David,

> OK, so when I said "Any ideas are welcome" I really meant about this
> particular instantiation :-)

Well, it won't tell you much about memory, but you can see what system
functions are being called inside the program by using the 'strace'
program.  Once you've found the process ID number with 'top' or 'ps'
you can type 'strace -p PID' and it'll show you what's happening.
Unfortunately, it won't show you much about memory, and in fact when
I just ran this command on my current mutt process, it was pretty
clear that mutt wasn't doing much of anything at the system level
until I switched folders / opened email / etc.

Assuming you built mutt with -g (debugging) you could attach 'gdb'
to the running process, and this might give you a better view into
the program than strace would.  But I've never actually used 'gdb'
this way, so I don't know how smart it is when confronted with a
running executable and no source code to go along with it.

You'd probably need to be pretty familiar with the source code,
variables and structure definitions, etc. for 'gdb' to really help
you figure out what's going on.

Not much help, I know, but you did say ``Any ideas are welcome'' !

Chris
-- 
Christopher S. Swingley           phone: 907-474-2689
Computer Systems Manager          email: [EMAIL PROTECTED]
IARC -- Frontier Program          GPG and PGP keys at my web page:
University of Alaska Fairbanks    www.frontier.iarc.uaf.edu/~cswingle

Reply via email to