Angus Leeming wrote:

> You can run valgrind with a --connect-gdb option (or suchlike), so
> that when the program crashes gdb fires up and you can extract a
> backtrace. I'd do it for you, but valgrind doesn't work on Alpha
> machines...

Thank you, I missed that option (probably because it is called
--db-attach=yes and db is almost automatically translated to database
somewhere on the way from the eyes to the brain...)

Unfortunately it does not help very much:


==29942== Process terminating with default action of signal 11 (SIGSEGV)
==29942==    at 0x1B8E967E: _dl_map_object_from_fd (in /lib/ld-2.3.3.so)
==29942==    by 0x1B8EACC9: _dl_map_object (in /lib/ld-2.3.3.so)
==29942==    by 0x1B8F09CD: openaux (in /lib/ld-2.3.3.so)
==29942==    by 0x1B8F0D55: _dl_catch_error (in /lib/ld-2.3.3.so)
==29942==
==29942== ---- Attach to debugger ? --- [Return/N/n/Y/y/C/c] ---- y
==29942== starting debugger with cmd: /usr/bin/gdb -nw /proc/29944/fd/821
29944
GNU gdb 6.2.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i586-suse-linux"...Using host libthread_db
library "/lib/tls/libthread_db.so.1".

Attaching to program: /proc/29944/fd/821, process 29944
0x1b8e967e in ?? ()
(gdb) bt
#0  0x1b8e967e in ?? ()
Cannot access memory at address 0x52bfcfb4
(gdb)


Georg

Reply via email to