Subject: | |
From: | |
Reply To: | |
Date: | Wed, 22 Nov 1995 19:50:13 GMT |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Stan Sieler ([log in to unmask]) wrote:
[...]
: If the process in question is running the program A.B.C, you'll get a
: much more readable stacktrace by doing:
: :run a.b.c; debug
: pin #123
: tr,i,d
: abort
: Because you are running the same program file, Debug will know how to
: translate code addresses with the program into symbolic addresses.
A new trick (new to me, anyway) I find useful if the program is already
running (can you say "OUTSPOOL", boys and girls? I thought you could):
:COPY a.b.c,xx
:debug
> pin #123
> tr,i,d (shows stack without symbols. Note the space id)
> xl xx <space id> (maps program file xx's symbols)
> tr,i,d (shows stack with symbols)
...
The "xl" command actually opens xx mapped. Be sure to use debug's UNMAP
command when you're done, else you won't be able to purge xx.
-Larry "in terms of obfuscation, Un*x is MPE Debug after it grows up" Byler-
|
|
|