Tango backtrace hack?

grauzone none at example.net
Wed Apr 1 10:16:20 PDT 2009


> - linux: backtrace, get just the addresses, those can be resolved 
> through addr2line to have function and file/line number

You can get the mangled function name in a very simple way: just open 
/proc/self/exe and read the .symtab and .strtab sections. That's not 
perfect, but better than nothing, and it's probably much simpler than to 
parse the debugging infos.



More information about the Digitalmars-d mailing list