Web hosting
Ver »
Páginas Web
Ver »
Soporte UNIX
Ver »
Ver »

Solaris Modular Debugger Guide

mdb was introduced in Solaris 8 as a replacement for the adb and crash commands
For more details Solaris Modular Debugger Guide 816-5041

Modular Debugger

Besides being able to analyze a core dump in the same way as adb, mdb is a modular debugger which allows the end user to create custom tools and commands to do almost anything.
The modularity of mdb is its main strength. Modules can allow us to look at programs in a number of contexts, both live and post-mortem. These tools are located in loadable modules which can be accessed via dlopen(). These modules are called dmods and include both dcmds (commands) and walkers. ("Walker" commands allow mdb to change the target to a different part of the program structure.)
mdb also has a number of good interactive features, including command line history, editing and logging. In addition, there is a syntax-checking facility and a built-in output pager.

Example: Analyze a core dump

root@ # mdb -k unix.3 vmcore.3
Loading modules: [ unix genunix specfs dtrace ufs sd pcisch ipc md ip hook neti sctp arp usba wrsm fcp fctl nca zfs random cpc sppp ]
> *panicstr/s
> $ < msgbuf
> $ < modules
> $ < cpus
> rootfs $< bootobj, swapfile $ < bootobj, dumpfile $ < bootobj
> $ < traceall
> < sp $ < stacktrace
Display status information about the system or dump being examined by the debugger
> ::status
List available functions
> ::dcmds
Display events in kernel memory allocator transaction log
> ::kmalog
Print Kernel Memory Caches
> ::kmastat
Finding Memory Leaks
> ::findleaks
Finding Corrupt Buffers
> ::kmem_verify
Allocator Logging Facility
> ::kmem_log
Print information about the threads dispatched on the system CPUs
> ::cpuinfo
Print a table of the active processes
> ::ps
Quit the debugger


Random TIPS


Configuración para los servers Sun Fire V210, V215, V240, V245, V445, V250, V440.

a) Moverse hasta el directorio de nuestra arquitectura del server:

root@ # cd /usr/platform/`uname -a`/sbin
root@ # pwd
root@ # ls
eeprom fruadm prtdiag scadm trapstat
root@ # ./scadm shownetwork
IP Address:
Gateway address:
Ethernet address: 00:03:ba:d4:cf:e8
root@ #

b) Configurar parametros de red para su acceso remoto a la ALOM

root@ # ./scadm set if_network true
root@ # ./scadm set netsc_tpelinktest true
root@ # ./scadm set netsc_ipaddr
root@ # ./scadm set netsc_ipnetmask
root@ # ./scadm set netsc_ipgateway
root@ # ./scadm set sc_cliprompt aeromexicoqa

root@ # ./scadm shownetwork
IP Address:
Gateway address:
Ethernet address: 00:03:ba:d4:cf:e8

root@ # ./scadm resetrsc

Ahora a testear conectividad vía telnet, una vez que se halla conectado el cable de red a la tarjeta ALOM.

free counters