Sponsored Content
Operating Systems Linux Ubuntu pstack missing from Ubuntu 10.10 Post 302487075 by manustone on Tuesday 11th of January 2011 09:48:26 AM
Old 01-11-2011
pstack missing from Ubuntu 10.10

Hi All
I would like to use the tool "pstack" to get a sample of the stack trace for a process.
As far as I understood It seems widely available in all Linux systems, but it is not in Ubuntu 10.10.
I tried using apt-get as per some posts in few forum, but it cannot be found in the APT repositories.

I found this link here https://launchpad.net/ubuntu/+source/pstack/1.2-1 but I see 3 files:
A => 1 .dsc file that I don't know what does it mean
B => 2 different source tarball ( 1 ORIGINAL + 1 DIFF ?!?! ). I guess that they must be installed one after one in strictly order.

Is there any safe way to install it into my Ubuntu?
Any package that contains it that can be found via APT-GET?
Thanks a lot
Regards
 

10 More Discussions You Might Find Interesting

1. Solaris

decipher pstack with problem lwp

My company has a product that is running on JBoss on Solaris against Oracle 8.1.7. We are having an issue with the server process and high CPU utilization. During this time, and only during this time, we are experiencing database locks that will not let go. A 'ps -L' on the server process... (5 Replies)
Discussion started by: hosierdm
5 Replies

2. UNIX for Advanced & Expert Users

Core Dump Analysis Using PStack and PMAP

Hello, I'm new to the group and this is my first post. I'm hoping someone can help me out. I have a core dump that I need to analyze from a Unix box and I've never done this sort of thing before. I was told to run a pmap and pstack on the core file which provided two different output files. ... (3 Replies)
Discussion started by: kimblebee
3 Replies

3. Solaris

pstack usage on Solaris 9

Hello everyone, I have a 12-thread application running on Solaris 9. When I use the pstack command after a typical core dump, it prints the stack output of all 12 threads/lwps. This is the standard procedure as it is described in the Solaris MAN pages. Is there a way to filter out the... (1 Reply)
Discussion started by: gregb32
1 Replies

4. UNIX for Advanced & Expert Users

Required info on Pstack on solaris10

Hi All , I am wanted to know the #of thread ( Kernal & User ) created by the Process i was looking into the prstat PID USERNAME SIZE RSS STATE PRI NICE TIME CPU PROCESS/NLWP 994 httpd 126M 99M sleep 58 0 1:11.25 2.4% ns-httpd/33 997 httpd 114M 86M sleep 58 0 0:40.02 2.7% ns-httpd/22 995... (0 Replies)
Discussion started by: rajendra44
0 Replies

5. Red Hat

pfiles and pstack and ptree

Can someone tell me the Linux equivalent for pstack and pfiles and ptree which are Solaris commands. (1 Reply)
Discussion started by: bdsffl
1 Replies

6. UNIX for Advanced & Expert Users

analyse core file using pmap and pstack

Dear All, I am new to this forum. This is my first. I am facing customer issue. Customer has got core file while running the server. He had sent core file and details from pstack, pmap and pldd commands. I have to debug this application, please help me to fix this issue. I am using sparc... (1 Reply)
Discussion started by: KiranBangalore
1 Replies

7. Solaris

analyse core file using pmap and pstack

Dear All, I am new to this forum. This is my first. I am facing customer issue. Customer has got core file while running the server. He had sent core file and details from pstack, pmap and pldd commands. I have to debug this application, please help me to fix this issue. I am using sparc 10... (4 Replies)
Discussion started by: KiranBangalore
4 Replies

8. Ubuntu

/dev/ttyb missing from UBUNTU

HI All I am doing first steps in debugging with GDB. I have been suggested to redirect output to another terminal using the command using tty /dev/ttyb I had a look at my ubuntu doing ls /dev/tty* and I cannot find this ttyb. What is it and how to achieve the same thing? I am... (0 Replies)
Discussion started by: manustone
0 Replies

9. Solaris

pstack file analysis

Hi ... Can you please share how to analyse pstack file and various options for core dump analysis (3 Replies)
Discussion started by: anand87
3 Replies

10. UNIX for Dummies Questions & Answers

Missing menu.lst file in Ubuntu

I am not able to find menu.lst in /boot. During the Linux Kernel Compilation I installed the kernel using make install. Next I created an initrd image. I had to modify the Grub configuration file - /boot/grub/menu.lst which I am not able to find. Any resolution for the issue? (3 Replies)
Discussion started by: rupeshkp728
3 Replies
APT-KEY(8)								APT								APT-KEY(8)

NAME
apt-key - APT key management utility SYNOPSIS
apt-key [--keyring filename] {add filename | del keyid | export keyid | exportall | list | finger | adv | update | net-update | {-v | --version} | {-h | --help}} DESCRIPTION
apt-key is used to manage the list of keys used by apt to authenticate packages. Packages which have been authenticated using these keys will be considered trusted. Note that if usage of apt-key is desired the additional installation of the GNU Privacy Guard suite (packaged in gnupg) is required. For this reason alone the programmatic usage (especially in package maintainerscripts!) is strongly discouraged. Further more the output format of all commands is undefined and can and does change whenever the underlying commands change. apt-key will try to detect such usage and generates warnings on stderr in these cases. SUPPORTED KEYRING FILES
apt-key supports only the binary OpenPGP format (also known as "GPG key public ring") in files with the "gpg" extension, not the keybox database format introduced in newer gpg(1) versions as default for keyring files. Binary keyring files intended to be used with any apt version should therefore always be created with gpg --export. Alternatively, if all systems which should be using the created keyring have at least apt version >= 1.4 installed, you can use the ASCII armored format with the "asc" extension instead which can be created with gpg --armor --export. COMMANDS
add filename Add a new key to the list of trusted keys. The key is read from the filename given with the parameter filename or if the filename is - from standard input. It is critical that keys added manually via apt-key are verified to belong to the owner of the repositories they claim to be for otherwise the apt-secure(8) infrastructure is completely undermined. Note: Instead of using this command a keyring should be placed directly in the /etc/apt/trusted.gpg.d/ directory with a descriptive name and either "gpg" or "asc" as file extension. del keyid Remove a key from the list of trusted keys. export keyid Output the key keyid to standard output. exportall Output all trusted keys to standard output. list, finger List trusted keys with fingerprints. adv Pass advanced options to gpg. With adv --recv-key you can e.g. download key from keyservers directly into the trusted set of keys. Note that there are no checks performed, so it is easy to completely undermine the apt-secure(8) infrastructure if used without care. update (deprecated) Update the local keyring with the archive keyring and remove from the local keyring the archive keys which are no longer valid. The archive keyring is shipped in the archive-keyring package of your distribution, e.g. the ubuntu-keyring package in Ubuntu. Note that a distribution does not need to and in fact should not use this command any longer and instead ship keyring files in the /etc/apt/trusted.gpg.d/ directory directly as this avoids a dependency on gnupg and it is easier to manage keys by simply adding and removing files for maintainers and users alike. net-update Perform an update working similarly to the update command above, but get the archive keyring from a URI instead and validate it against a master key. This requires an installed wget(1) and an APT build configured to have a server to fetch from and a master keyring to validate. APT in Debian does not support this command, relying on update instead, but Ubuntu's APT does. OPTIONS
Note that options need to be defined before the commands described in the previous section. --keyring filename With this option it is possible to specify a particular keyring file the command should operate on. The default is that a command is executed on the trusted.gpg file as well as on all parts in the trusted.gpg.d directory, though trusted.gpg is the primary keyring which means that e.g. new keys are added to this one. FILES
/etc/apt/trusted.gpg Keyring of local trusted keys, new keys will be added here. Configuration Item: Dir::Etc::Trusted. /etc/apt/trusted.gpg.d/ File fragments for the trusted keys, additional keyrings can be stored here (by other packages or the administrator). Configuration Item Dir::Etc::TrustedParts. SEE ALSO
apt-get(8), apt-secure(8) BUGS
APT bug page[1]. If you wish to report a bug in APT, please see /usr/share/doc/debian/bug-reporting.txt or the reportbug(1) command. AUTHOR
APT was written by the APT team <apt@packages.debian.org>. AUTHORS
Jason Gunthorpe APT team NOTES
1. APT bug page http://bugs.debian.org/src:apt APT 1.6.3ubuntu0.1 25 November 2016 APT-KEY(8)
All times are GMT -4. The time now is 09:46 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy