[Info-vax] hung program location

Bob Koehler koehler at eisner.nospam.encompasserve.org
Wed Feb 20 13:41:09 EST 2013


In article <fd1c789e-3d0f-439a-a9e1-fe6ea1d0ba62 at x13g2000vby.googlegroups.com>, Tom Adams <w.tom.adams at gmail.com> writes:
> 
> The PC is 80141918 (as shown on show proc/cont)  The process
> is in HIB when it's at that address.

   OK, that's the low 32 bits of a system space address.  Most likely
   it points to the system routine that puts the process in HIB.

   From you're knowledge of the application, what parts of your code
   would put the process in hibernation?

   It is possible for a privileged user to examine the process in
   HIB using SDA and find out what user code started the chain that
   led to HIB.  It is also possible to force the process to exit
   with a process dump and use the process dump analyzer to find
   out what user code was running.

   I beleive other posts have already pointed out these techniques.
   If you cannot follow what they say, please ask specific questions.

   Or, you can spinkle debug print statements through the code and do
   a pseudo binary-search each time this problem happens, until you find
   the problem code.




More information about the Info-vax mailing list