Solved

Using workshop5 on Solaris 2.8

Posted on 2002-06-19
6
242 Views
Last Modified: 2013-12-27
I am using workshop5 for debugging on Solaris 2.8
I have built the application in debug mode. When I try to put a breakpoint in the coure code, I get an error message saying "There is no executable code at the line"
What do i do ?
Pls advise

Rupak
0
Comment
Question by:rupak_khurana
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 5

Expert Comment

by:ecw
ID: 7093874
Is there executable code at that line?  Show us a snippet.
0
 

Author Comment

by:rupak_khurana
ID: 7093903
Yes there is an executable code. I have tried to open so many files but get the same result. I got in touch with SUN and they said that workshop5 is not forward compatible with the applications that are built with Forte 6U2. Now I got the Workshop 6U2 but when I run it and attach the process, it hangs !!!!
0
 
LVL 4

Expert Comment

by:newmang
ID: 7094135
Load gdb and either ddd or gvd on the system then use ddd or gdb to debug the code.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 7100025
When you went to Forte 6u2 did you recompile all of your sources? And when you installed Forte did you also install the current patches for Forte 6u2? What about the OS, does it have a current patch set installed?
0
 

Author Comment

by:rupak_khurana
ID: 7103813
workshop 5 cant be used to debug applications built with forte 6U2. We shud use workshop 6U2
0
 

Author Comment

by:rupak_khurana
ID: 7103819
Closing for the sake of it.See my comments.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question