如何检查崩溃堆栈?

时间:2019-04-17 11:46:37

标签: crash callstack

我的应用程序因以下调用堆栈而崩溃

Signal 11 caught. Backtrace:
1: /opt/myapp/bin64/libdatacore.so(_ZN10Thread11TrapEi+0x117) [0x7f1bd84f8267]
2: /lib64/libpthread.so.0(+0xf370) [0x7f1bd2cc7370]
3: /opt/myapp/bin64/libcoverage.so.2(+0x3dfe) [0x7f1bcdae6dfe]
4: /opt/myapp/bin64/libcoverage.so.2(+0x682c) [0x7f1bcdae982c]
5: /opt/myapp/bin64/libcoverage.so.2(+0x84ed) [0x7f1bcdaeb4ed]
6: /opt/myapp/bin64/libcoverage.so.2(+0x54d2) [0x7f1bcdae84d2]
7: /opt/myapp/bin64/libcoverage.so.2(+0x321d) [0x7f1bcdae621d]
8: /opt/myapp/bin64/protocol2.so.2(+0x92807) [0x7f1bcce3f807]
9: /opt/myapp/bin64/protocol2.so.2(+0x8c703) [0x7f1bcce39703]
10: /opt/myapp/bin64/protocol2.so.2(+0x8d33b) [0x7f1bcce3a33b]
11: /opt/myapp/bin64/protocol2.so.2(+0x95929) [0x7f1bcce42929]
12: /opt/myapp/bin64/protocol2.so.2(+0x8d978) [0x7f1bcce3a978]
13: /opt/myapp/bin64/protocol2.so.2(freerdp_check_fds+0x29) [0x7f1bcce23719]
14: /opt/myapp/bin64/protocol2.so.2(freerdp_check_event_handles+0x10) [0x7f1bcce24550]
15: /opt/myapp/bin64/libclient2.so.2(+0x18cb) [0x7f1bcdef98cb]
16: /opt/myapp/bin64/libwindows2.so.2(+0x7993a) [0x7f1bcd85093a]
17: /lib64/libpthread.so.0(+0x7dc5) [0x7f1bd2cbfdc5]
18: /lib64/libc.so.6(clone+0x6d) [0x7f1bd017073d]

它似乎在第3帧崩溃,地址为(+ 0x3dfe)[0x7f1bcdae6dfe] 如何在源代码中找到与以下地址相对应的函数? 我有该函数的源代码,但无法在调试中构建

0 个答案:

没有答案