您要查找的是不是:
- An operation caused a stack overflow. 某个操作产生堆栈溢出。
- Specifies that a stack overflow error has occurred. 指定已发生堆栈溢出错误。
- The request must be handled by the stack overflow code. 本请求必须由堆栈溢出代码处理。
- Warning C6255: _alloca indicates failure by raising a stack overflow exception. 警告C6255:_alloca通过引发堆栈溢出异常表明失败。
- Contains values that indicate the underlying cause of a stack overflow event. 包含指示堆栈溢出事件的根本原因的值。
- Fix for stack overflow vulnerability which could allow arbitrary code execution. 修复了一个可能导致执行任意代码的缓冲区溢出漏洞。
- To disable stack overflow probing, add the following to your application configuration file. 若要禁用堆栈溢出探测,请将下面的代码添加到应用程序配置文件中。
- Recursion too deep; the stack overflowed. 递归太深;堆栈溢出。
- Consequently, users are advised to write their code to detect and prevent a stack overflow. 因此,建议用户编写自己的代码以检测和防止堆栈溢出。
- You cannot catch stack overflow exceptions, because the exception-handling code may require the stack. 您无法捕捉堆栈溢出异常,因为异常处理代码可能需要堆栈。
- When the stack is severely constrained, the probing can itself cause a stack overflow. 当堆栈受到严重约束时,该探测可自己导致堆栈溢出。
- Kern-Exec 3 crashes are often caused due to stack corruption or stack Overflow, prefer the use of heap to the stack. 还经常由栈崩溃、栈溢出引起。对于这种情况,推荐使用堆而非栈。
- Invalid setting in the MSDOS.SYS An internal stack overflow has caused this session to be halted MSDOS. SYS文件中无效的设置选项。
- Invalid setting in the MSDOS.SYS file:An internal stack overflow has caused this session to be halted MSDOS. SYS文件中无效的设置选项。
- Invalid setting in the MSDOS.SYS file:An internal stack overflow hascaused this session to be halted MSDOS. SYS文件中无效的维护选项。
- When modified the original code from the stack overflow, can not achieve the demands of the problem. 修改原代码退出时堆栈溢出、无法实现需求的功能之问题。
- While this was a convenient way to interoperate with native code, handles could be leaked by asynchronous exceptions, such as a thread aborting unexpectedly or a stack overflow. 虽然这样可以方便地与本机代码交互操作,但是句柄可能会由异步异常泄漏,如线程意外中止或堆栈溢出。
- However, that practice is currently discouraged because significant additional code is required to reliably catch a stack overflow exception and continue program execution. 但是,现在我们建议不要使用这种做法,原因是需要大量附加代码才能可靠地捕获堆栈溢出异常并继续执行程序。
- Array ADT, struct and union, polynomial ADT, spare matrix ADT, string, pointer, single linked list, linked stack and queue, linked polynomial, double linked list. 数组ADT;结构体和公用体;多项式ADT;稀疏矩阵ADT;多维数组ADT;串。指针;单链表;链表实现堆栈和队列;链表实现多项式;链表的附加操作;双向链表。
- In the figure, the left column represents an upwardly linked stack of kernel DEVICE_OBJECT structures, all of which relate to how the system manages a single piece of hardware. 在本图中,左边一列描绘了一个内核DEVICE_OBJECT结构的向上链接堆栈,这些全都依赖于系统如何管理一个单一硬件。