On 12/20/2016 09:29 AM, Stephan Bergmann wrote:
idlc spawns a child process exec'ing ucpp; this backtrace is apparently
from that child process, doing
SAL_INFO("sal.osl", "ChildStatusProc : starting " <<
data.m_pszArgs[0]);
(sal/osl/unx/process.cxx:208) before calling execv. Why
On 12/20/2016 02:21 AM, Norbert Thiebaud wrote:
Analysis of sampling idlc (pid 3535) every 1 millisecond
Process: idlc [3535]
Path:
/Users/tdf/lode/jenkins/workspace/lo_gerrit/Config/macosx_clang_dbgutil/instdir/LibreOffice5.4_SDK/bin/idlc
Load Address:0x108408000
Identifier: idl
Stephan,
as requested:
Analysis of sampling idlc (pid 3535) every 1 millisecond
Process: idlc [3535]
Path:
/Users/tdf/lode/jenkins/workspace/lo_gerrit/Config/macosx_clang_dbgutil/instdir/LibreOffice5.4_SDK/bin/idlc
Load Address:0x108408000
Identifier: idlc
Version: 0
Code