How do symbols affect call stack walking?
问题 I'm trying to analyze a crash dump with windbg, and I'm getting inconstant crash dumps depending on what symbols are loaded. My simple understanding is that the symbols only help point to what the stack is referring to, but the stack itself is unchanged. That's obviously wrong, but now I don't know what the heck I'm looking at. Heres a call stack with all symbols loaded: 0:000> kn # ChildEBP RetAddr 00 0012e120 7d61f60f ntdll!ZwGetContextThread+0x12 01 0012e130 000f0005 ntdll!RtlFreeHeap