Mail Archives: djgpp/1994/01/18/11:19:59

From: sandmann AT clio DOT rice DOT edu (Charles W. Sandmann)
Subject: Re: debugging Ghostscript and using symify
To: turnbull AT shako DOT sk DOT tsukuba DOT ac DOT jp (Stephen Turnbull)
Date: Tue, 18 Jan 1994 09:24:17 -0600 (CST)
Cc: djgpp AT sun DOT soe DOT clarkson DOT edu, beta AT qdeck DOT com, ghostscript AT aladdin DOT com

>     (2) I occasionally get a crash with a backtrace, and would
> like to figure out what routines have been called.  As I understand
> symify, all I need to do is run "symify gs.exe" after the crash
> (gs.exe is a stubbed executable).  However, all I get are the same
> hexadecimal locations that were produced by GO32 after the crash.

You won't get any information if you strip the image.  You get better
information with -g (real line numbers instead of PC offsets from routine

- Raw text -

  webmaster     delorie software   privacy  
  Copyright 2019   by DJ Delorie     Updated Jul 2019