Of course, substitute 0x00400390 with the proper text segment address.
 
-Now you should be able to do a backtrace, etc.
+That will get your symbols loaded for the main executable, but you still won't have any symbols for libraries that were dynamically loaded, which these days is most of HTCondor.
 
+So, to get those, you need to do a couple things.
 
+First, run gdb on the unstripped version of the .so you would like to load and find the .text segment just like above, and write down the offset (the first column), you'll need it later.
+
+Second, go back to gdb with the stripped binary and the core.  If you look at any particular stack frame, you'll see the instruction pointer in the second column:
+
+    #7  0x00007f034f8c1834 in KeyCache::remove ()
+
+Now comes the black-magic portion.  Run "maint info sections" again and look at the first column.  Find the entry that contains the above instruction pointer.  It should be marked "ALLOC READONLY CODE".  Now, add that address to the offset of the .text segment from the .so file you found above.  Finally, you can add the symbols from the shared library with
+
+    add-symbol-file unstripped.so 0xMagicAddress
+
+You'll have to do this for each shared library (libcondor_util, libclassad, etc.) if you need the symbols for that particular stack frame.
 
 
 {section: Windows specific issues}