Home > Software engineering >  When programming with c language interrupt
When programming with c language interrupt

Time:10-09

"12. Exe:" loaded "I: \ \ programming learning programming practice 12 \ Debug \ \ 12. Exe", loaded symbols,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ NTDLL DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ kernel32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ KernelBase DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ user32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ gdi32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ msimg32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ comdlg32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ winspool DRV", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ advapi32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ shell32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C:\Windows\WinSxS\x86_microsoft.windows.com mon - controls_6595b64144ccf1df_6. 0.9600.18006 _none_a9ec6aab013aafee \ comctl32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ shlwapi DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ ole32 DLL", loaded symbols,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ oleaut32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ oledlg DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ WinSxS \ x86_microsoft Windows. Gdiplus_6595b64144ccf1df_1. 1.9600.18405 _none_dad773c85bcd115f \ GdiPlus DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ oleacc DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ imm32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ winmm DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ MSVCRT DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ sechost DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ rpcrt4 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ combase DLL", loaded symbols,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ MSCTF DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ winmmbase DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ sspicli DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ cfgmgr32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ devobj DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ SHCore DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ cryptbase DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ bcryptprimitives DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ nvinit DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ version DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Program Files \ NVIDIA Corporation (x86) \ coprocmanager \ detoured DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Program Files \ NVIDIA Corporation (x86) \ coprocmanager \ nvd3d9wrap DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ setupapi DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Program Files \ NVIDIA Corporation (x86) \ coprocmanager \ nvdxgiwrap DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ uxtheme DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ dwmapi DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ kernel appcore. DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ cryptsp DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ rsaenh DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ bcrypt DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ clbcatq DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ SogouTSF ime", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ ntmarta DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ SogouPY ime", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ ws2_32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ nsi DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Program Files \ (x86) sogoupinyin \ 8.0.0.7885 \ Resource DLL", not using the debug information generated binaries,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ psapi DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Program Files \ sogoupinyin \ Components (x86) \ PicFace \ 1.0.0.1455 \ PicFace DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ profapi DLL", loaded symbol () to remove the source information,
Thread 'Win32 threads (0 xa454) have withdrawn, the return value is zero (0 x0),
"12. Exe:" loaded "C: \ Users \ WUCQ \ AppData \ Roaming \ TaobaoProtect \ TaobaoProtectSE DLL", always find or open the PDB file
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ crypt32 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ SFC DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ msasn1 DLL", loaded symbol () to remove the source information,
"12. Exe:" loaded "C: \ Windows \ SysWOW64 \ sfc_os DLL", loaded symbol () to remove the source information,
Second Chance an Assertion Failed: the File c: \ program files \ Microsoft visual studio (x86) vc 10.0 \ \ atlmfc \ include \ atlimage h, Line 958
12. Exe has triggered a breakpoint

CodePudding user response:

The Debug Debug mode to open the call stack, look at the function call stack, find the error function first ~

CodePudding user response:

Stop where to go ah, commissioning,

CodePudding user response:

Collapsed in the pop-up dialog box, press the corresponding button to enter debugging press Alt + 7 key to view the Call Stack, namely "the Call Stack" from the inside to the following out of from the inner to outer function Call history, double-click a row to the cursor to the Call of the source code or assembly instruction, don't understand when double click on the next line, until we can read ,
  • Related