1 /CRASH_DUMP
Opens a system dump for analysis by the System Dump Debugger (kept debugger only). Format ANALYZE/CRASH_DUMP
1.1 – Description
For OpenVMS Integrity servers and Alpha systems, invokes the System Dump Debugger (SDD) to analyze a system dump. SDD is similar in concept to the System Code Debugger (SCD). While SCD allows connection to a running system, with control of the system's execution and the examination and modification of variables, SDD allows analysis of memory as recorded in a system dump. Use of SDD usually involves two systems, although all of the required environment can be set up on a single system. The description that follows assumes that two systems are being used: o The build system, where the image that causes the system crash has been built o The test system, where the image is executed and the system crash occurs In common with SCD, the OpenVMS debugger user interface allows you to specify variable names, routine names, and so on, precisely as they appear in your source code. Also, SDD can display the source code where the software was executing at the time of the system crash. SDD recognizes the syntax, data typing, operators, expressions, scoping rules, and other constructs of a given language. If your code or driver is written in more than one language, you can change the debugging context from one language to another during a debugging session. To use SDD you must do the following: o Build the system image or device driver that is causing the system crash. o Boot a system, including the system image or device driver, and perform the necessary steps to cause the system crash. o Reboot the system and save the dump file. o Invoke SDD, which is integrated with the OpenVMS debugger. For more information about using the SDD, including a sample SDD session, see the VSI OpenVMS System Analysis Tools Manual. Related commands: ANALYZE/PROCESS_DUMP CONNECT %NODE SDA
1.2 – Example
DBG> ANALYZE/CRASH_DUMP DBG> Invokes SDD from within the kept debugger.
2 /PROCESS_DUMP
Opens a process dump for analysis with the System Code Debugger (kept debugger only) Format ANALYZE/PROCESS_DUMP dumpfile
2.1 – Parameters
dumpfile The name of the process dump file to be analyzed. The file type must be .DMP.
2.2 – Qualifiers
2.2.1 /IMAGE_PATH
/IMAGE_PATH=directory-spec Specifies the search path for the debugger to find the files that contains the debugger symbol tables (DSTs). The files must be of type .DSF or .EXE, with the same name as the image names in the dumpfile. For example, if image name foo.exe is in the dump file, then the debugger searches for foo.dsf or foo.exe.
2.3 – Description
(Kept debugger only.) Opens a process dump for analysis with the System Code Debugger (SCD). The qualifier /PROCESS_DUMP is required and distinguishes this command from the one that invokes the System Dump Debugger (SDD), ANALYZE/CRASH_DUMP. The qualifier /IMAGE_PATH=directory-spec is optional, and specifies the search path the debugger is to use to find the debugger symbol table (DST) files. The debugger builds an image list from the saved process image list. When you set an image (the main image is automatically set), the debugger attempts to open that image in order to find the DSTs. If you include the /IMAGE_PATH=directory-spec qualifier, the debugger searches for the .DST file in the specified directory. The debugger first tries to translate directory-spec as the logical name of a directory search list. If that fails, the debugger interprets directory-spec as a directory specification, and searches that directory for matching .DSF or .EXE files. A .DSF file takes precedence over an .EXE file. The name of the .DSF or .EXE file must match the image name. If you do not include the /IMAGE_PATH=directory-spec qualifier, the debugger looks for the DST file first in the directory that contains the dump file. If that fails, the debugger next searches directory SYS$SHARE and then directory SYS$MESSAGE. If the debugger fails to find a DST file for the image, symbolic information available to the debugger is limited to global and universal symbol names. The debugger checks for link date-time mismatches between the dump file image and the DST file and issues a warning if one is discovered. The parameter dumpfile is the name of the process dump file to be analyzed. Note that the process dump file type must be .DMP and the DST file type must be either .DSF or .EXE. For more information about using SCD, see the VSI OpenVMS System Analysis Tools Manual. Related commands: ANALYZE/CRASH_DUMP CONNECT %NODE SDA
2.4 – Example
DBG> ANALYZE/PROCESS/IMAGE_DUMP=my_disk$:[my_dir] my_disk$:[my_dir]wecrash.dmp %SYSTEM-F-IMGDMP, dynamic image dump signal at PC=001C0FA0B280099C, PS=001C003C break on unhandled exception preceding WECRASH\ th_run \%LINE 26412 in THREAD 8 26412: if (verify) { DBG> SET RADIX HEXADECIMAL; EXAMINE PC WECRASH\th_run\%PC: 0000000000030244 DBG>