I have a crash dump of unmanaged C ++ code.
I opened it with Windbg, set the symbol path and source path. Ran! Parse -v and get the next stack trace
STACK_TEXT: 094efec0 7439fdc8 8b6ac787 00000000 00000000 WINSPAMCATCHER!_invalid_parameter_noinfo+0xc [f:\dd\vctools\crt_bld\self_x86\crt\src\invarg.c @ 125] 094eff3c 743a005e 085c37d8 74547d66 085c37d8 WINSPAMCATCHER!SpamCatcher::SCEngine::ruleUpdateLoop+0x338 094eff44 74547d66 085c37d8 8b6ac637 00000000 WINSPAMCATCHER!SpamCatcher::SCEngine::ruleUpdateLoopWrapperWin+0xe 094eff7c 74547e0e 00000000 094eff94 771df13c WINSPAMCATCHER!_callthreadstartex+0x1b [f:\dd\vctools\crt_bld\self_x86\crt\src\threadex.c @ 348] 094eff88 771df13c 091707c8 094effd4 7769d80d WINSPAMCATCHER!_threadstartex+0x82 [f:\dd\vctools\crt_bld\self_x86\crt\src\threadex.c @ 326] WARNING: Stack unwind information not available. Following frames may be wrong. 094eff94 7769d80d 091707c8 7e3e52db 00000000 kernel32+0x8f13c 094effd4 7769da1f 74547d8c 091707c8 00000000 ntdll+0x7d80d 094effec 00000000 74547d8c 091707c8 00000000 ntdll+0x7da1f
From the previous stack trace, I don't see the line number SCEngine :: ruleUpdateLoop + 0x338. Instead, I see an offset of 0x338. I guess this is some kind of assembly offset. Is it possible to find the line number corresponding to this offset using windbg?
source share