如何让 WinDebug Preview 加载 Dotnet Core 的 SOS.dll 进行调试

发布时间 2023-11-03 14:13:47作者: jack_Meng

一、前言
    最近我在使用 WinDebug进行系统调试,也是在学习《Net高级调试》这本书。以前听过 WinDebug 调试器,但是没有使用过,由于最近想起来了,就好好的研究一下,学习一下。初次接触,还是走了不少弯路,踩了不少坑。关于 WinDebug 最新版的安装方法,可以在“微软商店”里面,直接查询“WinDebug”,找到后,点击安装就好。当然都是在线安装的,没有网络是不行的。来一个截图把,先有一个直接的感觉,截图如下:
            

              这次的调试环境和平台如下:
        操作系统:WIndows 10 Professinal
        开发工具:Visual Studio 2019
        开发语言:C#
        框架平台:Net Framework 4.8
        调试工具:Windebug Preview

二、开始我们的入门之旅吧

    由于我也是第一次使用 Windebug 进行系统调试,所以就免不了采一些坑。我安装好Windebug 软件,尝试加载 VS2019 创建的一个控制台项目,说明一下,不是跨平台版本,但是就是没有办法获取我想要的东西,后来,仔细对比,才发现,没有加载 SOS.DLL,所以使用命令也不起作用。今天我们就解决一下,如何让 Windebug 加载 Net Core 版本的 SOS.DLL。 .NET Framework 和 DotNet Core 版本不相同的是,当前的 SOS.dll 是放在独立的 https://github.com/dotnet/diagnostics 仓库里面,也需要独立安装。好在 SOS 通过 DotNet Tool 进行分发,安装方法也非常简单。

    1、使用以下命令进行安装,在命令行工具中。

      dotnet tool install -g dotnet-sos
    
    安装很简单,执行命令就可以,我的直接安装就成功了,

    2、以上是添加 DotNet SOS 工具,接下来还需要调用此工具进行安装,请在命令行输入下面命令进行安装。

      dotnet sos install
复制代码
        C:\Users\Administrator>dotnet sos install
     Installing SOS to C:\Users\Administrator\.dotnet\sos
     Creating installation directory...
     Copying files from C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\win-x64
     Copying files from C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\lib
     Execute '.load C:\Users\Administrator\.dotnet\sos\sos.dll' to load SOS in your Windows debugger.
     SOS install succeeded    
复制代码
       截图效果:
       
   

    3、通过以下命令让 WinDebug 加载 SOS 文件。

      .load C:\Users\Administrator\.dotnet\sos\sos.dll
      但是此文件默认是 x64 的,如果期望调试的应用是 x86 的,那么以上命令将会提示如下错误
      The call to LoadLibrary(C:\Users\lindexi\.dotnet\sos\sos.dll) failed, Win32 error 0n193
        "%1 不是有效的 Win32 应用程序。

    4、此时的解决方法是去获取 x86 版本的 sos.dll ,我的命令的位置如下:
      C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\win-x86
       

        需要自己去找放在 C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\win-x86\ 文件夹的对应的 dotnet 版本的 sos 的 win-x86 版本的文件。

    5、WinDebug 成功加载 Sos,我们就可以使用了,在 WinDebug 中,通过命令 .chain 命令,就可以看到结果了,红色部分表示加载了SOS.dll。

复制代码
 1 1:001> .chain
 2 Extension DLL search Path:
 3     C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\arcade;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\pri;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86;C:\Users\Administrator\AppData\Local\Dbg\EngineExtensions32;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\Microsoft SQL Server\150\Tools\Binn\;C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\170\Tools\Binn\;C:\Program Files\dotnet\;D:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;D:\Program Files\Microsoft SQL Server\100\Tools\Binn\;D:\Program Files\Microsoft SQL Server\100\DTS\Binn\;D:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\VSShell\Common7\IDE\;C:\Program Files (x86)\Microsoft Visual Studio 9.0\Common7\IDE\PrivateAssemblies\;D:\Program Files (x86)\Microsoft SQL Server\100\DTS\Binn\;C:\Program Files\Microsoft SQL Server\130\Tools\Binn\;C:\Users\Administrator\AppData\Local\Microsoft\WindowsApps;C:\Users\Administrator\.dotnet\tools
 4 Extension DLL chain:
 5     C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\win-x86\sos.dll: image 7.0.410101, API 2.0.0, built Thu Feb  2 05:49:09 2023
 6         [path: C:\Users\Administrator\.dotnet\tools\.store\dotnet-sos\7.0.410101\dotnet-sos\7.0.410101\tools\net6.0\any\win-x86\sos.dll]
 7     CLRComposition: image 10.0.25200.1003, API 0.0.0, 
 8         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\CLRComposition.dll]
 9     wow64exts: image 10.0.25200.1003, API 1.0.0, 
10         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\wow64exts.dll]
11     dbghelp: image 10.0.25200.1003, API 10.0.6, 
12         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\dbghelp.dll]
13     exts: image 10.0.25200.1003, API 1.0.0, 
14         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\exts.dll]
15     uext: image 10.0.25200.1003, API 1.0.0, 
16         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\uext.dll]
17     ntsdexts: image 10.0.25200.1003, API 1.0.0, 
18         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\ntsdexts.dll]
复制代码


    6、我们也可以查看 SOS的帮助命令,执行命令:!sos.help 命令,如下:

复制代码
 1 0:000> !sos.help
 2 -------------------------------------------------------------------------------
 3 SOS is a debugger extension DLL designed to aid in the debugging of managed
 4 programs. Functions are listed by category, then roughly in order of
 5 importance. Shortcut names for popular functions are listed in parenthesis.
 6 Type "!help <functionname>" for detailed info on that function. 
 7 
 8 Object Inspection                  Examining code and stacks
 9 -----------------------------      -----------------------------
10 DumpObj (do)                       Threads (clrthreads)
11 DumpALC (dumpalc)                  ThreadState
12 DumpArray (da)                     IP2MD
13 DumpDelegate                       U
14 DumpStackObjects (dso)             DumpStack
15 DumpHeap                           EEStack
16 DumpVC                             ClrStack
17 GCRoot                             GCInfo
18 ObjSize                            EHInfo
19 FinalizeQueue                      BPMD (bpmd)
20 PrintException (pe)                COMState
21 TraverseHeap
22 
23 Examining CLR data structures      Diagnostic Utilities
24 -----------------------------      -----------------------------
25 DumpDomain                         VerifyHeap
26 EEHeap                             VerifyObj
27 Name2EE                            FindRoots
28 SyncBlk                            HeapStat
29 DumpMT                             GCWhere
30 DumpClass                          ListNearObj (lno)
31 DumpMD                             GCHandles
32 Token2EE                           GCHandleLeaks
33 EEVersion                          FinalizeQueue (fq)
34 DumpModule                         FindAppDomain
35 ThreadPool (tp)                    SaveModule
36 DumpAssembly                       ProcInfo 
37 DumpSigElem                        StopOnException (soe)
38 DumpRuntimeTypes                   DumpLog
39 DumpSig                            VMMap
40 RCWCleanupList                     VMStat
41 DumpIL                             MinidumpMode 
42 DumpRCW                            AnalyzeOOM (ao)
43 DumpCCW                            SuppressJitOptimization
44 
45 Examining the GC history           Other
46 -----------------------------      -----------------------------
47 HistInit                           SetHostRuntime (sethostruntime)
48 HistRoot                           SetSymbolServer (setsymbolserver)
49 HistObj                            SetClrPath (setclrpath)
50 HistObjFind                        SOSFlush
51 HistClear                          SOSStatus (sosstatus)
52                                    FAQ
53                                    Help (soshelp)
复制代码


    7、我们也可以查看堆的具体情况,执行命令:!dumpheap -stat 命令,如下:      

复制代码
 1 0:000> !dumpheap -stat
 2 *** WARNING: Unable to verify checksum for 01、PatrickLiu.AdvanceDebug.DebugTools.exe
 3 Statistics:
 4       MT    Count    TotalSize Class Name
 5 6ecf5468        1           12 System.Collections.Generic.GenericEqualityComparer`1[[System.String, mscorlib]]
 6 6ecf4888        1           12 System.Security.HostSecurityManager
 7 6ecf3d78        1           12 System.Collections.Generic.ObjectEqualityComparer`1[[System.Type, mscorlib]]
 8 6ed59b0c        1           16 System.IO.TextReader+SyncTextReader
 9 6ecf480c        1           16 System.Security.Policy.Evidence+EvidenceLockHolder
10 6ecf1848        1           16 System.Security.Policy.AssemblyEvidenceFactory
11 6ecf9098        1           20 Microsoft.Win32.SafeHandles.SafeFileMappingHandle
12 6ecf9048        1           20 Microsoft.Win32.SafeHandles.SafeViewOfFileHandle
13 6ecf8fb4        1           20 System.Text.InternalEncoderBestFitFallback
14 6ecf89dc        1           20 System.IO.Stream+NullStream
15 6ecf1790        1           20 Microsoft.Win32.SafeHandles.SafePEFileHandle
16 6ecf9004        1           24 System.Text.InternalDecoderBestFitFallback
17 6ecf8c64        1           24 System.IO.TextWriter+SyncTextWriter
18 6ecf5160        1           24 System.Version
19 6ed5b818        1           28 System.Text.DBCSCodePageEncoding+DBCSDecoder
20 6ecf91c0        1           28 System.Text.EncoderNLS
21 6ecf8b20        1           28 Microsoft.Win32.Win32Native+InputRecord
22 6ecf4cc0        1           28 System.Text.UTF8Encoding+UTF8EncodingSealed
23 6ecf27d0        1           28 System.SharedStatics
24 6ecf4b60        2           32 System.Text.DecoderReplacementFallback
25 6ecf4b10        2           32 System.Text.EncoderReplacementFallback
26 6ecf48fc        1           32 System.Text.UnicodeEncoding
27 6ecf17f0        1           32 System.Security.Policy.PEFileEvidenceFactory
28 6ecf2ef0        1           36 System.Security.PermissionSet
29 6ecf4c34        2           40 Microsoft.Win32.SafeHandles.SafeFileHandle
30 6ecf2e6c        1           40 System.Security.Policy.Evidence
31 6ed5c4b8        1           44 System.Text.InternalEncoderBestFitFallbackBuffer
32 6ecf4680        1           44 System.Threading.ReaderWriterLock
33 6ecf52a0        1           48 System.Collections.Generic.Dictionary`2[[System.String, mscorlib],[System.Globalization.CultureData, mscorlib]]
34 6ecf4ec0        1           48 System.Collections.Hashtable+bucket[]
35 6ecf42a8        4           48 System.Int32
36 6ecf304c        1           48 System.Collections.Generic.Dictionary`2[[System.Type, mscorlib],[System.Security.Policy.EvidenceTypeDescriptor, mscorlib]]
37 6ecf16f0        4           48 System.UInt16
38 6ecf4e00        1           52 System.Collections.Hashtable
39 6ecf3de0        1           52 System.Type[]
40 6ecf2e10        1           52 System.Threading.Thread
41 6ecf8b68        2           56 System.IO.__ConsoleStream
42 6ecf524c        2           56 System.Text.StringBuilder
43 6ecf46c8        2           56 System.Reflection.RuntimeAssembly
44 6ecf59a8        1           60 System.IO.StreamWriter
45 6ecf55bc        1           60 System.Collections.Generic.Dictionary`2+Entry[[System.String, mscorlib],[System.Globalization.CultureData, mscorlib]][]
46 6ed3dc64        1           64 System.IO.StreamReader
47 6ecf2b94        1           68 System.AppDomainSetup
48 6ecf4f50        1           72 System.IO.UnmanagedMemoryStream
49 6ed5bcc4        1           76 System.Text.DBCSCodePageEncoding
50 6ecf520c        1           84 System.Globalization.CalendarData
51 6ecf26b4        1           84 System.ExecutionEngineException
52 6ecf2670        1           84 System.StackOverflowException
53 6ecf2628        1           84 System.OutOfMemoryException
54 6ecf25d4        1           84 System.Exception
55 6ecf2734        8           96 System.Object
56 6ecf51c8        1          104 System.Globalization.CalendarData[]
57 6ecf2810        1          112 System.AppDomain
58 01308d50       10          116      Free
59 6ecf5700        1          132 System.Globalization.NumberFormatInfo
60 6ecf5074        2          144 System.Globalization.CultureInfo
61 6ecf26f8        2          168 System.Threading.ThreadAbortException
62 6ecf44d4        3          468 System.Collections.Generic.Dictionary`2+Entry[[System.Type, mscorlib],[System.Security.Policy.EvidenceTypeDescriptor, mscorlib]][]
63 6ecf426c       11          564 System.Int32[]
64 6ecf2d74       18          608 System.String[]
65 6ecf512c        2          616 System.Globalization.CultureData
66 6ecf3698       26          728 System.RuntimeType
67 6ecf5c40        3          806 System.Byte[]
68 6ecf2c60       10         2986 System.Char[]
69 6ecf24e4      166         6292 System.String
70 6ecf2788        6        17748 System.Object[]
71 Total 332 objects
复制代码

    8、如果我们想运行调试,可以执行g命令,然后再点击【Break】命令,切换到:~0s,执行调试,如下:

      

      

      

      


    9、如何我们想查看托管堆的布局,可以执行命令:!eeheap -gc 命令,如下:

复制代码
 1 0:000> !eeheap -gc
 2 Number of GC Heaps: 1
 3 generation 0 starts at 0x02441018
 4 generation 1 starts at 0x0244100c
 5 generation 2 starts at 0x02441000
 6 ephemeral segment allocation context: none
 7  segment     begin  allocated      size
 8 02440000  02441000  02445ff4  0x4ff4(20468)
 9 Large object heap starts at 0x03441000
10  segment     begin  allocated      size
11 03440000  03441000  03445558  0x4558(17752)
12 Total Size:              Size: 0x954c (38220) bytes.
13 ------------------------------
14 GC Heap Size:    Size: 0x954c (38220) bytes.
复制代码

     截图如下:

      

      10、如何我们想查看帮助文档,可以执行命令:.hh,注意,前面有英文点号。
       

       11、我自己重新下载了 SOSEX.Dll,然后使用 load 命令加载到 Windebug 中。红色表示要执行的命令。

复制代码
 1 0:000> .load F:\Books\debug Tools\sosex_32\sosex.dll
 2 0:000> .chain
 3 Extension DLL search Path:
 4     C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\arcade;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\pri;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86;C:\Users\Administrator\AppData\Local\Dbg\EngineExtensions32;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86;C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\amd64;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Program Files\Microsoft SQL Server\150\Tools\Binn\;C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\170\Tools\Binn\;C:\Program Files\dotnet\;D:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;D:\Program Files\Microsoft SQL Server\100\Tools\Binn\;D:\Program Files\Microsoft SQL Server\100\DTS\Binn\;D:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\VSShell\Common7\IDE\;C:\Program Files (x86)\Microsoft Visual Studio 9.0\Common7\IDE\PrivateAssemblies\;D:\Program Files (x86)\Microsoft SQL Server\100\DTS\Binn\;C:\Program Files\Microsoft SQL Server\130\Tools\Binn\;C:\Users\Administrator\AppData\Local\Microsoft\WindowsApps;C:\Users\Administrator\.dotnet\tools
 5 Extension DLL chain:
 6     F:\Books\debug Tools\sosex_32\sosex.dll: image 4.5.0.0, API 1.0.0, built Fri Mar  7 23:17:26 2014
 7         [path: F:\Books\debug Tools\sosex_32\sosex.dll]
 8     C:\Windows\Microsoft.NET\Framework\v4.0.30319\SOS.dll: image 4.8.4300.0, API 1.0.0, built Thu Oct  8 08:41:14 2020
 9         [path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\SOS.dll]
10     CLRComposition: image 10.0.25200.1003, API 0.0.0, 
11         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\CLRComposition.dll]
12     wow64exts: image 10.0.25200.1003, API 1.0.0, 
13         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\wow64exts.dll]
14     dbghelp: image 10.0.25200.1003, API 10.0.6, 
15         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\dbghelp.dll]
16     exts: image 10.0.25200.1003, API 1.0.0, 
17         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\exts.dll]
18     uext: image 10.0.25200.1003, API 1.0.0, 
19         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\winext\uext.dll]
20     ntsdexts: image 10.0.25200.1003, API 1.0.0, 
21         [path: C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\WINXP\ntsdexts.dll]
复制代码

      12、可以使用 !sosex.help 命令,查看 SOSEX的帮助文件。红色表示要执行的命令。

复制代码
 1 0:000> !sosex.help
 2 SOSEX - Copyright 2007-2014 by Steve Johnson - http://www.stevestechspot.com/
 3 To report bugs or offer feedback about SOSEX, please email sjjohnson@pobox.com
 4 Quick Ref:
 5 --------------------------------------------------
 6 bhi       [filename]                                     BuildHeapIndex - Builds an index file for heap objects.
 7 bpsc      (Deprecated.  Use !mbp instead)
 8 chi                                                      ClearHeapIndex - Frees all resources used by the heap index and removes it from memory.
 9 dlk       [-d]                                           Displays deadlocks between SyncBlocks and/or ReaderWriterLocks
10 dumpfd    <FieldAddr>                                    Dumps the properties of a FieldDef structure
11 dumpgen   <GenNum> [-free] [-stat] [-type <TYPE_NAME>]   Dumps the contents of the specified generation
12                    [-nostrings]
13 finq      [GenNum] [-stat]                               Displays objects in the finalization queue
14 frq       [-stat]                                        Displays objects in the Freachable queue
15 gcgen     <ObjectAddr>                                   Displays the GC generation of the specified object
16 gch       [HandleType]... [-stat]                        Lists all GCHandles, optionally filtered by specified handle types
17 help      [CommandName]                                  Display this screen or details about the specified command
18 lhi       [filename]                                     LoadHeapIndex - load the heap index into memory.
19 mbc       <SOSEX breakpoint ID | *>                      Clears the specified or all managed breakpoints
20 mbd       <SOSEX breakpoint ID | *>                      Disables the specified or all managed breakpoints
21 mbe       <SOSEX breakpoint ID | *>                      Enables the specified or all managed breakpoints
22 mbl       [SOSEX breakpoint ID]                          Prints the specified or all managed breakpoints
23 mbm       <Type/MethodFilter> [ILOffset] [Options]       Sets a managed breakpoint on methods matching the specified filter
24 mbp       <SourceFile> <nLineNum> [ColNum] [Options]     Sets a managed breakpoint at the specified source code location
25 mdso      [Options]                                      Dumps object references on the stack and in CPU registers in the current context
26 mdt       [TypeName | VarName | MT] [ADDR] [Options]     Displays the fields of an object or type, optionally recursively
27 mdv       [nFrameNum]                                    Displays arguments and locals for a managed frame
28 mfrag     [-stat] [-mt:<MT>]                             Reports free blocks, the type of object following the free block, and fragmentation statistics
29 mframe    [nFrameNum]                                    Displays or sets the current managed frame for the !mdt and !mdv commands
30 mgu       // TODO: Document
31 mk        [FrameCount] [-l] [-p] [-a]                    Prints a stack trace of managed and unmanaged frames
32 mln       [expression]                                   Displays the type of managed data located at the specified address or the current instruction pointer
33 mlocks    [-d]                                           Lists all managed lock objects and CriticalSections and their owning threads
34 mroot     <ObjectAddr> [-all]                            Displays GC roots for the specified object
35 mt        (no parameters)                                Steps into the managed method at the current position
36 mu        [address] [-s] [-il] [-n]                      Displays a disassembly around the current instruction with interleaved source, IL and asm code
37 muf       [MD Address | Code Address] [-s] [-il] [-n]    Displays a disassembly with interleaved source, IL and asm code
38 mwaits    [-d | LockAddr]                                Lists all waiting threads and, if known, the locks they are waiting on
39 mx        <Filter String>                                Displays managed type/field/method names matching the specified filter string
40 rcw       [Object or SyncBlock Addr]                     Displays Runtime Callable Wrapper (RCW) COM interop data.
41 refs      <ObjectAddr> [-target|-source]                 Displays all references from and to the specified object
42 rwlock    [ObjectAddr | -d]                              Displays all RWLocks or, if provided a RWLock address, details of the specified lock
43 sosexhelp [CommandName]                                  Display this screen or details about the specified command
44 strings   [ModuleAddress] [Options]                      Search the managed heap or a module for strings matching the specified criteria
45 
46 ListGcHandles - See gch
47 
48 Use !help <command> or !sosexhelp <command> for more details about each command.
49 You can also use the /? (or -?) option on any command to get help for that command.
复制代码

      13、我们可以使用 !strings 命令,查看当前进程中所有字符串。红色字体表示要执行的命令。

复制代码
  7 0:000> !strings
  8 Address    Gen    Length   Value
  9 ---------------------------------------
 10 033e1228    0          0   
 11 033e1254    0        121   E:\Visual Studio 2019\Source\Projects\PatrickLiu.AdvanceDebug.Test(2019)\01、PatrickLiu.AdvanceDebug.DebugTools\bin\Debug\
 12 033e1354    0        169   E:\Visual Studio 2019\Source\Projects\PatrickLiu.AdvanceDebug.Test(2019)\01、PatrickLiu.AdvanceDebug.DebugTools\bin\Debug\01、Patr...
 13 033e1524    0          4   true
 14 033e153c    0         32   PARTIAL_TRUST_VISIBLE_ASSEMBLIES
 15 033e15d0    0        162   E:\Visual Studio 2019\Source\Projects\PatrickLiu.AdvanceDebug.Test(2019)\01、PatrickLiu.AdvanceDebug.DebugTools\bin\Debug\01、Patr...
 16 033e1724    0          7   .config
 17 033e1750    0         41   01、PatrickLiu.AdvanceDebug.DebugTools.exe
 18 033e1804    0        121   E:\Visual Studio 2019\Source\Projects\PatrickLiu.AdvanceDebug.Test(2019)\01、PatrickLiu.AdvanceDebug.DebugTools\bin\Debug\
 19 033e1904    0         48   01、PatrickLiu.AdvanceDebug.DebugTools.exe.config
 20 033e1974    0          7   RELPATH
 21 033e1990    0          1   ;
 22 033e19a0    0         12   DYNAMIC_BASE
 23 033e19c8    0         15   PRIVATE_BINPATH
 24 033e19f4    0         16   SHADOW_COPY_DIRS
 25 033e1a24    0         10   CACHE_BASE
 26 033e1a48    0          7   APPBASE
 27 033e1a64    0          8   DEV_PATH
 28 033e1a84    0         12   DISALLOW_APP
 29 033e1aac    0         22   CODE_DOWNLOAD_DISABLED
 30 033e1ae8    0         22   DISALLOW_APP_REDIRECTS
 31 033e1b24    0         25   DISALLOW_APP_BASE_PROBING
 32 033e1b64    0         19   FORCE_CACHE_INSTALL
 33 033e1b98    0         18   BINPATH_PROBE_ONLY
 34 033e1bcc    0         15   APP_CONFIG_FILE
 35 033e1bf8    0         15   APP_CONFIG_BLOB
 36 033e1c24    0          8   APP_NAME
 37 033e1c44    0         14   MACHINE_CONFIG
 38 033e1c70    0         21   config\machine.config
 39 033e1ca8    0         11   HOST_CONFIG
 40 033e1ccc    0          5   false
 41 033e1ce4    0         46   C:\Windows\Microsoft.NET\Framework\v4.0.30319\
 42 033e1d50    0         67   C:\Windows\Microsoft.NET\Framework\v4.0.30319\config\machine.config
 43 033e1de4    0         32   NetFx40_TimeSpanLegacyFormatMode
 44 033e1e34    0         28   NetFx40_LegacySecurityPolicy
 45 033e1e7c    0         34   NetFx45_LegacyManagedDeflateStream
 46 033e260c    0         26   .NETFramework,Version=v4.8
 47 033e265c    0         11   Hello World
 48 033e26bc    0          1 49 033e27d0    0         13   codepages.nlp
 50 033e2878    0          8   capacity
 51 033e2898    0          6   length
 52 033e292c    0         32   NLS_CodePage_{0}_{1}_{2}_{3}_{4}
 53 033e29c4    0          1   *
 54 033e29d4    0          1   1
 55 033e29e4    0          1   .
 56 033e29f4    0          1   ,
 57 033e2a04    0         38   Invariant Language (Invariant Country)
 58 033e2a60    0          2   iv
 59 033e2a74    0         18   Invariant Language
 60 033e2aa8    0          2   IV
 61 033e2abc    0         17   Invariant Country
 62 033e2aec    0          1   +
 63 033e2afc    0          1   -
 64 033e2b0c    0          1   0
 65 033e2b1c    0          1   2
 66 033e2b2c    0          1   3
 67 033e2b3c    0          1   4
 68 033e2b4c    0          1   5
 69 033e2b5c    0          1   6
 70 033e2b6c    0          1   7
 71 033e2b7c    0          1   8
 72 033e2b8c    0          1   9
 73 033e2b9c    0          3   NaN
 74 033e2bb0    0          8   Infinity
 75 033e2bd0    0          9   -Infinity
 76 033e2bf0    0          1   %
 77 033e2c00    0          1 78 033e2c10    0          1   ¤
 79 033e2c20    0          3   XDR
 80 033e2c34    0         27   International Monetary Fund
 81 033e2c78    0          2   AM
 82 033e2c8c    0          2   PM
 83 033e2ca0    0          8   HH:mm:ss
 84 033e2cc0    0          5   HH:mm
 85 033e2cd8    0          8   hh:mm tt
 86 033e2cf8    0          4   H:mm
 87 033e2d10    0          7   h:mm tt
 88 033e2d2c    0          5   Latn;
 89 033e2d44    0          3   IVL
 90 033e2d58    0          3   IVC
 91 033e2d6c    0          3   ivl
 92 033e2d80    0          3   ivc
 93 033e2d94    0         13   0409:00000409
 94 033e2dbc    0         50   System\CurrentControlSet\Control\Nls\RegionMapping
 95 033e3084    0         18   Gregorian Calendar
 96 033e30b8    0         10   MM/dd/yyyy
 97 033e30dc    0         10   yyyy-MM-dd
 98 033e3100    0         18   dddd, dd MMMM yyyy
 99 033e3134    0          9   yyyy MMMM
100 033e3154    0          7   MMMM dd
101 033e3170    0          4   A.D.
102 033e3188    0          2   AD
103 033e319c    0          6   Sunday
104 033e31b8    0          6   Monday
105 033e31d4    0          7   Tuesday
106 033e31f0    0          9   Wednesday
107 033e3210    0          8   Thursday
108 033e3230    0          6   Friday
109 033e324c    0          8   Saturday
110 033e326c    0          3   Sun
111 033e3280    0          3   Mon
112 033e3294    0          3   Tue
113 033e32a8    0          3   Wed
114 033e32bc    0          3   Thu
115 033e32d0    0          3   Fri
116 033e32e4    0          3   Sat
117 033e32f8    0          2   Su
118 033e330c    0          2   Mo
119 033e3320    0          2   Tu
120 033e3334    0          2   We
121 033e3348    0          2   Th
122 033e335c    0          2   Fr
123 033e3370    0          2   Sa
124 033e3384    0          7   January
125 033e33a0    0          8   February
126 033e33c0    0          5   March
127 033e33d8    0          5   April
128 033e33f0    0          3   May
129 033e3404    0          4   June
130 033e341c    0          4   July
131 033e3434    0          6   August
132 033e3450    0          9   September
133 033e3470    0          7   October
134 033e348c    0          8   November
135 033e34ac    0          8   December
136 033e34cc    0          3   Jan
137 033e34e0    0          3   Feb
138 033e34f4    0          3   Mar
139 033e3508    0          3   Apr
140 033e351c    0          3   Jun
141 033e3530    0          3   Jul
142 033e3544    0          3   Aug
143 033e3558    0          3   Sep
144 033e356c    0          3   Oct
145 033e3580    0          3   Nov
146 033e3594    0          3   Dec
147 033e3758    0          6   zh-CHS
148 033e3774    0          6   zh-CHT
149 033e3790    0          5   zh-CN
150 033e3824    0          5   zh-cn
151 033e39e4    0          5   zh-CN
152 033e39fc    0          5   zh-CN
153 033e3a14    0          5   zh-CN
154 033e3a2c    0          5   zh-CN
155 033e3a44    0          5   zh-TW
156 033e3a5c    0          5   zh-CN
157 033e3ad4    0          5   zh-CN
158 033e3b48    0          6   format
159 033e3b64    0          4   args
160 033e3da8    0          1   \
161 033e3db8    0          3   936
162 033e3dcc    0          1   3
163 033e3ddc    0          1   2
164 033e3dec    0          1   0
165 033e3dfc    0          1   0
166 033e3e0c    0         24   NLS_CodePage_936_3_2_0_0
167 033e3eec    0          8   encoding
168 033e3f0c    0          6   stream
169 033e437c    0          5   bytes
170 033e4394    0          5   chars
171 033e43ac    0          9   charCount
172 033e43cc    0          9   charIndex
173 033e43ec    0          9   byteCount
174 033e4b5c    0          5   count
175 033e4b74    0          6   offset
176 ---------------------------------------
复制代码

      14、使用 !mlocks 命令,查看是否有死锁问题。

复制代码
 1 0:000> !mlocks
 2 Examining SyncBlocks...
 3 Scanning for ReaderWriterLock instances...
 4 Scanning for holders of ReaderWriterLock locks...
 5 Scanning for ReaderWriterLockSlim instances...
 6 Scanning for holders of ReaderWriterLockSlim locks...
 7 Examining CriticalSections...
 8 
 9 ClrThread  DbgThread  OsThread    LockType    Lock      LockLevel
10 ----------------------------------------------------------------------
11 0x1        0          0x4450      thinlock    033e4f50  (recursion:0)
复制代码

      15、我们可以使用 qq 命令退出 Windebug 。红色字体表示要执行的命令。

复制代码
1 windbg> qq
2 NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\Visualizers\atlmfc.natvis'
3 NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\Visualizers\ObjectiveC.natvis'
4 NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\Visualizers\concurrency.natvis'
5 NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\Visualizers\cpp_rest.natvis'
6 NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2210.3001.0_x64__8wekyb3d8bbwe\x86\Visualizers\stl.natvis'
复制代码


三、结束语
    学无止境,还有很多,以后会慢慢来的。不学不知道,一学吓一跳,发现很多以前概念性的东西,现在变得更具体得了,知道托管堆是什么样子了。但是学的越多,好像懂得越少,没办法,我们只能无限努力,不忘初心,重新启程。老天不会辜负努力的人。

 

【出处】:https://www.cnblogs.com/PatrickLiu/p/17152287.html