13-进程监控和维护命令
本章节下载: 13-进程监控和维护命令 (585.12 KB)
目 录
1.1.1 display exception context
1.1.2 display exception filepath
1.1.4 display kernel deadloop configuration
1.1.5 display kernel exception
1.1.6 display kernel starvation configuration
1.1.11 display process memory heap
1.1.12 display process memory heap address
1.1.13 display process memory heap size
1.1.15 monitor kernel deadloop action threshold
1.1.16 monitor kernel deadloop enable
1.1.17 monitor kernel deadloop exclude-thread
1.1.18 monitor kernel deadloop time
1.1.19 monitor kernel starvation enable
1.1.20 monitor kernel starvation exclude-thread
1.1.21 monitor kernel starvation time
1.1.25 reset exception context
1.1.28 third-part-process start
1.1.29 third-part-process stop
设备支持的存储介质与设备型号相关,本手册使用flash类型的存储介质举例,实际使用过程中,请以设备实际情况为准。
display memory、display process、display process cpu、monitor process和monitor thread命令既可显示用户态进程的相关信息,又可显示内核线程的相关信息,为简便起见,在这些命令中,统一使用“进程”一词来指代。
display exception context命令用来显示用户态进程异常时的上下文信息。
【命令】
(独立运行模式)
display exception context [ count value ]
(IRF模式)
display exception context [ count value ] [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
count value:表示上下文信息的显示个数,取值范围为1~20,缺省值为1。
slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【使用指导】
当用户态进程发生一次异常,系统会生成一个core文件,还会生成一条上下文信息,用于记录异常用户态进程的ID、生成core文件的时间、core文件存放的位置、栈信息和寄存器信息。一个core文件对应一条上下文信息,最多可记录的上下文信息数和可记录的core文件数目相同。
【举例】
# 显示在x86体系32位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 120 (routed)
Crash signal: SIGBUS
Crash time: Tue Apr 9 17:14:30 2013
Core file path:
flash:/core/node0_routed_120_7_20130409-171430_1365527670.core
#0 0xb7caba4a
#1 0x0804cb79
#2 0xb7cd77c4
#3 0x08049f45
Backtrace stopped.
Registers' content
eax:0xfffffffc ebx:0x00000003 ecx:0xbfe244ec edx:0x0000000a
esp:0xbfe244b8 ebp:0xbfe244c8 esi:0xffffffff edi:0xbfe24674
eip:0xb7caba4a eflag:0x00000292 cs:0x00000073 ss:0x0000007b
ds:0x0000007b es:0x0000007b fs:0x00000000 gs:0x00000033
# 显示在x86体系64位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 121 (routed)
Crash signal: SIGBUS
Crash time: Sun Mar 31 11:12:21 2013
Core file path:
flash:/core/node0_routed_121_7_20130331-111221_1364728341.core
#0 0x00007fae7dbad20c
#1 0x00000000004059fa
#2 0x00007fae7dbd96c0
#3 0x0000000000402b29
Backtrace stopped.
Registers' content
rax:0xfffffffffffffffc rbx:0x00007fff88a5dd10
rcx:0xffffffffffffffff rdx:0x000000000000000a
rsi:0x00007fff88a5dd10 rdi:0x0000000000000003
rbp:0x00007fff88a5dcf0 rsp:0x00007fff88a5dcf0
r8:0x00007fae7ea587e0 r9:0x0000000000000079
r10:0xffffffffffffffff r11:0x0000000000000246
r12:0x0000000000405b18 r13:0x00007fff88a5ff7a
r14:0x00007fff88a5de30 r15:0x0000000000000000
rip:0x00007fae7dbad20c flag:0x0000000000000246
cs:0x0000000000000033 ss:0x000000000000002b
ds:0x0000000000000000 es:0x0000000000000000
fs:0x0000000000000000 gs:0x0000000000000000
fs_base:0x00007fae80a5d6a0 gs_base:0x0000000000000000
orig_ax:0x00000000000000e8
# 显示在powerpc体系32位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 133 (routed)
Crash signal: SIGBUS
Crash time: Wed Apr 10 15:47:49 2013
Core file path:
flash:/core/node0_routed_133_7_20130410-154749_1365608869.core
#0 0x184720bc
#1 0x10006b4c
Backtrace stopped.
Registers' content
grp00: 0x000000ee 0x7ffd6ad0 0x1800f440 0x00000004
grp04: 0x7ffd6af8 0x0000000a 0xffffffff 0x184720bc
grp08: 0x0002d200 0x00000003 0x00000001 0x1847209c
grp12: 0x10006b4c 0x10020534 0xd6744100 0x00000000
grp16: 0x00000000 0xa0203ff0 0xa028b12c 0xa028b13c
grp20: 0xa028b148 0xa028b168 0xa028b178 0xa028b190
grp24: 0xa028b1a8 0xa028b1b8 0x00000000 0x7ffd6c08
grp28: 0x10006cac 0x7ffd6f92 0x184c1b84 0x7ffd6ae0
nip:0x184720bc lr:0x10006b4c cr:0x38000022 ctr:0x1847209c
msr:0x0002db00 xer:0x00000000 ret:0xfffffffc dsisr:0x08000000
gr3:0x00000003 mq:0x00000000 trap:0x00000c00 dar:0x1833114c
# 显示在powerpc体系64位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 172 (routed)
Crash signal: SIGBUS
Crash time: Sat Sep 15 16:53:16 2007
Core file path:
flash:/core/node1_routed_172_7_20070915-165316_1189875196.core
#0 0x00000fff803c66b4
#1 0x0000000010009b94
#2 0x00000fff80401814
Backtrace stopped.
Registers' content
grp00: 0x00000000000000ee 0x00000fffffd04840
grp02: 0x00000fff80425c28 0x0000000000000004
grp04: 0x00000fffffd048c0 0x000000000000000a
grp06: 0xffffffffffffffff 0x00000fff803c66b4
grp08: 0x000000008002d000 0x0000000000000000
grp10: 0x0000000000000000 0x0000000000000000
grp12: 0x0000000000000000 0x00000fff80a096b0
grp14: 0x000000007b964c00 0x000000007b7d0000
grp16: 0x0000000000000001 0x000000000000000b
grp18: 0x0000000000000031 0x0000000000a205b8
grp20: 0x0000000000a20677 0x0000000000000000
grp22: 0x000000007bb91014 0x0000000000000000
grp24: 0xc0000000005ae1c8 0x0000000000000000
grp26: 0xc0000001f00bff20 0xc0000001f00b0000
grp28: 0x00000fffffd04a30 0x000000001001aed8
grp30: 0x00000fffffd04fae 0x00000fffffd04840
nip:0x00000fff803c66b4 lr:0x0000000010009b94
cr:0x0000000058000482 ctr:0x00000fff803c66ac
msr:0x000000008002d000 xer:0x0000000000000000
ret:0xfffffffffffffffc dsisr:0x0000000000000000
gr3:0x0000000000000003 softe:0x0000000000000001
trap:0x0000000000000c00 dar:0x00000fff8059d14c
# 显示在mips体系32位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 182 (routed)
Crash signal: SIGBUS
Crash time: Sun Jan 2 08:11:38 2013
Core file path:
flash:/core/node4_routed_182_10_20130102-081138_1293955898.core
#0 0x2af2faf4
#1 0x00406d8c
Backtrace stopped.
Registers' content
zero:0x00000000 at:0x1000dc00 v0:0x00000004 v1:0x00000003
a0:0x00000003 a1:0x7fd267e8 a2:0x0000000a a3:0x00000001
t0:0x00000000 t1:0xcf08fa14 t2:0x80230510 t3:0xfffffff8
t4:0x69766520 t5:0x00000000 t6:0x63cc6000 t7:0x44617461
s0:0x7fd26f81 s1:0x00401948 s2:0x7fd268f8 s3:0x803e1db0
s4:0x803e1da0 s5:0x803e1d88 s6:0x803e1d70 s7:0x803e1d60
t8:0x00000008 t9:0x2af2fae0 k0:0x00000000 k1:0x00000000
gp:0x2af9a3a0 sp:0x7fd267c0 s8:0x7fd267c0 ra:0x00406d8c
sr:0x0000dc13 lo:0xef9db265 hi:0x0000003f bad:0x2add2010
cause:0x00800020 pc:0x2af2faf4
# 显示在mips体系64位登录设备上的异常上下文信息。
<Sysname> display exception context
Index 1 of 1
------------------------------
Crashed PID: 270 (routed)
Crash signal: SIGBUS
Crash time: Wed Mar 27 12:39:12 2013
Core file path:
flash:/core/node16_routed_270_10_20130327-123912_1364387952.core
#0 0x0000005555a3bcb4
#1 0x0000000120006c1c
Backtrace stopped.
Registers' content
zero:0x0000000000000000 at:0x0000000000000014
v0:0x0000000000000004 v1:0x0000000000000003
a0:0x0000000000000003 a1:0x000000ffff899d90
a2:0x000000000000000a a3:0x0000000000000001
a4:0x0000005555a9b4e0 a5:0x0000000000000000
a6:0xffffffff8021349c a7:0x20696e206368616e
t0:0x0000000000000000 t1:0xffffffff80105068
t2:0xffffffff80213890 t3:0x0000000000000008
s0:0x0000005555a99c40 s1:0x000000ffff89af5f
s2:0x0000000120007320 s3:0x0000005555a5f470
s4:0x000000ffff899f80 s5:0xffffffff803cc6c0
s6:0xffffffff803cc6a8 s7:0xffffffff803cc690
t8:0x0000000000000002 t9:0x0000005555a3bc98
k0:0x0000000000000000 k1:0x0000000000000000
gp:0x0000000120020460 sp:0x000000ffff899d70
s8:0x000000ffff899d80 ra:0x0000000120006c1c
sr:0x000000000400fff3 lo:0xdf3b645a1cac08c9
hi:0x000000000000007f bad:0x000000555589ba84
cause:0x0000000000800020 pc:0x0000005555a3bcb4
表1-1 display exception context命令输出信息描述表
字段 |
描述 |
Crashed PID |
发生异常的用户态进程ID |
Crash signal |
导致异常的信号: · SIGABRT:异常终止(abort) · SIGBUS:总线错误 · SIGFPE:浮点异常 · SIGILL:程序执行了非法指令,导致异常 · SIGQUIT:终端退出符 · SIGSEGV:无效存储访问 · SIGSYS:无效系统调用 · SIGTRAP:跟踪断点时发生了异常 · SIGXCPU:超过CPU限制(setrlimit) · SIGXFSZ:超过文件长度限制(setrlimit) · SIGUNKNOW:未知原因 |
Crash time |
异常发生的时间 |
Core file path |
core文件存放的位置 |
Backtrace stopped |
表示栈信息已经显示完毕 |
Registers’ content |
寄存器的内容 |
【相关命令】
· reset exception context
display exception filepath命令用来显示core文件的保存路径。
【命令】
(独立运行模式)
display exception filepath
(IRF模式)
display exception filepath [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
slot slot-number:表示设备在IRF中的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【举例】
# 显示core文件的保存路径。(独立运行模式)
<Sysname> display exception filepath
The exception filepath is flash:.
# 显示指定slot上core文件的保存路径。(IRF模式)
<Sysname> display exception filepath slot 1
The exception filepath on slot 1 is flash:.
display kernel deadloop命令用来显示内核线程死循环信息。
【命令】
(独立运行模式)
display kernel deadloop show-number [ offset ] [ verbose ]
(IRF模式)
display kernel deadloop show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
show-number:需要显示的死循环信息的数目,取值范围为1~10。
offset:需要显示的起始条目距最近条目的偏移,取值范围为0~9,缺省值为0。
verbose:表示显示详细信息。不指定该参数时,显示概要信息。
slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【举例】
# 显示最近一条内核线程死循环的概要信息。(独立运行模式)
<Sysname> display kernel deadloop 1
----------------- Deadloop record 1 -----------------
Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 0
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
# 显示最近一条内核线程死循环的详细信息。(独立运行模式)
<Sysname> display kernel deadloop 1 verbose
----------------- Deadloop record 1 -----------------
Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 0
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
Last 5 thread switches : migration/0 (11:16:00.823018)-->
swapper (11:16:00.833018)-->
kthreadd (11:16:00.833518)-->
swapper (11:16:00.833550)-->
disk (11:16:00.833560)
Register content:
Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ;
Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ;
Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ;
Reg: r6, Val = 0x00000000 ; Reg: r7, Val = 0x0000ffff ;
Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ;
Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ;
Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ;
Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ;
Reg: r16, Val = 0xe2be5f00 ; Reg: r17, Val = 0x00000000 ;
Reg: r18, Val = 0x00000000 ; Reg: r19, Val = 0x00000000 ;
Reg: r20, Val = 0x024c10f8 ; Reg: r21, Val = 0x057d9244 ;
Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ;
Reg: r24, Val = 0x00000002 ; Reg: r25, Val = 0x24000024 ;
Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ;
Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ;
Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ;
Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;
Reg: xer, Val = 0x00000000 ; Reg: lr, Val = 0x0186eff0 ;
Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ;
Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ;
Reg: dsisr, Val = 0x40000000 ; Reg: result, Val = 0x00020300 ;
Dump stack (total 1024 bytes, 16 bytes/line):
0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84
0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4
0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00
0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00
0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4
0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08
0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00
0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0
0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00
0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30
0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00
0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0
0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00
0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc
0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18
0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f
0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00
0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98
0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98
0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00
0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70
0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44
Call trace:
Function Address = 0x8012a4b4
Function Address = 0x8017989c
Function Address = 0x80179b30
Function Address = 0x80127438
Function Address = 0x8012d734
Function Address = 0x80100a00
Function Address = 0xe0071004
Function Address = 0x8016ce0c
Function Address = 0x801223a0
Instruction dump:
41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80
4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c
# 显示最近一条内核线程死循环的概要信息。(IRF模式)
<Sysname> display kernel deadloop 1
----------------- Deadloop record 1 -----------------
Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 1
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
# 显示最近一条内核线程死循环的详细信息。(IRF模式)
<Sysname> display kernel deadloop 1 verbose
----------------- Deadloop record 1 -----------------
Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 1
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
Last 5 thread switches : migration/0 (11:16:00.823018)-->
swapper (11:16:00.833018)-->
kthreadd (11:16:00.833518)-->
swapper (11:16:00.833550)-->
disk (11:16:00.833560)
Register content:
Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ;
Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ;
Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ;
Reg: r6, Val = 0x00000000 ; Reg: r7, Val = 0x0000ffff ;
Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ;
Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ;
Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ;
Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ;
Reg: r16, Val = 0xe2be5f00 ; Reg: r17, Val = 0x00000000 ;
Reg: r18, Val = 0x00000000 ; Reg: r19, Val = 0x00000000 ;
Reg: r20, Val = 0x024c10f8 ; Reg: r21, Val = 0x057d9244 ;
Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ;
Reg: r24, Val = 0x00000002 ; Reg: r25, Val = 0x24000024 ;
Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ;
Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ;
Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ;
Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;
Reg: xer, Val = 0x00000000 ; Reg: lr, Val = 0x0186eff0 ;
Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ;
Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ;
Reg: dsisr, Val = 0x40000000 ; Reg: result, Val = 0x00020300 ;
Dump stack (total 1024 bytes, 16 bytes/line):
0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84
0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4
0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00
0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00
0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4
0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08
0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00
0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0
0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00
0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30
0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00
0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0
0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00
0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc
0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18
0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f
0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00
0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98
0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98
0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00
0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70
0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44
Call trace:
Function Address = 0x8012a4b4
Function Address = 0x8017989c
Function Address = 0x80179b30
Function Address = 0x80127438
Function Address = 0x8012d734
Function Address = 0x80100a00
Function Address = 0xe0071004
Function Address = 0x8016ce0c
Function Address = 0x801223a0
Instruction dump:
41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80
4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c
表1-2 display kernel deadloop命令显示信息描述表
字段 |
描述 |
Description |
发生死循环的内核线程的描述信息,包括死循环内核线程所在的CPU的编号、内核线程连续运行的时间、内核线程的名称和编号 |
Recorded at |
内核线程死循环被记录的时间点,精确到微秒 |
Occurred at |
内核线程发生死循环的时间,精确到微秒 |
Instruction address |
内核线程被检测到发生死循环时对应的指令信息 |
Thread |
发生死循环的内核线程的名称和编号 |
Context |
内核线程被检测到发生死循环时所在的上下文环境 |
Cpu |
运行该内核线程的CPU的编号 |
VCPU ID |
运行该内核线程的CPU核的编号 |
Kernel module info |
内核线程被检测到发生死循环时,系统中已加载的内核模块信息。包括: · module name表示内核模块名称 · module address内核模块加载的内存地址 |
Last 5 thread switches |
内核线程被检测到发生死循环时,记录死循环发生的CPU上、最近五次的内核线程切换轨迹。包括内核线程的名称和内核线程切换时间点,时间精确到微秒 |
Register content |
内核线程被检测到发生死循环时现场的寄存器信息。Reg表示寄存器名称,Val表示寄存器中保存的值 |
Dump stack |
内核线程被检测到发生死循环时现场的堆栈信息 |
Call trace |
内核线程被检测到发生死循环时现场的函数调用栈信息,即每级调用函数的指令地址 |
Instruction dump |
内核线程被检测到发生死循环时对应的指令码。非法指令用ffffffff表示 |
No information to display |
表示系统中没有内核线程死循环记录 |
【相关命令】
· reset kernel deadloop
display kernel deadloop configuration命令用来显示内核线程死循环监控参数配置。
【命令】
(独立运行模式)
display kernel deadloop configuration
(IRF模式)
display kernel deadloop configuration [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【举例】
# 显示内核线程死循环监控参数配置。
<Sysname> display kernel deadloop configuration
Thread dead loop detection: Enabled
Dead loop timer (in seconds): 20
Cores with dead loop detection enabled: 0-1
Dead loop action threshold: 2 consecutive dead loops
Threads excluded from monitoring: 1
TID: 15 Name: co0
表1-3 display kernel deadloop configuration命令显示信息描述表
字段 |
描述 |
Thread dead loop detection: Enabled |
内核线程死循环检测功能处于开启状态 |
Thread dead loop detection: Disabled |
内核线程死循环检测功能处于关闭状态 |
Dead loop timer (in seconds): n |
内核线程死循环判定周期(单位为秒),即内核线程连续运行时间大于n秒时,则判定为死循环 |
Cores with dead loop detection enabled |
开启了内核线程死循环功能的CPU核的编号 |
Dead loop action threshold: 2 consecutive dead loops |
配置内核线程死循环后触发纠错动作的阈值:系统连续检测到内核线程死循环的次数 |
Threads excluded from monitoring |
不进行死循环检测的内核线程列表,配置monitor kernel deadloop exclude-thread命令后才会显示该信息 |
Name |
不进行死循环检测的内核线程的名称 |
TID |
不进行死循环检测的内核线程的编号 |
No thread is excluded from monitoring |
对所有内核线程都进行死循环检查 |
display kernel exception命令用来显示内核线程的异常信息。
【命令】
(独立运行模式)
display kernel exception show-number [ offset ] [ verbose ]
(IRF模式)
display kernel exception show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
show-number:需要显示的异常信息的数目,取值范围为1~10。
offset:需要显示的条目距最近条目的偏移,取值范围为0~9,缺省值为0。
verbose:显示详细信息。不指定该参数时,显示概要信息。
slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【使用指导】
当内核线程在运行过程中发生异常时,系统会自动记录异常信息,以便设备维护人员定位问题。
【举例】
# 显示最近一条内核线程异常的概要信息。(独立运行模式)
<Sysname> display kernel exception 1
----------------- Exception record 1 -----------------
Description : Oops[#0]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 0
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
module name (disk) module address (0xe00bd000)
# 显示最近一条内核线程异常的详细信息。(独立运行模式)
<Sysname> display kernel exception 1 verbose
----------------- Exception record 1 -----------------
Description : Oops[#0]
Recorded at : 2013-05-01 11:16:00.823018
Occurred at : 2013-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 0
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
module name (12500) module address (0xe00bd000)
Last 5 thread switches : migration/0 (11:16:00.823018)-->
swapper (11:16:00.833018)-->
kthreadd (11:16:00.833518)-->
swapper (11:16:00.833550)-->
disk (11:16:00.833560)
Register content:
Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ;
Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ;
Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ;
Reg: r6, Val = 0x00000000 ; Reg: r7, Val = 0x0000ffff ;
Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ;
Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ;
Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ;
Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ;
Reg: r16, Val = 0xe2be5f00 ; Reg: r17, Val = 0x00000000 ;
Reg: r18, Val = 0x00000000 ; Reg: r19, Val = 0x00000000 ;
Reg: r20, Val = 0x024c10f8 ; Reg: r21, Val = 0x057d9244 ;
Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ;
Reg: r24, Val = 0x00000002 ; Reg: r25, Val = 0x24000024 ;
Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ;
Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ;
Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ;
Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;
Reg: xer, Val = 0x00000000 ; Reg: lr, Val = 0x0186eff0 ;
Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ;
Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ;
Reg: dsisr, Val = 0x40000000 ; Reg: result, Val = 0x00020300 ;
Dump stack (total 1024 bytes, 16 bytes/line):
0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84
0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4
0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00
0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00
0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4
0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08
0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00
0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0
0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00
0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30
0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00
0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0
0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00
0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc
0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18
0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f
0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00
0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98
0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98
0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00
0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70
0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44
Call trace:
Function Address = 0x8012a4b4
Function Address = 0x8017989c
Function Address = 0x80179b30
Function Address = 0x80127438
Function Address = 0x8012d734
Function Address = 0x80100a00
Function Address = 0xe0071004
Function Address = 0x8016ce0c
Function Address = 0x801223a0
Instruction dump:
41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80
4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c
# 显示最近一条内核线程异常的概要信息。(IRF模式)
<Sysname> display kernel exception 1
----------------- Exception record 1 -----------------
Description : Oops[#0]
Recorded at : 2017-05-01 11:16:00.823018
Occurred at : 2017-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 1
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
module name (disk) module address (0xe00bd000)
# 显示最近一条内核线程异常的详细信息。(IRF模式)
<Sysname> display kernel exception 1 verbose
----------------- Exception record 1 -----------------
Description : Oops[#0]
Recorded at : 2017-05-01 11:16:00.823018
Occurred at : 2017-05-01 11:16:00.823018
Instruction address : 0x4004158c
Thread : comsh (TID: 16306)
Context : thread context
Slot : 1
Cpu : 0
VCPU ID : 0
Kernel module info : module name (mrpnc) module address (0xe332a000)
module name (12500) module address (0xe00bd000)
Last 5 thread switches : migration/0 (11:16:00.823018)-->
swapper (11:16:00.833018)-->
kthreadd (11:16:00.833518)-->
swapper (11:16:00.833550)-->
disk (11:16:00.833560)
Register content:
Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ;
Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ;
Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ;
Reg: r6, Val = 0x00000000 ; Reg: r7, Val = 0x0000ffff ;
Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ;
Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ;
Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ;
Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ;
Reg: r16, Val = 0xe2be5f00 ; Reg: r17, Val = 0x00000000 ;
Reg: r18, Val = 0x00000000 ; Reg: r19, Val = 0x00000000 ;
Reg: r20, Val = 0x024c10f8 ; Reg: r21, Val = 0x057d9244 ;
Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ;
Reg: r24, Val = 0x00000002 ; Reg: r25, Val = 0x24000024 ;
Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ;
Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ;
Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ;
Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;
Reg: xer, Val = 0x00000000 ; Reg: lr, Val = 0x0186eff0 ;
Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ;
Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ;
Reg: dsisr, Val = 0x40000000 ; Reg: result, Val = 0x00020300 ;
Dump stack (total 1024 bytes, 16 bytes/line):
0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84
0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4
0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00
0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00
0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4
0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08
0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00
0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0
0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00
0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30
0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00
0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0
0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00
0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc
0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18
0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f
0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00
0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98
0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68
0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98
0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00
0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0
0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70
0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44
Call trace:
Function Address = 0x8012a4b4
Function Address = 0x8017989c
Function Address = 0x80179b30
Function Address = 0x80127438
Function Address = 0x8012d734
Function Address = 0x80100a00
Function Address = 0xe0071004
Function Address = 0x8016ce0c
Function Address = 0x801223a0
Instruction dump:
41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80
4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c
本命令显示信息的详细描述请参见表1-2。
【相关命令】
· reset kernel exception
display kernel starvation configuration命令用来显示内核线程的饿死监控参数的配置。
【命令】
(独立运行模式)
display kernel starvation configuration
(IRF模式)
display kernel starvation configuration [ slot slot-number [ cpu cpu-number ] ]
【视图】
任意视图
【缺省用户角色】
network-admin
【参数】
slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)
cpu cpu-number:表示CPU的编号。
【举例】
# 显示内核线程饿死监控参数配置。
<Sysname> display kernel starvation configuration
Thread starvation detection: Disabled
Starvation timer (in seconds): 10
Threads excluded from monitoring: 1
TID: 123 Name: co0
表1-4 display kernel starvation configuration命令显示信息描述表
字段 |
描述 |
Thread starvation detection: Enabled |
内核线程饿死检测功能处于开启状态 |
Thread starvation detection: Disabled |
内核线程饿死检测功能处于关闭状态 |
Starvation timer (in seconds): n |
内核线程饿死判定周期(单位为秒)。即如果内核线程在n秒内一直不能运行,则判定为饿死 |
Threads excluded from monitoring |
不进行饿死检测的内核线程列表 |
Name |
不进行饿死检测的内核线程的名称 |
TID |
不进行饿死检测的内核线程的编号 |
· monitor kernel starvation enable
· monitor kernel starvation exclude-thread
· monitor kernel starvation time