From: sandmann AT clio DOT rice DOT edu (Charles W. Sandmann) Subject: Re: debugging Ghostscript and using symify To: turnbull AT shako DOT sk DOT tsukuba DOT ac DOT jp (Stephen Turnbull) Date: Tue, 18 Jan 1994 09:24:17 -0600 (CST) Cc: djgpp AT sun DOT soe DOT clarkson DOT edu, beta AT qdeck DOT com, ghostscript AT aladdin DOT com > (2) I occasionally get a crash with a backtrace, and would > like to figure out what routines have been called. As I understand > symify, all I need to do is run "symify gs.exe" after the crash > (gs.exe is a stubbed executable). However, all I get are the same > hexadecimal locations that were produced by GO32 after the crash. You won't get any information if you strip the image. You get better information with -g (real line numbers instead of PC offsets from routine names).