[Info-vax] hung program location
Bob Koehler
koehler at eisner.nospam.encompasserve.org
Wed Feb 20 13:41:09 EST 2013
In article <fd1c789e-3d0f-439a-a9e1-fe6ea1d0ba62 at x13g2000vby.googlegroups.com>, Tom Adams <w.tom.adams at gmail.com> writes:
>
> The PC is 80141918 (as shown on show proc/cont) The process
> is in HIB when it's at that address.
OK, that's the low 32 bits of a system space address. Most likely
it points to the system routine that puts the process in HIB.
From you're knowledge of the application, what parts of your code
would put the process in hibernation?
It is possible for a privileged user to examine the process in
HIB using SDA and find out what user code started the chain that
led to HIB. It is also possible to force the process to exit
with a process dump and use the process dump analyzer to find
out what user code was running.
I beleive other posts have already pointed out these techniques.
If you cannot follow what they say, please ask specific questions.
Or, you can spinkle debug print statements through the code and do
a pseudo binary-search each time this problem happens, until you find
the problem code.
More information about the Info-vax
mailing list