![]() |
HTTP-ANALYZE 2.0 BUG REPORT |
Open a Call |
Please use this form to open a call and submit a bug report. Note: Only registered customers are entitled to open calls and submit bug reports this way. You will be asked for your username and password to access the extended support area on our web site. |
Core dumps | In case of core dumps, please check the Customer Support section first there is a rollup patch available already. Please do not send us the core dump itself, but rather list the stack backtrace using a symbolic debugger such as sdb, dbx, or gdb. This stack backtrace can show the exact location of the crash. To create a stack backtrace, follow these steps (since different systems have different symbolic debuggers, the following commands may not work literally on your platform, but you probably have another debugger such as sdb, gdb, or even adb which use similar commands to list a stack backtrace:
Include this stack backtrace together with a short description what you did in the bug report above. Note : If the debugger is not able to tell you the location of the crash, this means that the frame and stack pointers got corrupted. In this case, the use of a debugger isn't much help. |