From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1673 invoked by alias); 10 Jan 2007 01:26:34 -0000 Received: (qmail 1665 invoked by uid 22791); 10 Jan 2007 01:26:33 -0000 X-Spam-Check-By: sourceware.org Received: from fed1rmmtao12.cox.net (HELO fed1rmmtao12.cox.net) (68.230.241.27) by sourceware.org (qpsmtpd/0.31) with ESMTP; Wed, 10 Jan 2007 01:26:23 +0000 Received: from fed1rmimpo01.cox.net ([70.169.32.71]) by fed1rmmtao12.cox.net (InterMail vM.6.01.06.03 201-2131-130-104-20060516) with ESMTP id <20070110012621.GIDS19398.fed1rmmtao12.cox.net@fed1rmimpo01.cox.net> for ; Tue, 9 Jan 2007 20:26:21 -0500 Received: from thunderbird.smith.home ([24.56.61.172]) by fed1rmimpo01.cox.net with bizsmtp id 9DRX1W00e3iyCZU0000000; Tue, 09 Jan 2007 20:25:31 -0500 Received: (qmail 31909 invoked from network); 10 Jan 2007 01:33:13 -0000 Received: from localhost (HELO ?127.0.0.1?) (127.0.0.1) by thunderbird.smith.home with SMTP; 10 Jan 2007 01:33:13 -0000 Message-ID: <45A44256.1070004@cox.net> Date: Wed, 10 Jan 2007 01:26:00 -0000 From: Stephen & Linda Smith User-Agent: Thunderbird 1.5.0.9 (X11/20070103) MIME-Version: 1.0 To: gdb@sourceware.org Subject: Stripped files Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2007-01/txt/msg00160.txt.bz2 We've had a couple of discussions about stripped files here lately and so I want to know a couple of things from GDB's point of view. Am I breaking any assumptions in the GDB code if the code running on a remote target is stripped and the code that GDB loads on the host has the symbolic information? In other words is GDB likely to get confused by this situation? If the situation in the above paragraph isn't a problem, would it be a good idea for GDB to sniff for the file with the symbolic information via an default extension. For example the file that would be on the remote target would be something like libfoo.so and the file that that gdb would look for first on the host system would be libfoo.so-withsymbols and then fi that didn't exist it would look for libfoo.so. What do you think of that?