Glibc provides the very handy backtrace()
and backtrace_symbols()
functions, which can help getting the stack trace of the current function programmatically (see here).
Does the Windows API provide any similar functions?
Glibc provides the very handy backtrace()
and backtrace_symbols()
functions, which can help getting the stack trace of the current function programmatically (see here).
Does the Windows API provide any similar functions?
Yes, take a look at the function CaptureStackBackTrace(). Use SymFromAddr() and its counterparts to get meaningful symbol names.
© 2022 - 2024 — McMap. All rights reserved.