Date: Fri, 21 Oct 94 15:52:47 EDT From: peprbv AT cfa0 DOT harvard DOT edu (Bob Babcock) To: TAUPIN AT rsovax DOT lps DOT u-psud DOT fr Cc: djgpp AT sun DOT soe DOT clarkson DOT edu Reply-To: babcock AT cfa DOT harvard DOT edu > Segmentation violation in pointer 0x0001e000 at d8:1de5 > ... > Call frame traceback EIPs: > 0x00001de5 > > ---> translation into any understandable language obviously welcome. Segmentation violation basically means you've accessed memory you weren't supposed to. It could be a bad pointer or you could be running past the end of an array or allocated hunk of memory. If things haven't gotten clobbered, and if you have included debug info in the program, symify should convert the traceback into program names and line numbers.