怎么解决Stack overflow at line:0

  • 时间:
  • 浏览:22
  • 来源:卢松博客 - 专注共享沐颜博客活动

使用QQ登陆,享用更多功能,你要轻松玩转社区。

您还要 登录 可否否下载或查看,这么帐号?免费注册

x

昨天在打开网站时提示:“Stack overflow at line:0”对话框,不知是哪几种意思,网站都打不开了,统统到网上查了一下,下面就问大伙 介绍。

Stack overflow at line:0是哪几种意思?

当线程运行到第0行时,堆栈溢出。有肯能有你在身边的内存不到负荷打开本来的网页了,造成了"堆栈的益出" 建议你杀杀毒肯能用优化大师清理清理电脑。肯能是说你的js代码有死循环肯能哪几种严重消耗资源的代码被IE提前检测出来..就会突然出现此对话框.function alert(){ alert("1"); }此函数明显为无限递归函数..是俩个 死循环..办法 一

造成了"堆栈的益出",在IE的【Internet选项】的【高级】里禁用脚本调试,试试 开始 ...运行,入REGSVR32 URLMON.DLL,回车后重启系统,后来进入IE的“工具”→“Internet选项”→ “线程”,单击“重置Web设置”按纽就行啦 以上是某神人的答案我试了很有用,不过我是直接【禁用脚本调试】后来【重置】的,肯能后面 的看不懂,但成功了然后来家的【重置】是在IE的“工具”→“Internet选项”→ “高级”,里的

办法 二

很简单的俩个 哪几种的问题图片,浏览器肯能突然出现"stack overflow at line:0"后来这些图片无法显示的哪几种的问题图片,是肯能注册表被串改了。这是肯能pngfilt.dll哪几种的问题图片。

防止办法 :开始 菜单--线程--附件--记事本 ,打开记事本把下面的东西克隆进去,随便取个名字,后来把后缀名改成.reg,另存为到桌面,后来开打点“是” OK 哪几种的问题图片防止~




代码如下:


  1. Windows Registry Editor Version 5.00



  2. ;PNG file association fix for Windows XP

  3. ;Created on May 17, 10007 by Ramesh Srinivasan

  4. [HKEY_CLASSES_ROOT\.PNG]

  5. "PerceivedType"="image"

  6. @="pngfile"

  7. "Content Type"="image/png"

  8. [HKEY_CLASSES_ROOT\.PNG\PersistentHandler]

  9. @="{098f2470-bae0-11cd-b579-0100002b1000bfeb}"

  10. [HKEY_CLASSES_ROOT\pngfile]

  11. @="PNG Image"

  12. "EditFlags"=dword:000100000

  13. "FriendlyTypeName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,\

  14. 00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,\

  15. 32,00,5c,00,73,00,68,00,69,00,6d,00,67,00,76,00,77,00,2e,00,64,00,6c,00,6c,\

  16. 00,2c,00,2d,00,33,00,1000,00,35,00,00,00

  17. "ImageOptionFlags"=dword:00000003

  18. [HKEY_CLASSES_ROOT\pngfile\CLSID]

  19. @="{25336920-03F9-11cf-8FD0-00AA00686F13}"

  20. [HKEY_CLASSES_ROOT\pngfile\DefaultIcon]

  21. @="shimgvw.dll,2"

  22. [HKEY_CLASSES_ROOT\pngfile\shell]

  23. @="open"

  24. [HKEY_CLASSES_ROOT\pngfile\shell\open]

  25. "MuiVerb"="@shimgvw.dll,-51000"

  26. [HKEY_CLASSES_ROOT\pngfile\shell\open\command]

  27. @="rundll32.exe C:\\WINDOWS\\system32\\shimgvw.dll,ImageView_Fullscreen %1"

  28. [HKEY_CLASSES_ROOT\pngfile\shell\open\DropTarget]

  29. "Clsid"="{E84FDA7C-1D6A-45F6-B725-CB21000C23100066}"

  30. [HKEY_CLASSES_ROOT\pngfile\shell\printto]

  31. [HKEY_CLASSES_ROOT\pngfile\shell\printto\command]

  32. @="rundll32.exe C:\\WINDOWS\\system32\\shimgvw.dll,ImageView_PrintTo /pt "%1" "%2" "%3" "%4""

  33. [HKEY_CLASSES_ROOT\SystemFileAssociations\.PNG]

  34. "ImageOptionFlags"=dword:00000003

  35. [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.PNG]

  36. [-HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/x-png]

  37. [-HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/png]

  38. [HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/x-png]

  39. "Extension"=".png"

  40. "Image Filter CLSID"="{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}"

  41. [HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/x-png\Bits]

  42. "0"=hex:08,00,00,00,ff,ff,ff,ff,ff,ff,ff,ff,89,1000,4e,47,0d,0a,1a,0a

  43. [HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/png]

  44. "Extension"=".png"

  45. "Image Filter CLSID"="{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}"

  46. [HKEY_CLASSES_ROOT\Mime\Database\Content Type\image/png\Bits]

  47. "0"=hex:08,00,00,00,ff,ff,ff,ff,ff,ff,ff,ff,89,1000,4e,47,0d,0a,1a,0a

  48. [HKEY_CLASSES_ROOT\CLSID\{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}]

  49. @="CoPNGFilter Class"

  50. [HKEY_CLASSES_ROOT\CLSID\{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}\InProcServer32]

  51. @="C:\\WINDOWS\\system32\\pngfilt.dll"

  52. "ThreadingModel"="Both"

  53. [HKEY_CLASSES_ROOT\CLSID\{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}\ProgID]

  54. @="PNGFilter.CoPNGFilter.1"

  55. [HKEY_CLASSES_ROOT\PNGFilter.CoPNGFilter]

  56. @="CoPNGFilter Class"

  57. [HKEY_CLASSES_ROOT\PNGFilter.CoPNGFilter\CLSID]

  58. @="{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}"

  59. [HKEY_CLASSES_ROOT\PNGFilter.CoPNGFilter.1]

  60. @="CoPNGFilter Class"

  61. [HKEY_CLASSES_ROOT\PNGFilter.CoPNGFilter.1\CLSID]

  62. @="{A3CCEDF7-2DE2-11D0-86F4-00A0C913F71000}"
克隆代码