Message-Id: <4.1.19990602155545.00a21100@hal.nt.tuwien.ac.at> X-Sender: tony AT hal DOT nt DOT tuwien DOT ac DOT at X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1 Date: Wed, 02 Jun 1999 16:23:12 +0200 To: djgpp AT delorie DOT com From: Anton Helm Subject: problems debugging segfault Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Reply-To: djgpp AT delorie DOT com I'm still "remote debugging" one of my programs that crashes on a PC some thousand km from here. 1) The program works fine when buildt with DJGPP v2.01 2) When buildt with v2.02 I get a seg-fault in malloc+349 I know this looks very much like a memory problem (either allocated not enough memory somewhere or freed twice ...). 3) I used MSS v1.2 to build a testversion of the program. Setting the MSS options to "paranoid" (well, you know ...) I sent the program to the remote user and asked him to mail me the MSS logfile. The testversion of the program worked there without ANY problem. It produced a rather big logfile which I searched carefully. No warnings or errors in this file. So I'm somewhat worried now ... Any hints for further debugging would be helpful. As the user on the other end of the net has no programming skills it is hopeless to ask him to run the program with gdb. All I can do is sending him programs and ask "What's happening now?" Tony P.S.: The problem is not reproducable here, mostly because I don't have the device available that the program exchanges data with across COM1. ************************************************************** Dipl.-Ing. Anton HELM *T* mailto:tony AT nt DOT tuwien DOT ac DOT at Institut fuer *U* http://www.nt.tuwien.ac.at/~tony/ Nachrichtentechnik und *W* http://www.nt.tuwien.ac.at/ Hochfrequenztechnik *I* talkto:tony AT eagle DOT nt DOT tuwien DOT ac DOT at Guszhausstr. 25/389 *E* phoneto:+43-1-58801-38920 A-1040 Wien, AUSTRIA *N* faxto:+43-1-58801-38999 ************************************************************** finger -l tony AT penguin DOT nt DOT tuwien DOT ac DOT at for PGP public key **************************************************************