Executable Not stripped : How to read the C intructions inside ?

From: EXT / STERIA TORRES Jean-Yves (ext.steria.torres@sncf.fr)
Date: Wed Jul 03 2002 - 08:31:16 EDT


Hello

About this well-known file
-r-x--x--x 1 1000 sysadmin 70064 Dec 7 1998 gunzip

# file gunzip
gunzip: ELF 32-bit MSB executable SPARC Version 1, dynamically
linked, not stripped

This executable is not stripped, so, is there anyway to read the code source
with the help of a debugger ?

TIA

           Regards

            Jean-yves Torres - Senior UNIX system administrateur
        ) 59 80 91 Direct : 04 72 66 40 91 Mobile : 0613 477 747 -
DSIT/XM/USR
            25C quai P.Semard - 69350 La Mulatihre
        % ext.steria.torres@sncf.fr <mailto:ext.steria.torres@sncf.fr>
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers



This archive was generated by hypermail 2.1.7 : Wed Apr 09 2008 - 23:24:33 EDT