home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.vms
- From: journeyman@spliff.demon.co.uk (Andy Settle)
- Path: sparky!uunet!pipex!demon!spliff.demon.co.uk!journeyman
- Subject: Misbehaving calling functions in C
- Distribution: world
- Organization: Journeyman Limited
- Reply-To: journeyman@spliff.demon.co.uk
- X-Mailer: Simple NEWS 1.90 (ka9q DIS 1.19)
- Lines: 23
- Date: Mon, 11 Jan 1993 14:24:16 +0000
- Message-ID: <726762256snz@spliff.demon.co.uk>
- Sender: usenet@demon.co.uk
-
- Hi!
-
- I'm maintaining an old application (written in VAXC) which runs
- asynch/ASTs. *Somewhere* there is a function calling a routine
- with garbage parameters - this is easy to trap. The problem is
- that it's proving difficult to track down the caller. Is there an
- way of viewing the call stack without stopping the image? Using
- the debugger is not possible as the called routine is called from
- *everywhere* (it's actually an audit trail log routine).
-
- One idea is LIB$SIGNAL(SS$_DEBUG, "SHOW CALLS"). Any other
- suggestions? My last site had a nice piece of macro which could
- generate a process dump file without exiting the process but i
- didn't manage to get a copy before i left.
-
- TIA
- --
- Andy 'Journeyman' Settle: "Make tea not war."
-
- HOME: SITE:
- Email: journeyman@spliff.demon.co.uk Email: settle@cities.te.bt.co.uk
- journeyman@cix.compulink.co.uk Voice: +44 473 646246
- Voice: +44 473 735598 FAX: +44 473 637614
-