Solved

how to do a stack trace

Posted on 2002-03-04
4
298 Views
Last Modified: 2013-12-15
Hi,

I need to do a stack trace to report a problem with open office, and have never done this before.  Figured out that I probably need to use gdb.  So, if I'm in the program directory, and the binary is called soffice, I type 'gdb soffice' just to see what happens, but gdb complains that it doesn't recognise the format of the binary.  What do I do in such a case, or is there an alternative program I should be trying?

Thanks
0
Comment
Question by:elsdon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 2

Expert Comment

by:fremsley
ID: 6850250
Sorry, I can't help you with your unrecognised binary
format.

Hoever, gdb is a very powerfull and complicated tool; so
since you never have worked with gdb before, it might be
a good idea to use one of the confortable front-ends for
it -- my favorite is GNU ddd (see http://www.gnu.org/),
you'll find the stack trace under Status/Backtrace.

Hope it helps

0
 
LVL 4

Expert Comment

by:newmang
ID: 6855060
If soffice is crashing it should create a core file. This can be opened with the gdb debugger (or via one of the gui front ends such as ddd gvd etc.) and then you can display the call stack at the point of failure.
0
 
LVL 1

Accepted Solution

by:
Sixpax earned 150 total points
ID: 6866210
Is soffice really a binary? Or is it a script that calls the actually executable?  Try "file soffice" to find out.
0
 

Author Comment

by:elsdon
ID: 6876558
That sorted it out - 'soffice' is a script file that calls soffice.bin - 'file soffice' pointed that out. Thanks.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Fine Tune your automatic Updates for Ubuntu / Debian
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question