/proc/$PID/exe is a link to the executable. You can load that executable
into gdb and attach to the hung process. Then you will probably discover
that important debug symbols are missing but it's a different matter.
As an example, let's say process 1117 has hung:
[root@Sailfish ~]# ls -la /pro
No, I didn't. Its QML/Python app, so it is not clear what I should attach
the debugger to. sailfish-qml?
Rinigus
On Sun, Sep 9, 2018 at 12:35 PM Slava Monich wrote:
> Have you tried debugging with a debugger (run the app under gdb and
> examine the backtrace when it gets stuck)? That seems to b
Have you tried debugging with a debugger (run the app under gdb and
examine the backtrace when it gets stuck)? That seems to be the obvious
first step to me.
Cheers,
-Slava
We debugged a failure to initiate destruction further. As suggested
by @wdehoog, I added
Connections {
ta
We debugged a failure to initiate destruction further. As suggested
by @wdehoog, I added
Connections {
target: __quickWindow
onClosing: console.log("")
}
to ApplicationWindow. This one does get called during app closure, without
further propagation over to destruction
Hi,
I am working on Pure Maps - a fork of @otsaloma's map applications. As a
background: Its a Python app, with pyotherside used for QML/Python
interaction. Its also using Mapbox GL widget that I wrote on the basis of
Mapbox GL QtLocation plugin.
I am facing a problem which I don't know how to so