Yes, very reliably, every time. Same place, same stack trace. In fact, if I change the adp source from:
1. pbm_new my_proc -transparent white -fill blue 6 6 (or 6 5 or 5 6 - choose any combination) to 2. pbm_new my_proc -transparent white -fill blue 5 5 the seg. violation occurs on the next pbm statement. Otherwise, it occurs on 1. -----Original Message----- From: AOLserver Discussion [mailto:[EMAIL PROTECTED]]On Behalf Of Rob Mayoff Sent: Wednesday, October 24, 2001 10:20 PM To: [EMAIL PROTECTED] Subject: Re: [AOLSERVER] segmentation violation: gdb stack trace WAS RE: [AOLSERVER] Trying to debug a C module? Can you reproduce it reliably? +---------- On Oct 24, Sanjivendra Nath said: > Any pointers on how to resolve this? Use libefence (or other tools) to try > to find the offending malloc/free line for corruption of heap? (Using linux > RH7.1)
