Why does the Windows debugger engine show a bunch of hex digits after one of the DLL names?
Источник: The Old New Thing
Источник: The Old New Thing
The Old New Thing
Why does the Windows debugger engine show a bunch of hex digits after one of the DLL names?
You’re using the Windows debugger engine, say ntsd or windbg, and some DLLs come with hex digits after their names. What’s up with that? contoso_7ffe7d0e0000!GetWidgetName: 00007ffe`7d0e2f50 488bc4 mov rax,rsp 00007ffe`7d0e2f53 48895808 mov qword…
Embracing User Defined Literals Safely for Types that Behave as though Built-in - Pablo Halpern
Источник: CppCon
Источник: CppCon
YouTube
Embracing User Defined Literals Safely for Types that Behave as though Built-in - Pablo Halpern
https://cppcon.org/
https://github.com/CppCon/CppCon2021
---
A fundamental design goal of C++ is to minimize the expressive differences between built-in types and user-defined types (UDTs). Just as we can overload `operator+` for our UDT, we can also specify…
https://github.com/CppCon/CppCon2021
---
A fundamental design goal of C++ is to minimize the expressive differences between built-in types and user-defined types (UDTs). Just as we can overload `operator+` for our UDT, we can also specify…
C++ Templates: How to Iterate through std::tuple: the Basics--Bartlomiej Filipek
Источник: isocpp.org (Standard C++)
Источник: isocpp.org (Standard C++)
Gotcha: C++/WinRT weak_ref.get() doesn’t get the weak reference; it gets the strong reference
Источник: The Old New Thing
Источник: The Old New Thing
The Old New Thing
Gotcha: C++/WinRT weak_ref.get() doesn't get the weak reference; it gets the strong reference - The Old New Thing
If you have a winrt::com_ptr<T>, you can call the get() method to obtain the raw COM pointer inside it. This is handy if you need to pass that raw pointer along to another method that wants raw pointers. The winrt::weak_ref<T> also has a get() method,