Menu
Sites
Language
Crash Call Stack

Is there any way to get any useful information out of the call stack?  I just get a bunch of memory addresses for the executable and cryptically named so files.  Can I link the source in some way so the memory addresses match to the source and so it shows the actual stack trace with function names?

Edited on 18 03, 2014

Responses

1 Replies
Pushpa G
Hi benpopenpath, You can use the valgrind tool to get the function name and memory address where the issue has happened like memory leaks,etc. Refer to Tizen IDE>Help>Help contents>Tizen Native App Programming > IDE and Tools > Native IDE Valgrind. And also in crash log, you can see that the name of the variable, class or function will be given in which crash has happened Thanks,