VSI Openvms System Analysis Tools Manual

VSI Openvms System Analysis Tools Manual

VSI OpenVMS VSI OpenVMS System Analysis Tools Manual Document Number: DO-DSYATM-01A Publication Date: November 2019 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 VMS Software, Inc., (VSI) Bolton, Massachusetts, USA VSI OpenVMS System Analysis Tools Manual: Copyright © 2019 VMS Software, Inc. (VSI), Bolton, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. The VSI OpenVMS documentation set is available on DVD. ii VSI OpenVMS System Analysis Tools Manual Preface .................................................................................................................................... xi 1. About this manual ......................................................................................................... xi 2. Document Structure ....................................................................................................... xi 3. Related Documents ........................................................................................................ xi 4. VSI Encourages Your Comments ................................................................................... xii 5. Typographical Conventions ........................................................................................... xii Chapter 1. Overview of System Analysis Tools .................................................................. 1 1.1. System Dump Analyzer (SDA) ..................................................................................... 2 1.2. System Code Debugger (SCD) ..................................................................................... 2 1.3. System Dump Debugger (SDD) .................................................................................... 3 1.4. Watchpoint Utility (Alpha Only) ................................................................................... 3 1.5. System Service Logging ............................................................................................... 3 1.6. Delta/XDelta Debugger ................................................................................................ 3 1.7. Dump-Off-System-Disk (DOSD) .................................................................................. 4 1.8. On-Chip Logic Analyzer (OCLA) ................................................................................. 4 Part I. OpenVMS System Dump Analyzer (SDA) Chapter 2. SDA Description ................................................................................................. 7 2.1. Capabilities of SDA ..................................................................................................... 7 2.2. System Management and SDA ..................................................................................... 8 2.2.1. Writing System Dumps ...................................................................................... 9 2.2.1.1. Dump File Style ..................................................................................... 9 2.2.1.2. Comparison of Full and Selective Dumps ............................................... 10 2.2.1.3. Controlling the Size of Page Files and Dump Files .................................. 11 2.2.1.4. Writing to the System Dump File .......................................................... 11 2.2.1.5. Writing to a Dump File off the System Disk ........................................... 12 2.2.1.6. Writing to the System Page File ............................................................ 13 2.2.2. Saving System Dumps ..................................................................................... 13 2.2.3. Partial Dump Copies ........................................................................................ 14 2.2.3.1. Example - Use of Partial Dump Copies .................................................. 15 2.2.3.2. Additional notes on Partial Dump Copies ............................................... 16 2.2.4. Invoking SDA When Rebooting the System ...................................................... 17 2.3. Analyzing a System Dump ......................................................................................... 18 2.3.1. Requirements ................................................................................................... 18 2.3.2. Invoking SDA ................................................................................................. 18 2.3.3. Mapping the Contents of the Dump File ........................................................... 19 2.3.4. Building the SDA Symbol Table ...................................................................... 19 2.3.5. Executing the SDA Initialization File (SDA$INIT) ............................................ 20 2.4. Analyzing a Running System ...................................................................................... 20 2.5. SDA Context ............................................................................................................. 21 2.6. SDA Command Format .............................................................................................. 23 2.6.1. Using Expressions and Operators ..................................................................... 23 2.6.1.1. Radix Operators .................................................................................... 24 2.6.1.2. Arithmetic and Logical Operators .......................................................... 24 2.6.1.3. Precedence Operators ............................................................................ 26 2.6.1.4. SDA Symbols ....................................................................................... 26 2.6.2. SDA Display Mode ......................................................................................... 31 2.7. Investigating System Failures ...................................................................................... 32 2.7.1. Procedure for Analyzing System Failures .......................................................... 32 2.7.2. Fatal Bugcheck Conditions ............................................................................... 33 iii VSI OpenVMS System Analysis Tools Manual 2.7.2.1. Alpha Mechanism Array ....................................................................... 33 2.7.2.2. Integrity server Mechanism Array .......................................................... 35 2.7.2.3. Signal Array ......................................................................................... 38 2.7.2.4. 64-Bit Signal Array ............................................................................... 39 2.7.2.5. Alpha Exception Stack Frame ............................................................... 39 2.7.2.6. Integrity server Exception Stack Frame .................................................. 40 2.7.2.7. SSRVEXCEPT Example ....................................................................... 43 2.7.2.8. Illegal Page Faults ................................................................................ 49 2.8. Page Protections and Access Rights ............................................................................ 49 2.9. Inducing a System Failure .......................................................................................... 50 2.9.1. Meeting Crash Dump Requirements ................................................................. 51 2.9.2. Procedure for Causing a System Failure ........................................................... 51 Chapter 3. ANALYZE Usage ............................................................................................. 53 3.1. ANALYZE ................................................................................................................ 53 3.2. /COLLECTION .......................................................................................................... 56 3.3. /CRASH_DUMP ........................................................................................................ 56 3.4. /LOG ......................................................................................................................... 57 3.5. /OVERRIDE .............................................................................................................. 58 3.6. /RELEASE ................................................................................................................. 59 3.7. /SHADOW_MEMBER ............................................................................................... 60 3.8. /SSLOG ..................................................................................................................... 62 3.9. /SYMBOL .................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    568 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us