(null) + eec04h
       0x03f7cb5c: coredll.dll!(null) + 1cb5ch
    Leaked items:
       0x002a6820      20 bytes, thread: 0x96a177b6, checkpoint 0
          Total: 20 bytes
    DLL_PROCESS_DETACH: Shim_usergdi checking for abandoned resources...
    ----------------------------------------
    TrackedItem count: 1
    Callstack:
       0x292729d8: shim_usergdi.dll!APIHook_GetDC + 60h
       0x280571d8: + 64h
    !(null) + 571d8h
       0x2802c004: + 64h
    !(null) + 2c004h
       0x2804a49c: + 64h
    !(null) + 4a49ch
       0x28049804: + 64h
    !(null) + 49804h
       0x28046268: + 64h
    !(null) + 46268h
       0x28046b70: + 64h
    !(null) + 46b70h
       0x2804794c: + 64h
    !(null) + 4794ch
       0x03f76c50: coredll.dll!(null) + 16c50h
    Unable to open '\windows\gwes.map' (GLE: 2)
       0x0a02195c: gwes.exe!(null) + 2195ch
       0x0a022a74: gwes.exe!(null) + 22a74h
       0x0a01e334: gwes.exe!(null) + 1e334h
       0x0a018a3c: gwes.exe!(null) + 18a3ch
       0x0a0193d4: gwes.exe!(null) + 193d4h
       0x03f7248c: coredll.dll!(null) + 1248ch
       0x28047374: + 64h
    !(null) + 47374h
       0x28047048: + 64h
    !(null) + 47048h
       0x2802bed4: + 64h
    !(null) + 2bed4h
       0x28029b34: + 64h
    !(null) + 29b34h
       0x2802a39c: + 64h
    !(null) + 2a39ch
       0x2806fbc4: + 64h
    !(null) + 6fbc4h
       0x03f76c50: coredll.dll!(null) + 16c50h
       0x0a02195c: gwes.exe!(null) + 2195ch
       0x0a022a74: gwes.exe!(null) + 22a74h
       0x0a0881bc: gwes.exe!(null) + 881bch
       0x03f761f8: coredll.dll!(null) + 161f8h
       0x03f76c50: coredll.dll!(null) + 16c50h
       0x0a02195c: gwes.exe!(null) + 2195ch
       0x0a022a74: gwes.exe!(null) + 22a74h
       0x0a022c74: gwes.exe!(null) + 22c74h
       0x03f75784: coredll.dll!(null) + 15784h
       0x280486b4: + 64h
    !(null) + 486b4h
       0x28046484: + 64h
    !(null) + 46484h
       0x2807216c: + 64h
    !(null) + 7216ch
       0x2804a4c4: + 64h
    !(null) + 4a4c4h
       0x28049804: + 64h
    !(null) + 49804h
       0x28046268: + 64h
    !(null) + 46268h
       0x28046b70: + 64h
    !(null) + 46b70h
       0x03f76c50: coredll.dll!(null) + 16c50h
       0x0a02195c: gwes.exe!(null) + 2195ch
       0x0a022a74: gwes.exe!(null) + 22a74h
       0x0a01e334: gwes.exe!(null) + 1e334h
       0x0a01e670: gwes.exe!(null) + 1e670h
       0x0a046b20: gwes.exe!(null) + 46b20h
       0x03f90eb8: coredll.dll!(null) + 30eb8h
       0x28070f34: + 64h
    !(null) + 70f34h
       0x28071c7c: + 64h
    !(null) + 71c7ch
       0x28028d94: + 64h
    !(null) + 28d94h
       0x28107cb0: + 64h
    !(null) + 107cb0h
       0x281076d0: + 64h
    !(null) + 1076d0h
       0x280eec04: + 64h
    !(null) + eec04h
       0x03f7cb5c: coredll.dll!(null) + 1cb5ch
    Leaked items:
       0x0132023f   (GetDC) (checkpoint: 0)
    ----------------------------------------

    2009年2月6日 13:33