+ -
当前位置:首页 → 问答吧 → AIX core dump不会看,请帮忙

AIX core dump不会看,请帮忙

时间:2010-06-28

来源:互联网

dbx /home/bocskt/boc_skt/bin/data_ebil /home/bocskt/boc_skt/bin/core
Type 'help' for help.
[using memory image in /home/bocskt/boc_skt/bin/core]
reading symbolic information ...
warning: Unable to access address 0x6c6400fffffffa00 from core

Segmentation fault in strncmp.strncmp [/usr/lib/libc.a] at 0x900000000020488 ($t1)
0x900000000020488 (strncmp+0x2 88a40001         lbz   r5,0x1(r4)
(dbx) where
strncmp.strncmp(??, ??, ??) at 0x900000000020488
(dbx) listi strncmp
1. strncmp.strncmp [/usr/lib/libc.a]
2. strncmp.strncmp [/usr/ccs/bin/usla64]
Select one of [1 - 2]: 1
0x900000000020460 (strncmp)      7c232040        cmpl   cr0,0x1,r3,r4
0x900000000020464 (strncmp+0x4)  28a50000       cmpli   cr1,0x1,r5,0x0
0x900000000020468 (strncmp+0x  4182003c         beq   0x9000000000204a4 (strncmp+0x44)
0x90000000002046c (strncmp+0xc)  3863ffff        addi   r3,-1(r3)
0x900000000020470 (strncmp+0x10) 40850034         ble   cr1,0x9000000000204a4 (strncmp+0x44)
0x900000000020474 (strncmp+0x14) 3884ffff        addi   r4,-1(r4)
0x900000000020478 (strncmp+0x1 7ca903a6       mtctr   r5
0x90000000002047c (strncmp+0x1c) 60210000         ori   r1,r1,0x0
0x900000000020480 (strncmp+0x20) 88030001         lbz   r0,0x1(r3)
0x900000000020484 (strncmp+0x24) 38630001        addi   r3,0x1(r3)
(dbx) registers
  $r0:0x0000000000000054  $stkp:0x0fffffffffff9e20   $toc:0x09001000a007f0b8  
  $r3:0x0000000110002b0c    $r4:0x32382e6c6f673146    $r5:0x000000000000000a  
  $r6:0x000000003832342c    $r7:0x000000003936352e    $r8:0x0000000034352000  
  $r9:0x0fffffffffffe9d4   $r10:0x0ffffffffffff6c8   $r11:0x0ffffffffffff6d7  
$r12:0x09001000a00732a0   $r13:0x000000011001a3d8   $r14:0x0000000000000005  
$r15:0x0ffffffffffffa70   $r16:0x0ffffffffffffaa0   $r17:0x0800200140000000  
$r18:0x0ffffffffffffed0   $r19:0x09fffffff000c4a8   $r20:0xbadc0ffee0ddf00d  
$r21:0xbadc0ffee0ddf00d   $r22:0xbadc0ffee0ddf00d   $r23:0xbadc0ffee0ddf00d  
$r24:0xbadc0ffee0ddf00d   $r25:0xbadc0ffee0ddf00d   $r26:0xbadc0ffee0ddf00d  
$r27:0xbadc0ffee0ddf00d   $r28:0x0000000110002b00   $r29:0x0000000110002b00  
$r30:0x00000001000077c8   $r31:0x32382e6c6f672e6f  
$iar:0x0900000000020488   $msr:0xa00000000000d032    $cr:0x84484224  
$link:0x000000010000200c   $ctr:0x000000000000000a   $xer:0x0000000f  


          Condition status = 0:l 1:g 2:g 3:l 4:g 5:e 6:e 7:g
        [unset $noflregs to view floating point registers]
        [unset $novregs to view vector registers]
        [unset $novsregs to view vector scalar registers]
in strncmp.strncmp [/usr/lib/libc.a] at 0x900000000020488 ($t1)
0x900000000020488 (strncmp+0x2 88a40001         lbz   r5,0x1(r4)
(dbx) print $r4
0x32382e6c6f673146
(dbx) print $r5
0x000000000000000a
(dbx)

作者: wuqiang97   发布时间: 2010-06-28

我也不会看,好像断在是strncmp()这个函数里了,查查手册怎么用dbx显示调用堆栈,查下是程序代码部分哪一行调用的这个strncmp()。

作者: 没本   发布时间: 2010-06-28

在gdb里面是用up看调用堆栈上一个函数,你找找dbx里对应的。

作者: 没本   发布时间: 2010-06-28

段错误了,堆栈已经被破坏了。所以看不了

作者: guojianlee   发布时间: 2010-06-29

热门下载

更多