On 2009-04-01 19:16:20 +0200, grauzone said:
- linux: backtrace, get just the addresses, those can be resolved
through addr2line to have function and file/line number
You can get the mangled function name in a very simple way: just open
/proc/self/exe and read the .symtab and .strtab section
- linux: backtrace, get just the addresses, those can be resolved
through addr2line to have function and file/line number
You can get the mangled function name in a very simple way: just open
/proc/self/exe and read the .symtab and .strtab sections. That's not
perfect, but better than nothing,
On 2009-03-28 23:10:44 +0100, Robert Fraser said:
Has anyone been able to get the backtrace hack working with the newest Tango?
Thanks,
Robert
The svn version of tango has some backtracing ability:
- windows: backtrace non optimized executables compiled with -g to get
function names and lin
thers?
This is the one I was trying to get to work:
http://petermodzelewski.blogspot.com/2008/01/installing-tango-backtrace-hack-on.html
I could just do it manually, but that seems like a lot of work ;-P. It
seems to be in the proposed patches of the tango svn, but hasn't been
applied yet.
Robert Fraser wrote:
Has anyone been able to get the backtrace hack working with the newest
Tango?
What is the state of backtrace support, anyway? I know the flectioned
plugin is outdated and broken now. I don't suppose someone could
enumerate and link to the others?
Robert Fraser wrote:
Robert Fraser wrote:
Has anyone been able to get the backtrace hack working with the newest
Tango?
Thanks,
Robert
... On Windows + DMD 1.041?
In particular, I've narrowed the problem down to CreateProcessW, which
is sending "The parameter is incorrect." This is render
Robert Fraser wrote:
Has anyone been able to get the backtrace hack working with the newest
Tango?
Thanks,
Robert
... On Windows + DMD 1.041?
Has anyone been able to get the backtrace hack working with the newest
Tango?
Thanks,
Robert