Mail Archives: djgpp/2008/01/29/04:31:47
> > > Having the source code used to compile a software with no debugging
> > > information in the executable, is it possible to know the position in
> > > source where a SIGSEGV signal is raised, only using the call frame
> > > traceback ? If yes... how ?
> >
> > Yes, but you will have to compile the source code with symbolic
> > debugging (-g). Then you can run symify giving the image with symbols
> > as an argument even if the stripped image was run when the SIGSEGV
> > happened.
>
> It doesn't work correctly ! I've tryed to crash the same software
> linked with and without stripping flag, then calling symify with the
> not stripped executable filename, I got different results and
> obviously the correct is the one linked without -s flag !
Compile and link with symbols, copy to another file, then use the
STRIP utility to get rid of the symbols.
--
Gerrit van Niekerk
GP van Niekerk Ondernemings BK
Roosstraat 211, Meyerspark, 0184, South Africa
Tel: +27(12)8036501 Fax SA: 0866 413 555
Cell: +27(73)6891370
Fax Int'l: +1(206)2034139
Email: gerritvn AT gpvno DOT co DOT za
Web: http://www.gpvno.co.za
- Raw text -