언어 설정

Menu
Sites
Language
Crash Call Stack

Is there any way to get any useful information out of the call stack?  I just get a bunch of memory addresses for the executable and cryptically named so files.  Can I link the source in some way so the memory addresses match to the source and so it shows the actual stack trace with function names?

Edited by: Brock Boland on 17 3월, 2014 Reason: Paragraph tags added automatically from tizen_format_fix module.

Responses

1 댓글
Pushpa G
Hi benpopenpath, You can use the valgrind tool to get the function name and memory address where the issue has happened like memory leaks,etc. Refer to Tizen IDE>Help>Help contents>Tizen Native App Programming > IDE and Tools > Native IDE Valgrind. And also in crash log, you can see that the name of the variable, class or function will be given in which crash has happened Thanks,