O'Reilly logo

Memory Dump Analysis Anthology, Volume 7 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Message Cover

One of the powerful trace analysis techniques is using Adjoint Threads of Activity (Volume 5, page 283) to filter various linear message activities (as a generalization of Thread of Activity, Volume 4, page 339). Such filtered activities can then be analyzed either separately (Sheaf of Activities, page 307) or together such as a new pattern we introduce here. If we identify parallel ATIDs (ATID is Adjoint TID, see an example in Volume 5, page 279) and see that one covers the other we can then make a hypothesis that they are correlated (Volume 3, page 347). Here is a graphical example of a Periodic Message Block (page 300) largely composed from various Error Messages (page 299) that covers periodic Discontinuities (Volume 4, page ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required