Solved

how to do a stack trace

Posted on 2002-03-04
4
294 Views
Last Modified: 2013-12-15
Hi,

I need to do a stack trace to report a problem with open office, and have never done this before.  Figured out that I probably need to use gdb.  So, if I'm in the program directory, and the binary is called soffice, I type 'gdb soffice' just to see what happens, but gdb complains that it doesn't recognise the format of the binary.  What do I do in such a case, or is there an alternative program I should be trying?

Thanks
0
Comment
Question by:elsdon
4 Comments
 
LVL 2

Expert Comment

by:fremsley
Comment Utility
Sorry, I can't help you with your unrecognised binary
format.

Hoever, gdb is a very powerfull and complicated tool; so
since you never have worked with gdb before, it might be
a good idea to use one of the confortable front-ends for
it -- my favorite is GNU ddd (see http://www.gnu.org/),
you'll find the stack trace under Status/Backtrace.

Hope it helps

0
 
LVL 4

Expert Comment

by:newmang
Comment Utility
If soffice is crashing it should create a core file. This can be opened with the gdb debugger (or via one of the gui front ends such as ddd gvd etc.) and then you can display the call stack at the point of failure.
0
 
LVL 1

Accepted Solution

by:
Sixpax earned 150 total points
Comment Utility
Is soffice really a binary? Or is it a script that calls the actually executable?  Try "file soffice" to find out.
0
 

Author Comment

by:elsdon
Comment Utility
That sorted it out - 'soffice' is a script file that calls soffice.bin - 'file soffice' pointed that out. Thanks.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

If you have a server on collocation with the super-fast CPU, that doesn't mean that you get it running at full power. Here is a preamble. When doing inventory of Linux servers, that I'm administering, I've found that some of them are running on l…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now