[Info-vax] hung program location
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Mon Feb 18 10:39:05 EST 2013
On 2013-02-18 14:15:28 +0000, Tom Adams said:
> I can see the PC and SP where a program is hung using SHOW PROC/CONT.
>
> How can I relate that to a link map to figure out where the process is
> hung in the program that it is running?
>
> The process is running an installed shared image
>
> This is VMS 7.3-2 on an alpha
The sequence is generally the same as is used to troubleshoot the
source of an ACCVIO: <http://labs.hoffmanlabs.com/node/800>, though
you're looking at "live" memory here, and not at the debugger or the
process dump carcass.
Depending on how the process is wedged, consider configuring the
application image and potentially the shareable image for debugging or
for integrated logging, force a process dump, and then use the debugger
on the carcass. Some details on debugging detached processes are
available here <http://labs.hoffmanlabs.com/node/803>
Addresses in P1, S0 or S2 space are usually a result of a system call,
and figuring out what call and what application code triggered the call
involves walking the call stack. That's slightly more involved, and I
don't have an article posted on that. It's usually easier to integrate
and use the debugger for those cases — as described above — and let
that walk the call stack for you.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list