X-Authentication-Warning: delorie.com: mail set sender to djgpp-bounces using -f X-Recipient: djgpp AT delorie DOT com From: "Gerrit van Niekerk" Organization: GPvNO To: Simone Navari , djgpp AT delorie DOT com Date: Tue, 29 Jan 2008 11:31:05 +0200 MIME-Version: 1.0 Subject: Re: Question about traceback with no debug info Message-ID: <479F0E79.3344.14C18644@gerritvn.gpvno.co.za> In-reply-to: <6a087811-43c3-43bd-a7e1-2e801dae6ec0@1g2000hsl.googlegroups.com> References: , <6a087811-43c3-43bd-a7e1-2e801dae6ec0 AT 1g2000hsl DOT googlegroups DOT com> X-mailer: Pegasus Mail for Windows (4.41) Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7BIT Content-description: Mail message body Reply-To: djgpp AT delorie DOT com Errors-To: nobody AT delorie DOT com X-Mailing-List: djgpp AT delorie DOT com X-Unsubscribes-To: listserv AT delorie DOT com Precedence: bulk > > > Having the source code used to compile a software with no debugging > > > information in the executable, is it possible to know the position in > > > source where a SIGSEGV signal is raised, only using the call frame > > > traceback ? If yes... how ? > > > > Yes, but you will have to compile the source code with symbolic > > debugging (-g). Then you can run symify giving the image with symbols > > as an argument even if the stripped image was run when the SIGSEGV > > happened. > > It doesn't work correctly ! I've tryed to crash the same software > linked with and without stripping flag, then calling symify with the > not stripped executable filename, I got different results and > obviously the correct is the one linked without -s flag ! Compile and link with symbols, copy to another file, then use the STRIP utility to get rid of the symbols. -- Gerrit van Niekerk GP van Niekerk Ondernemings BK Roosstraat 211, Meyerspark, 0184, South Africa Tel: +27(12)8036501 Fax SA: 0866 413 555 Cell: +27(73)6891370 Fax Int'l: +1(206)2034139 Email: gerritvn AT gpvno DOT co DOT za Web: http://www.gpvno.co.za