查找崩溃的函数名称
我们从客户网站收到了类似这样的崩溃日志(无函数名称解析)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] XXXX.exe 在 001B:77E4BEE7 处导致模块内
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
1 月 13 日 12:15:41.739 ccodvcs2 VCS:[0x00003e80] 版本 5.2.0.426
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 工作集大小: 296443904 字节
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] EAX=7E5CCF88 EBX=00000000 ECX=00000000 EDX=7E5CD030 ESI=7E5CD010
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] EDI=00000000 EBP=7E5CCFD8 ESP=7E5CCF84 EIP=77E4BEE7 FLG=00000206
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] CS=001B DS=0023 SS=0023 ES=0023 FS=003B GS=0000
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:77E4BEE7 (0xE06D7363 0x00000001 0x00000003 0x7E5CD004)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:007339C1 (0x7E5CD030 0x00867174 0x823D8B58 0x7E5CD388)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:0072E769 (0x5832EF90 0x823D8AF0 0x00DF7118 0x00F97A38)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004CB6CE (0x5832EF90 0x00F979F8 0x00000000 0x5832EF90)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004D713C (0x00000002 0x582F5C50 0x823D8930 0x7E5CD1D8)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004D681A (0x08A9F398 0x823D89FC 0x7E5CD388 0x007C8B64)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004BD21E (0x823D89C4 0x823D89C8 0x00000000 0x08A9F398)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:00402157 (0x823D8838 0x0370B910 0x7E5CD2B8 0x7E5CD2B8)
1 月 13 日 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:0052AF9C (0x7E5CD370 0x823D8814 0x00F95F98 0x0367E120)
我有一个针对所有 Dll 和 EXE 本身的相应 PDB。如何找到堆栈上函数的名称?似乎是一个非常有用的东西,但我无法在网络上看到任何重点信息,
我尝试转储 PDB 文件,但那里的地址与崩溃中出现的内容不对应。
We received a crash log from customer's site looking like that(no function name resolution)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] XXXX.exe caused a in module at 001B:77E4BEE7
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] Build 5.2.0.426
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] WorkingSetSize: 296443904 bytes
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] EAX=7E5CCF88 EBX=00000000 ECX=00000000 EDX=7E5CD030 ESI=7E5CD010
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] EDI=00000000 EBP=7E5CCFD8 ESP=7E5CCF84 EIP=77E4BEE7 FLG=00000206
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] CS=001B DS=0023 SS=0023 ES=0023 FS=003B GS=0000
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80]
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:77E4BEE7 (0xE06D7363 0x00000001 0x00000003 0x7E5CD004)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:007339C1 (0x7E5CD030 0x00867174 0x823D8B58 0x7E5CD388)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:0072E769 (0x5832EF90 0x823D8AF0 0x00DF7118 0x00F97A38)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004CB6CE (0x5832EF90 0x00F979F8 0x00000000 0x5832EF90)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004D713C (0x00000002 0x582F5C50 0x823D8930 0x7E5CD1D8)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004D681A (0x08A9F398 0x823D89FC 0x7E5CD388 0x007C8B64)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:004BD21E (0x823D89C4 0x823D89C8 0x00000000 0x08A9F398)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:00402157 (0x823D8838 0x0370B910 0x7E5CD2B8 0x7E5CD2B8)
Jan 13 12:15:41.739 ccodvcs2 VCS: [0x00003e80] 001B:0052AF9C (0x7E5CD370 0x823D8814 0x00F95F98 0x0367E120)
I have a corresponding PDB for all Dll's and EXE itself. how can I find the names of the functions on stack? Seems like a pretty useful thing but I couldn't be able to see any focused information on web,
I have tried to dump PDB file but addresses there do not correspond to what appears in crash.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
使用 windbg 打开程序并输入
etc。
Open the program with windbg and type
etc.