VM Dump Tool

Total Page:16

File Type:pdf, Size:1020Kb

VM Dump Tool z/VM Version 7 Release 1 VM Dump Tool IBM GC24-6335-00 Note: Before you use this information and the product it supports, read the information in “Notices” on page 247. This edition applies to version 7, release 1, modification 0 of the IBM z/VM (product number 5741-A09) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2018-09-05 © Copyright International Business Machines Corporation 2001, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About This Document..........................................................................................xiii Intended Audience.................................................................................................................................... xiii Syntax, Message, and Response Conventions..........................................................................................xiii How to Use the Online HELP Facility.........................................................................................................xvi Where to Find More Information...............................................................................................................xvi Links to Other Documents and Websites............................................................................................ xvi How to Send Your Comments to IBM................................................................... xvii Summary of Changes for z/VM VM Dump Tool.....................................................xviii GC24-6335-00, z/VM Version 7 Release 1.............................................................................................xviii Chapter 1. Introduction......................................................................................... 1 Major Functions............................................................................................................................................1 Formatting Dump Data........................................................................................................................... 1 Interactively Analyzing Dump Data........................................................................................................1 Types of Dumps the VM Dump Tool Processes........................................................................................... 1 Requirements for Using the VM Dump Tool................................................................................................ 1 Storage Requirements............................................................................................................................2 Causes for a Dump....................................................................................................................................... 2 Hardware-Initiated Dumps.................................................................................................................... 2 Software-Initiated Dumps......................................................................................................................2 User-Initiated Dumps.............................................................................................................................3 Location of a Dump...................................................................................................................................... 3 Use of Dump Information............................................................................................................................ 3 Problem Determination................................................................................................................................4 Problem Source Identification.....................................................................................................................4 Using Error Messages............................................................................................................................. 4 Using the Symptom Record to Identify Duplicate Problems.................................................................5 Commands of the VM Dump Tool................................................................................................................ 5 Pageable and Resident Modules................................................................................................................. 6 Servicing the VM Dump Tool........................................................................................................................ 6 Saving Dump Data to Tape...........................................................................................................................7 Chapter 2. Usage Guide......................................................................................... 9 Preparing a Dump for Use with the VM Dump Tool.....................................................................................9 Viewing Dumps.............................................................................................................................................9 Using the Session File.......................................................................................................................... 10 Analyzing Dumps....................................................................................................................................... 10 User Tailoring............................................................................................................................................. 10 Writing VMDUMPTL Macros....................................................................................................................... 10 Address Spaces and the VM Dump Tool....................................................................................................10 Scenario 1: Analyzing a CP FRE016 Abend Dump.................................................................................... 15 Step 1: Checking the Error Message and Symptom Record................................................................15 Step 2: Analyzing the Trace Table........................................................................................................16 Step 3: Summarizing the Dump Analysis.............................................................................................17 Scenario 2: Analyzing a PRG004 Abend Dump.........................................................................................18 Step 1: Checking the Error Message and Symptom Record................................................................18 Step 2: Checking the Symptom Record with the VM Dump Tool........................................................ 18 iii Step 3: Checking the Symptom Record for the Abend........................................................................19 Step 4: Analyzing the Trace Table........................................................................................................19 Step 5: Summarizing the Dump Analysis.............................................................................................21 Chapter 3. VM Dump Tool Subcommands and Macros............................................23 VMDUMPTL Command...............................................................................................................................25 ABSOLUTE Subcommand.......................................................................................................................... 28 ANALYZE Subcommand.............................................................................................................................29 AREGS Subcommand.................................................................................................................................30 BLOCK Macro............................................................................................................................................. 31 CALLERS Macro..........................................................................................................................................34 CCW Subcommand.................................................................................................................................... 36 CHAIN Subcommand.................................................................................................................................38 CLOCKS Subcommand...............................................................................................................................40 CMS Subcommand.....................................................................................................................................41 CODE Subcommand...................................................................................................................................42 CONSOLES Macro...................................................................................................................................... 43 CP Subcommand........................................................................................................................................45 CPEBK Subcommand.................................................................................................................................46
Recommended publications
  • Application Description PROCONTROL P 87TS01-E/R1313 Coupling Module
    Application Description PROCONTROL P Communication Coupling Module Time Master Publication No. D KWL 6316 96 E, Edition 10/96 Replacing D KWL 6316 96 E, Edition 05/96 87TS01-E/R1313 Application Every 59th second, a DCF77 time receiver coupled to the 87TS01-E/ R1313 module through an RS232c interface, conĆ forming to the prescribed time data format and transfer protoĆ Within the PROCONTROL system, module 87TS01-E/R1313col, sends the complete time telegram of the following full minĆ functions as a master clock which is set by a radioute clock and, (over in the 60th second, sends a synchronization characĆ a serial interface; reception is from the DCF77 timeter. transmitĆ This synchronization character is evaluated, and the interĆ ter), and which needs to be synchronized. The timenal received clock in module 87TS01-E/R1313 is synchronized. from the radio clock is made available to the entire PROCONĆ TROL system and is used as system time. It isThe transmitted master clock follows a 5-msec-rhythm and is synchroĆ cyclically in the form of time telegrams. nized to the DCF77 time receiver every 60 sec. Disturbance signals are generated if the time receiver or the internal clock The time telegrams containing the system time mayshould be reĆ fail. If synchronization takes place every 60 sec, the ceived and processed by modules specifically designedmaster for clock tends to go slow by < 5 msec. In the event of a this purpose. failure of the time receiver, the typical inaccuracy of the internal master clock is 3.4 sec/24 hrs. If an inaccuracy of a maximum of ± 1 sec is detected, the master clock is immediately switched over to the time received from the DCF77 time receiver.
    [Show full text]
  • GPS170PEX User Manual
    Technical Information Operating Instructions GPS170PEX Contact Information Meinberg Funkuhren GmbH & Co. KG Lange Wand 9 D-31812 Bad Pyrmont Phone: ++49 52 81 - 9309-0 Fax: ++49 52 81 - 9309-30 Internet: http://www.meinberg.de Email: [email protected] September 16, 2009 Table of Contents Contact Information............................................................................. 2 Content of the USB stick ..................................................................... 5 General information............................................................................. 6 PCI Express (PCIe) .............................................................................. 7 Block diagram GPS170PEX ................................................................ 8 GPS170PEX features ........................................................................... 9 Time zone and daylight saving .................................................. 9 Asynchronous serial ports ........................................................ 10 Time capture inputs.................................................................. 10 Pulse and frequency outputs .................................................... 10 DCF77 emulation ..................................................................... 12 Connectors and LEDs in the rear slot cover ...................................... 13 Installing the GPS170PEX in your computer.................................... 14 Configuring the 9 pin connector .............................................. 14 Mounting the
    [Show full text]
  • 7502.9039-MANUAL-Montgomery-MIPROM-21.Pdf
    This is Your Software Security Access Key: DO NOT LOSE IT ! DO NOT PLUG THE SECURITY KEY INTO ANY ELEVATOR INTERFACE PORT This security device must be plugged into the notebook computer’s PRINTER port whenever the FREEDOM Tool Software is to be run. List of Trademarks Microsoft Windows, Windows 95, and MS-DOS are registered trademarks/products of Microsoft Corporation. Megatech and MIPROM 21 are trademarks of the Montgomery-Kone Elevator Corporation. IBM and PS/2 are registered trademarks of International Business Machines Corporation WORLD electronics, the WORLD electronics logo, FREEDOM Tool and FREEDOMWare are registered trademarks of WORLD electronics Sales and Service, Inc. All other trademarks mentioned in this manual are the sole property of their respective manufacturers. Copyright © 1998-2003 by WORLD electronics®. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of WORLD electronics. Further, this publication and features described herein are subject to change without notice from the publisher. WORLD electronics Table of Contents Introduction ................................................................................................ 2 Features ................................................................................................................................
    [Show full text]
  • Conversion from Decimal There Is a Simple Method That Allows Conversions from the Decimal to a Target Number System
    APPENDICES A Number Systems This appendix introduces background material on various number systems and representations. We start the appendix with a discussion of various number systems, including the binary and hexadecimal systems. When we use multiple number systems, we need to convert numbers from system to another We present details on how such number conversions are done. We then give details on integer representations. We cover both unsigned and signed integer representations. We close the appendix with a discussion of the floating-point numbers. Positional Number Systems The number systems that we discuss here are based on positional number systems. The decimal number system that we are already familiar with is an example of a positional number system. In contrast, the Roman numeral system is not a positional number system. Every positional number system has a radix or base, and an alphabet. The base is a positive number. For example, the decimal system is a base-10 system. The number of symbols in the alphabet is equal to the base of the number system. The alphabet of the decimal system is 0 through 9, a total of 10 symbols or digits. In this appendix, we discuss four number systems that are relevant in the context of computer systems and programming. These are the decimal (base-10), binary (base-2), octal (base-8), and hexadecimal (base-16) number systems. Our intention in including the familiar decimal system is to use it to explain some fundamental concepts of positional number systems. Computers internally use the binary system. The remaining two number systems—octal and hexadecimal—are used mainly for convenience to write a binary number even though they are number systems on their own.
    [Show full text]
  • Agent Builder Troubleshooting Guide Chapter 1
    IBM Agent Builder Version 6.3.1 Troubleshooting Guide IBM Agent Builder Version 6.3.1 Troubleshooting Guide ii Agent Builder Troubleshooting Guide Chapter 1. Gathering product information for IBM Software Support Gather certain product information before you contact IBM® Software Support. About this task Gather the product information that is detailed in: Table 1. Procedure Gather the following information before you contact IBM Software Support: Table 1. Information to gather before you contact IBM Software Support Information type Description Log files Collect trace log files from failing systems. Most logs are in a logs subdirectory on the host computer. See Chapter 2, “Agent Builder Trace logging,” on page 3 for lists of all trace log files and their locations. Operating system Operating system version number and patch level Messages Messages and other information that is displayed on the screen Version numbers for an IBM Tivoli® Monitoring environment Version number of the following members of the monitoring environment v Tivoli Monitoring. Also, provide the patch level, if available. v Tivoli Monitoring: Windows OS Agent v Tivoli Monitoring: UNIX OS Agent v Tivoli Monitoring: Linux OS Agent Version numbers for an IBM Performance Management Version number of the following members of the environment monitoring environment v Operating System agent installed on the monitored system. v Monitoring Infrastructure Node (if installed on your premises). Tip: If you are using IBM Performance Management (SaaS), you do not install the Monitoring Infrastructure Node on your premises. Instead, a version hosted in the cloud is used. In this case, you do not need to provide the version number for this component.
    [Show full text]
  • Digital Alarm Communicator/Transmitters 411/411UD Manual
    Digital Alarm Communicator/Transmitters 411/411UD Manual Document LS10105-000GE-E 1/29/2014 Rev: A P/N LS10105-000GE-E:A ECN 13-875 Fire Alarm & Emergency Communication System Limitations While a life safety system may lower insurance rates, it is not a substitute for life and property insurance! An automatic fire alarm system—typically made up of smoke (caused by escaping gas, improper storage of flammable materi- detectors, heat detectors, manual pull stations, audible warning als, etc.). devices, and a fire alarm control panel (FACP) with remote notifi- Heat detectors do not sense particles of combustion and alarm cation capability—can provide early warning of a developing fire. only when heat on their sensors increases at a predetermined Such a system, however, does not assure protection against rate or reaches a predetermined level. Rate-of-rise heat detec- property damage or loss of life resulting from a fire. tors may be subject to reduced sensitivity over time. For this An emergency communication system—typically made up of reason, the rate-of-rise feature of each detector should be tested an automatic fire alarm system (as described above) and a life at least once per year by a qualified fire protection specialist. safety communication system that may include an autonomous Heat detectors are designed to protect property, not life. control unit (ACU), local operating console (LOC), voice commu- IMPORTANT! Smoke detectors must be installed in the same nication, and other various interoperable communication meth- room as the control panel and in rooms used by the system for ods—can broadcast a mass notification message.
    [Show full text]
  • Embedded Systems Programming with the Microchip PIC16F877 Microcontroller
    EMBEDDED SYSTEMS PROGRAMMING WITH THE PIC16F877 Second Edition By Timothy D. Green Copyright 2008 by Timothy D. Green All Rights Reserved. Table of Contents Preface …………………………………………………………………. 5 List of Figures …………………………………………………………. 6 Abbreviations and Acronyms …………………………………………. 7 Trademarks ……………………………………………………………. 10 Chapter 1 Introduction to ESP and the PIC …………………………. 11 Chapter 2 Microcontrollers and the PIC16F877 ……………………. 15 Section 2.0 Chapter Summary ……………………………….. 15 Section 2.1 Memory and Memory Organization ……………. 15 Section 2.2 The PIC16F877 …………………………………. 16 Section 2.3 Programming the PIC …………………………… 17 Chapter 3 Simple PIC Hardware & Software (“Hello World”) …….. 20 Section 3.0 Chapter Summary ……………………………….. 20 Section 3.1 A Simple Example System ……………………… 20 Section 3.2 Summary of Instructions and Concepts …………. 25 Chapter 4 The PIC Instruction Set (Part I) ………………………….. 27 Section 4.0 Chapter Summary ………………………………. 27 Section 4.1 The PIC16F877 Instruction Set ………………… 27 Section 4.2 Summary of Instructions and Concepts …………. 33 Chapter 5 The PIC Instruction Set (Part II) …………………………. 34 Section 5.0 Chapter Summary ……………………………….. 34 Section 5.1 Introduction ……………………………………… 34 Section 5.2 Keypad and Display Interface …………………… 35 Section 5.3 The STATUS Register and Flag Bits ……………. 39 Section 5.4 The Keypad Software ……………………………. 40 Section 5.5 The LED Display Software ……………………… 43 Section 5.6 Improved Display and Indirect Addressing ……… 46 Section 5.7 Odds & Ends …………………………………….. 50 Section 5.8 Using KEY_SCAN and DISPLAY Together ……. 54 Section 5.9 A Last Look at the Advanced Security System ….. 56 Section 5.10 Summary of Instructions and Concepts ………… 57 Chapter 6 Fundamental ESP Techniques ……………………………. 59 Section 6.0 Chapter Summary ………………………………… 59 Section 6.1 Introduction ………………………………………. 59 Section 6.2 Software Readability …………………………… 59 Section 6.3 Software Maintainability ………………………….
    [Show full text]
  • Technical Description 6036
    Technical Description Radio Clock for IBM PC XT/AT and Compatible 6036 version 04.02 30.08.99 Radio Clock 6036 KRSIBElektronik KRSIBElektronik Nottebohmstr. 41 58511 Lüdenscheid post box 1847 58468 Lüdenscheid fon: 02351 / 938686 fax: 02351 / 459590 Internet: http://www.hopf-time.com e-mail: [email protected] version 04.02 page 2 Radio Clock 6036 KRSIBElektronik CONTENS Page 1 General Information about the Circuit Board 6036 5 2 Starting the Radio Clock Circuit Board 6036 5 2.1 Hardware Setting Base Address and Mode 5 2.1.1 Mode 6030 = Limited Address Range of Hex 10 Addresses 6 2.1.2 Mode 6035/6036 = Extended Address Range of Hex 40 Addresses 6 2.1.3 UTC-Offset 6 3 Organisation of the Internal Clock Data 7 3.1 Example Reading of Time Data 8 3.2 Data Format 8 3.3 Setting the Clock with a New Time (in mode 6035/6036 only) 9 3.4 Millisecond 9 4 Status of the Clock and Reception Quality 10 4.1 Radio Operation 11 4.2 Quartz Operation 11 4.3 Reception Quality and Control Accuracy 11 5 Interrupt Possibilities 12 5.1 Activation of the Interrupt Output (only in mode 6035/6036) 12 5.2 Secondsynchronous Interrupts 13 5.3 Stopping the Interrupt Output 13 6 Reset of the Clock (only in Mode 6035/6036) 13 7 Master / Slave Operation of the Clock (in mode 6035/6036 only) 14 8 Antenna Installation 15 8.1 Usable Types of Antennas 15 8.2 Alignment of the antenna 15 8.3 Indirect Lightning Protection 18 9 Programming Help, Precautionary Measures and Source of Errors 19 10 Pulse Output 19 11 Description of the Front Panel of the Board 20 12 Technical Data 21 version 04.02 page 3 Radio Clock 6036 KRSIBElektronik second page for table of contents version 04.02 page 4 Radio Clock 6036 KRSIBElektronik 1 General Information about the Circuit Board 6036 • latest receiver design with faultless decoding of the signal even in difficult reception situations • plugging jumpers not necessary! All address and mode settings are carried out by the software included in the delivery.
    [Show full text]
  • Cobox Network Time Server
    CoBox Network Time Server Installation Guide CONTENTS 1 DESCRIPTION OF THE NETWORK TIME SERVER (NTS) 2 RELIABLE CLOCK SOURCES GLOBAL POSITIONING SATELLITE (GPS) SYSTEM .................................. 2-1 DCF-77 LF RADIO TRANSMITTER......................................................... 2-1 WWVB RADIO TRANSMITTER .............................................................. 2-1 3 HARDWARE INSTALLATION REQUIREMENTS CONTROLLER........................................................................................ 3-1 ANTENNA............................................................................................. 3-1 ANTENNA CABLE.................................................................................. 3-1 4 CONTROLLER SETUP NETWORK CONFIGURATION .................................................................. 4-1 FACTORY IP ADDRESS .......................................................................... 4-1 INITIAL IP ADDRESS SETTING ............................................................... 4-1 SERIAL CONFIGURATION....................................................................... 4-2 CONFIGURATION PARAMETERS ............................................................. 4-3 BASIC PARAMETERS ............................................................................. 4-3 Ethernet Interface ......................................................................... 4-3 Token Ring Interface .................................................................... 4-3 Locally Administered Hardware Address .....................................
    [Show full text]
  • Acclima TDR Sensor User Manual
    Acclima TDR Sensor User Manual Contents About the TDR Sensor ................................................................................................................................... 2 TDR Sensor Models ....................................................................................................................................... 2 TDR315x Description and Installation ....................................................................................................... 3 TDR315x Optimum Application ................................................................................................................ 3 TDR310x Description and Installation ....................................................................................................... 3 TDR310x Optimum Application ................................................................................................................ 4 TDR305x Description, Installation and Optimum Application .................................................................. 4 Sensor Connection and Setup ....................................................................................................................... 4 Sensor Connections .................................................................................................................................. 4 Setting the Sensor Address ....................................................................................................................... 5 Setting Addresses using the Acclima SDI-12 Reader ............................................................................
    [Show full text]
  • EASY204-DP, PROFIBUS-DP Slave Interface
    Rückenbreite bis 10 mm (1 Blatt = 0,106 mm für XBS) EASY204-DP Moeller GmbH PROFIBUS-DP Industrieautomation Hein-Moeller-Straße 7–11 D-53115 Bonn Slave Interface E-Mail: [email protected] Internet: www.moeller.net © 2002 by Moeller GmbH Änderungen vorbehalten AWB2528-1401GB xx/xx/XBS 03/05 Printed in the Federal Republic of Germany (0x/02) Article No.: xxxxxx 4 *patpks#nycmyn* Operating manual Operating manual 03/05 AWB2528-1401GB A A Think future. Switch to green. Think future. Switch to green. A Rückenbreite festlegen! (1 Blatt = 0,106 mm) All brand and product names are trademarks or registered trademarks of the owner concerned. 1st published 2001, edition date 04/01 2nd edition 05/2003 3rd edition 07/2004 See revision protocol in the “About this manual“ chapter © Moeller GmbH, 53105 Bonn Authors: Ronny Happ, Dieter Bauerfeind Editor: Thomas Kracht Translator: Terence Osborn All rights reserved, including those of the translation. No part of this manual may be reproduced in any form (printed, photocopy, microfilm or any other process) or processed, duplicated or distributed by means of electronic systems without written permission of Moeller GmbH, Bonn. Warning! Dangerous electrical voltage! Before commencing the installation • Disconnect the power supply of the device. • Suitable safety hardware and software • Ensure that devices cannot be accidentally measures should be implemented for the restarted. I/O interface so that a line or wire breakage on the signal side does not result in • Verify isolation from the supply. undefined states in the automation • Earth and short circuit. devices. • Cover or enclose neighbouring units that • Ensure a reliable electrical isolation of the are live.
    [Show full text]
  • Overview of ASCII/RS-485 Time Protocol
    TN-108 Sep-2017 TECHNICAL NOTE Overview of ASCII/RS-485 Time Protocol Introduction Summary ASCII/RS-485 is based on a simple time protocol originally defined by Arbiter Some power meters use an ASCII character string Systems called “ASCII + QUAL.” An ASCII string is communicated over RS-485 and transmitted over RS-485 for time synchronization. consists of an on-time mark (OTM) transmitted once per second, followed by an ASCII representation of the date/time and time quality. This document describes the protocol, and gives ex- amples of how Cyber Sciences products are used to This protocol is used by some power meters for time synchronization via a spare synchronize devices require this protocol, including RS-485 data communications port. Devices which support ASCII/RS-485 include: TM PM8000 and ION7550/7650 meters by Schneider PowerLogic PM8000 and ION7550/7650 meters by Schneider Electric and 9410 and Electric and 9410 and 9510/9610 meters by Siemens. 9510/9610 meters by Siemens. CyTimeTM SER-3200/2408 Sequence of Events Recorders can generate ASCII/RS-485 to synchronize these power meters, greatly simplifying time sync design. PROTOCOL DESCRIPTION ASCII Time Code ASCII/RS-485 is the name for an ASCII-based time protocol distributed over a stan- dard RS-485 2-wire network. The ASCII code (called “ASCII + QUAL”) consists of an on-time mark (OTM) once per second followed by ASCII representation of the date/ time and time quality as follows: <soh>ddd:hh:mm:ssQ<cr><lf> where: <soh> = hex 01 (start of header = OTM) ddd:hh:mm:ss = date/time (day of the year, hour, min, sec) Q = time quality flag (space = locked, ? = unknown) <cr> = hex 0d (carriage return code) <lf> = hex 0a (line feed code) Note: As shown above, the ASCII code includes an ambiguity of one year, and so the device must first be set to the correct year through other means.
    [Show full text]