test_debug_id_resolving.pysnap 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172
  1. ---
  2. source: tests/symbolicator/test_payload_full.py
  3. ---
  4. contexts:
  5. device:
  6. arch: x86
  7. type: device
  8. os:
  9. build: ''
  10. name: Windows
  11. type: os
  12. version: 10.0.14393
  13. debug_meta:
  14. images:
  15. - arch: x86
  16. candidates:
  17. - debug:
  18. status: ok
  19. download:
  20. features:
  21. has_debug_info: true
  22. has_sources: false
  23. has_symbols: true
  24. has_unwind_info: true
  25. status: ok
  26. location: sentry://project_debug_file/x
  27. source: sentry:project
  28. source_name: Sentry
  29. code_file: C:\projects\breakpad-tools\windows\Release\crash.exe
  30. debug_id: 3249d99d-0c40-4931-8610-f4e4fb0b6936-1
  31. debug_status: found
  32. features:
  33. has_debug_info: true
  34. has_sources: false
  35. has_symbols: true
  36. has_unwind_info: true
  37. image_addr: '0x2a0000'
  38. image_size: 36864
  39. type: symbolic
  40. errors: []
  41. exception:
  42. values:
  43. - raw_stacktrace:
  44. frames:
  45. - data:
  46. orig_in_app: -1
  47. symbolicator_status: null
  48. function: <unknown>
  49. in_app: false
  50. instruction_addr: '0x2a2a3d'
  51. lineno: null
  52. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  53. symbol: null
  54. trust: null
  55. stacktrace:
  56. frames:
  57. - data:
  58. orig_in_app: -1
  59. symbolicator_status: symbolicated
  60. function: main
  61. in_app: false
  62. instruction_addr: '0x2a2a3d'
  63. lineno: 35
  64. package: C:\projects\breakpad-tools\windows\Release\crash.exe
  65. symbol: main
  66. trust: null
  67. thread_id: 1636
  68. type: EXCEPTION_ACCESS_VIOLATION_WRITE
  69. value: 'Fatal Error: EXCEPTION_ACCESS_VIOLATION_WRITE'
  70. stacktrace: null
  71. threads:
  72. values: []