Long-Term Supported Versions

    Innovation Versions

      Commonly Used Tools

      ftrace

      1. ftrace: a debug tool for the Linux kernel space. The kernel provides trace events for you to trace . ftrace can capture events so that you can intuitively view these events and trace kernel functions.
      2. Configuration and usage of ftrace: To use ftrace, you need to compile its dependencies into the kernel. By default, openEuler compiles the ftrace option. If the ftrace option is not enabled, you can enable it by choosing Kernel hacking > Tracers > Trace syscalls in menuconfig. In addition, you need to compile the debugfs by choosing Kernel hacking > Generic Kernel Debugging Instruments > Debug Filesystem.
      • Configuring the ftrace function

      ftrace provides access interfaces for user space through the debugfs. After the debugfs is configured in the kernel, the /sys/kernel/debug directory is created. The debugfs is mounted to this directory. If the kernel supports ftrace-related configuration items, a tracing directory is created in the debugfs. The debugfs is mounted to this directory. The following figure shows the content of this directory.

      • Introduction to the ftrace debugfs interface

        You can view some control and output files provided by ftrace through the debugfs. The common files are described as follows:

        available_tracers: available tracers

        current_tracer: running tracer

        available_events: lists all available trace events in the OS

        events: This directory differentiates events by module.

        set_event: lists the events to be traced.

        tracing_on: enables or disables tracing. echo 0 > tracing_on indicates that tracing is disabled, and 1 indicates that tracing is enabled.

        trace: queries trace data.

      • Available tracers

      en-us_image_0000001373373585

      function: a function call tracing program that does not require parameters function_graph: a function call tracer that uses subcalls

      • Trace events
      # Specify the arm_event of the RAS to be traced.
      echo ras:arm_event > /sys/kernel/debug/tracing/set_event
      
      # This file contains the event format and fields to be printed.
      cat /sys/kernel/debug/tracing/events/ras/arm_event/format
      
      # Start tracing.
      echo 1 > /sys/kernel/debug/tracing/tracing_on
      
      #  Observe the trace output.
      tail -f /sys/kernel/debug/tracing/trace
      

      c50cb9df64f4659787c810167c89feb4_1884x257

      • Tracing input parameters of kernel functions

      Trace mmap, which corresponds to the system call do_mmap. Output the addr input parameter.

      en-us_image_0000001373379529

      # Trace through the kprobe.
      echo 'p:probe1 do_mmap addr=%x1' > kprobe_events
      
      # Enable kprobe.
      echo 1 > events/kprobes/probe1/enable
      
      # Start tracing.
      echo 1 > tracing_on
      
      # View trace data.
      

      en-us_image_0000001322379488

      • Tracing function calls
      # Select a tracing type.
      echo function_graph > current_tracer
      
      # Set the PID of the process to be filtered.
      echo <pid> set_ftrace_pid
      
      # Start tracing.
      echo 1 > tracing_on
      
      # View trace data.
      

      en-us_image_0000001322219840

      strace

      The strace command is a diagnosis and debugging tool. You can use the strace command to analyze system calls and signal transmission of applications to solve problems or understand the application execution process.

      You can run the strace -h command to view the functions provided by strace.

      en-us_image_0000001322112990

      The most common usage is to trace the xx command, trace the forks, print the time, and output the result to the output file.

      strace -f -tt -o output xx
      

      kdump

      1. crash/kdump Principles

        kdump is a snapshot of the memory status of the OS running at a certain time point. It helps O&M personnel debug and analyze the cause of system breakdown. kdump is usually used when system breakdown and panic happen.

        The process is as follows.

        en-us_image_0000001321685172

      2. Installing and configuring related tools

        # Use Yum to install the corresponding software package.
        yum install kernel-debuginfo-$(uname -r) kexec-tools crash -y
        
        # Set the reserved memory size for crashkernel.
        vim /etc/default/grub
        

        en-us_image_0000001372821865

        # Regenerate the grub configuration file.
        grub2-mkconfig -o /boot/efi/EFI/openEuler/grub.cfg
        reboot
        
        # Start the kdump service.
        systemctl start kdump #Start kdump.
        systemctl enable kdump #Set the kdump to start upon system startup.
        
      3. Triggering a crash

        Operation 1 Retain the default settings of the kernel. When a hard lock or oops occurs, a panic is triggered.

        en-us_image_0000001372824637

        Operation 2 Modify the settings. The following commands cam make the settings take effect only once and become invalid after the system is restarted.

        # Set a soft lock to trigger a panic.
        echo 1 > /proc/sys/kernel/softlockup_panic
        
        # Trigger a kernel panic when an out of memory (OOM) error occurs.
        echo 1 > /proc/sys/vm/panic_on_oom
        
        # A panic occurs when a process is hung.
        echo 1 > /proc/sys/kernel/hung_task_panic
        
        # Set the timeout interval of the hung task mechanism.
        echo 60 > /proc/sys/kernel/kernel.hung_task_timeout_secs
        

        Operation 3 To make the configuration take effect permanently, write the following parameters to the /etc/sysctl.conf file and run the sysctl -p command:

        kernel.hung_task_panic=1
        kernel.hung_task_timeout_secs=60
        kernel.softlockup_panic=1
        vm.panic_on_oom=1
        
      4. Analyzing the crash

        Operation 1 Enable crash debugging.

        Operation 2 Find the generated vmcore file generated in the /var/crash/IP_address-time directory.

        Operation 3 Run the following command to start crash debugging:

        crash {vmcore file} {debug kernel vmlinux}
        

        en-us_image_0000001372748125

        The format of the crash debugging command is command args. command indicates the command to be executed, and args indicates the parameters required by some debugging commands.

        CommandDescription
        helpPrints the help information of a command. You can view the supported commands or the help information of a specific command. For example, run help bt.
        btPrints the function call stack information.
        logPrints the system message buffer. Parameters can be appended, for example, log.
        psDisplays the process status. > indicates that the process is active.
        disDisassembles a specified function or address. Example: dis -l \[func\]
        mountDisplays information about the current file system.

      Bug Catching

      Buggy Content

      Bug Description

      Submit As Issue

      It's a little complicated....

      I'd like to ask someone.

      PR

      Just a small problem.

      I can fix it online!

      Bug Type
      Specifications and Common Mistakes

      ● Misspellings or punctuation mistakes;

      ● Incorrect links, empty cells, or wrong formats;

      ● Chinese characters in English context;

      ● Minor inconsistencies between the UI and descriptions;

      ● Low writing fluency that does not affect understanding;

      ● Incorrect version numbers, including software package names and version numbers on the UI.

      Usability

      ● Incorrect or missing key steps;

      ● Missing prerequisites or precautions;

      ● Ambiguous figures, tables, or texts;

      ● Unclear logic, such as missing classifications, items, and steps.

      Correctness

      ● Technical principles, function descriptions, or specifications inconsistent with those of the software;

      ● Incorrect schematic or architecture diagrams;

      ● Incorrect commands or command parameters;

      ● Incorrect code;

      ● Commands inconsistent with the functions;

      ● Wrong screenshots.

      Risk Warnings

      ● Lack of risk warnings for operations that may damage the system or important data.

      Content Compliance

      ● Contents that may violate applicable laws and regulations or geo-cultural context-sensitive words and expressions;

      ● Copyright infringement.

      How satisfied are you with this document

      Not satisfied at all
      Very satisfied
      Submit
      Click to create an issue. An issue template will be automatically generated based on your feedback.
      Bug Catching
      编组 3备份