HP OpenVMS Systems Documentation |
OpenVMS Alpha System Analysis Tools Manual
10.5 Starting the System Dump DebuggerTo start SDD on the build system, enter the following command.
SDD displays the DBG> prompt. With the DBGHK$IMAGE_PATH logical name defined, you can invoke the ANALYZE/CRASH_DUMP command and optional qualifier /IMAGE_PATH. To use the ANALYZE/CRASH_DUMP command and optional qualifier (/IMAGE_PATH) to analyze the dump in file <file-name> enter the following command:
The /IMAGE_PATH qualifier is optional. If you do not use this qualifier, SDD uses the DBGHK$IMAGE_PATH logical name as the default. The /IMAGE_PATH qualifier is a quick way to change the logical name. However, when you use it, you cannot specify a search list. You can use only a logical name or a device and directory, although the logical name can be a search list.
Usually, SDD obtains the source file name from the object file. This is
put there by the compiler when the source is compiled with the /DEBUG
qualifier. The SET SOURCE command can take a list of paths as a
parameter. It treats them as a search list.
Only a subset of OpenVMS debugger commands can be used in SDD. The following are a few examples of commands that you can use in SDD:
Examples of commands that cannot be used in SDD are as follows:
You can also use the OpenVMS debugger command SDA to examine the system
dump with System Dump Analyzer semantics. This command, which is not
available when debugging user programs, is described in the next
section.
Once a dump file has been opened, you can use the commands listed in the previous section to examine the system dump. You can also use some System Dump Analyzer (SDA) commands, such as SHOW SUMMARY and SHOW DEVICE. This feature allows the system programmer to take advantage of the strengths of both the OpenVMS Debugger and SDA to examine the system dump and to debug system programs such as device drivers, without having to invoke both the OpenVMS debugger and SDA separately. To obtain access to SDA commands, you simply type "SDA" at the OpenVMS Debugger prompt ("DBG>") at any time after the dump file has been opened. SDA initializes itself and then outputs the "SDA>" prompt. Enter SDA commands as required. (See Chapter 4 for more information.) To return to the OpenVMS Debugger, you enter "EXIT" at the "SDA>" prompt. Optionally, you may invoke SDA to perform a single command and then return immediately to the OpenVMS Debugger, as in the following example:
SDA may be reentered at any time, with or without the optional SDA command. Once SDA has been initialized, the SDA> prompt is output more quickly on subsequent occasions. Note that there are some limitations on the use of SDA from within SDD:
If the need arises to switch between processes or CPUs in the system
dump, then you must invoke SDA separately using the DCL command
ANALYZE/CRASH_DUMP.
SDD provides a narrow window into the context of the system that was current at the time that the system crashed (stack, process, CPU, and so on). It does not provide full access to every part of the system as is provided by SDA. However, it does provide a view of the failed system using the semantics of the OpenVMS debugger---source correlation and display, call frame traversal, examination of variables by name, language constructs, and so on.
SDD therefore provides an additional approach to analyzing system dumps
that is difficult to realize with SDA, often allowing quicker
resolution of system crashes than is possible with SDA alone. When SDD
cannot provide the needed data from the system dump, you should use SDA
instead.
For a discussion and explanation of how the OpenVMS debugger accesses
symbols in OpenVMS executive images, see Section 9.11.
This section provides a sample session that shows the use of some OpenVMS debugger commands as they apply to the system dump debugger. The examples in this section show how to work with a dump created as follows:
To reproduce this sample session, you need access to the SYSTEM_DEBUG.DSF matching the SYSTEM_DEBUG.EXE file on your test system and to the source file C_TEST_ROUTINES.C, which is available in SYS$EXAMPLES. The example begins by invoking the system dump debugger's character cell interface on the build system.
Use the ANALYZE/CRASH_DUMP command to open the system dump. In this example, the logical name DBGHK$IMAGE_PATH is used for the image path, so the command qualifier /IMAGE_PATH is not being used. You may need to use it. When you have opened the dump file, the DBG> prompt is displayed. You should now do the following:
Now that the debugger has access to the source, you can put the debugger into screen mode to see exactly where you are and the code surrounding it.
Now, you try a couple of other commands, EXAMINE and SHOW CALLS. The EXAMINE command allows you to look at all the C variables. Note that the C_TEST_ROUTINES module is compiled with the /NOOPTIMIZE switch which allows access to all variables. The SHOW CALLS command shows you the call sequence from the beginning of the stack. In this case, you started out in the image EXEC_INIT. (The debugger prefixes all images other than the main image with SHARE$ so it shows up as SHARE$EXEC_INIT.)
Part 3
Part 3 describes the Watchpoint utility. It presents how to use the
Watchpoint utility by doing the following:
|
$ HELP/LIBRARY=SYS$HELP:WP |
Once the driver has been loaded, a suitably privileged user can designate a watchpoint in system space. Any write to a location designated as a watchpoint is trapped. Information is recorded about the write, including its time, the register contents, and the program counter (PC) and processor status longword (PSL) of the writing instruction. Optionally, one or both of the following user-specified actions can be taken:
You define a watchpoint by issuing QIO requests to the watchpoint driver; entering commands to the WP utility, which issues requests to the driver; or, from kernel mode code, invoking a routine within the watchpoint driver.
The WPDRIVER data structures store information about writes to a watchpoint. This information can be obtained either through QIO requests to the WPDRIVER, commands to the WP utility, XDELTA commands issued during a requested breakpoint, or SDA commands issued during the analysis of a requested crashdump.
1 For simplicity, this chapter only mentions XDELTA. Any reference to XDELTA breakpoints also implies SCD breakpoints. |
11.2 Initializing the Watchpoint Utility
From a process with CMKRNL privilege, run the SYSMAN utility to load the watchpoint driver, SYS$WPDRIVER.EXE. Enter the following commands:
$ RUN SYS$SYSTEM:SYSMAN SYSMAN> IO CONNECT WPA0:/NOADAPTER/DRIVER=SYS$WPDRIVER SYSMAN> EXIT |
SYSMAN creates system I/O data structures for the pseudo-device WPA0, loads WPDRIVER, and invokes its initialization routines. WPDRIVER initialization includes the following actions:
Memory requirements for WPDRIVER and its data structures are:
It is advisable to load the watchpoint driver relatively soon after
system initialization to ensure its allocation of physically contiguous
memory. If the driver cannot allocate enough physically contiguous
memory, it does not set WPA0: online. If the unit is offline, you will
not be able to use the watchpoint utility.
11.3 Creating and Deleting Watchpoints
There are three different ways to create and delete watchpoints:
The first two methods are described in detail in the sections that
follow.
11.3.1 Using the $QIO Interface
An image first assigns a channel to the pseudo-device WPA0: and then issues a $QIO request on that channel. The process must have the privilege PHY_IO; otherwise, the $QIO request is rejected with the error SS$_NOPRIV.
Table 11-1 shows the functions that the driver supports.
Function | Activity |
---|---|
IO$_ACCESS | Creates a watchpoint |
IO$_DEACCESS | Deletes a watchpoint |
IO$_RDSTATS | Receives trace information on a watchpoint |
The IO$_ACCESS function requires the following device/function dependent arguments:
The following are the constraints on the watchpoint area. It must be:
Because of the current behavior of the driver, there is an additional requirement that there be no "unexpected" access violations referencing a page containing a watchpoint. See Section 11.7 for further details.
To specify that an XDELTA breakpoint or a fatal bugcheck occur if the watchpoint is written, use the following I/O function code modifiers:
For an XDELTA breakpoint to be taken, OpenVMS must have been booted specifying that XDELTA and/or the SCD be resident (bit 1 or bit 15 in the boot flags must be set). If both watchpoint options are requested, the XDELTA breakpoint is taken first. At exit from the breakpoint, the driver crashes the system.
A request to create a watchpoint can succeed completely, succeed partially, or fail. Table 11-2 shows the status codes that can be returned in the I/O status block.
Status Code | Meaning |
---|---|
SS$_NORMAL | Success. |
SS$_BUFFEROVF | A watchpoint was established, but its length is less than was requested because the requested watchpoint would have straddled a page boundary. |
SS$_EXQUOTA | The watchpoint could not be created because too many watchpoints already exist. |
SS$_INSFMEM | The watchpoint could not be created because there was insufficient nonpaged pool to create data structures specific to this watchpoint. |
SS$_IVADDR | The requested watchpoint resides in one of the areas in which the WPDRIVER is unable to create watchpoints. |
SS$_WASSET | An existing watchpoint either coincides or overlaps with the requested watchpoint. |
The following example MACRO program assigns a channel to the WPA0 device and creates a watchpoint of 4 bytes, at starting address 80001068. The program requests neither an XDELTA breakpoint nor a system crash for that watchpoint.
$IODEF .PSECT RWDATA,NOEXE,RD,WRT,LONG ; WP_IOSB: .BLKL 2 ; I/O status block. WP_ADDR: .LONG ^X80001068 ; Address of watchpoint to create. WP_NAM: .ASCID /WPA0:/ ; Device to which to assign channel. WP_CHAN: .BLKW 1 ; Channel number. .PSECT PROG,EXE,NOWRT ; START: .CALL_ENTRY $ASSIGN_S DEVNAM=WP_NAM,CHAN=WP_CHAN BLBC R0,RETURN $QIOW_S CHAN=WP_CHAN,- FUNC=#IO$_ACCESS,- IOSB=WP_IOSB,- P2=#4,- P3=WP_ADDR BLBC R0,RETURN MOVL WP_IOSB,R0 ; Move status to R0. RETURN: RET ; Return to caller. .END START |
A watchpoint remains in effect until it is explicitly deleted. (Note, however, that watchpoint definitions do not persist across system reboots.) To delete an existing watchpoint, issue an IO$_DEACCESS QIO request.
The IO$_DEACCESS function requires the following device/function dependent argument: P3 - Starting address of the watchpoint to be deleted.
Table 11-3 shows the status values that are returned in the I/O status block.
Status Value | Meaning |
---|---|
SS$_NORMAL | Success. |
SS$_IVADDR | The specified watchpoint does not exist. |
Section 11.5 describes the use of the IO$_RDSTATS QIO request.
Previous | Next | Contents | Index |