• 产品与解决方案
  • 行业解决方案
  • 服务
  • 支持
  • 合作伙伴
  • 关于我们

15-网络管理和监控命令参考

目录

13-进程监控和维护命令

本章节下载 13-进程监控和维护命令  (585.12 KB)

13-进程监控和维护命令


1 进程监控和维护

说明

设备支持的存储介质与设备型号相关,本手册使用flash类型的存储介质举例,实际使用过程中,请以设备实际情况为准。

 

1.1  进程监控和维护命令

display memorydisplay processdisplay process cpumonitor processmonitor thread命令既可显示用户态进程的相关信息,又可显示内核线程的相关信息,为简便起见,在这些命令中,统一使用“进程”一词来指代。

1.1.1  display exception context

display exception context命令用来显示用户态进程异常时的上下文信息。

【命令】

(独立运行模式)

display exception context [ count value ]

(IRF模式)

display exception context [ count value ] [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

count value:表示上下文信息的显示个数,取值范围为1~20,缺省值为1。

slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【使用指导】

当用户态进程发生一次异常,系统会生成一个core文件,还会生成一条上下文信息,用于记录异常用户态进程的ID、生成core文件的时间、core文件存放的位置、栈信息和寄存器信息。一个core文件对应一条上下文信息,最多可记录的上下文信息数和可记录的core文件数目相同。

【举例】

# 显示在x86体系32位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 120 (routed)

Crash signal: SIGBUS

Crash time: Tue Apr  9 17:14:30 2013

Core file path:

flash:/core/node0_routed_120_7_20130409-171430_1365527670.core

#0  0xb7caba4a

#1  0x0804cb79

#2  0xb7cd77c4

#3  0x08049f45

Backtrace stopped.

                          Registers' content

  eax:0xfffffffc   ebx:0x00000003   ecx:0xbfe244ec   edx:0x0000000a

  esp:0xbfe244b8   ebp:0xbfe244c8   esi:0xffffffff   edi:0xbfe24674

  eip:0xb7caba4a eflag:0x00000292    cs:0x00000073    ss:0x0000007b

   ds:0x0000007b    es:0x0000007b    fs:0x00000000    gs:0x00000033

# 显示在x86体系64位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 121 (routed)

Crash signal: SIGBUS

Crash time: Sun Mar 31 11:12:21 2013

Core file path:

flash:/core/node0_routed_121_7_20130331-111221_1364728341.core

#0  0x00007fae7dbad20c

#1  0x00000000004059fa

#2  0x00007fae7dbd96c0

#3  0x0000000000402b29

Backtrace stopped.

                          Registers' content

       rax:0xfffffffffffffffc       rbx:0x00007fff88a5dd10

       rcx:0xffffffffffffffff       rdx:0x000000000000000a

       rsi:0x00007fff88a5dd10       rdi:0x0000000000000003

       rbp:0x00007fff88a5dcf0       rsp:0x00007fff88a5dcf0

        r8:0x00007fae7ea587e0        r9:0x0000000000000079

       r10:0xffffffffffffffff       r11:0x0000000000000246

       r12:0x0000000000405b18       r13:0x00007fff88a5ff7a

       r14:0x00007fff88a5de30       r15:0x0000000000000000

       rip:0x00007fae7dbad20c      flag:0x0000000000000246

        cs:0x0000000000000033        ss:0x000000000000002b

        ds:0x0000000000000000        es:0x0000000000000000

        fs:0x0000000000000000        gs:0x0000000000000000

   fs_base:0x00007fae80a5d6a0   gs_base:0x0000000000000000

   orig_ax:0x00000000000000e8

# 显示在powerpc体系32位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 133 (routed)

Crash signal: SIGBUS

Crash time: Wed Apr 10 15:47:49 2013

Core file path:

flash:/core/node0_routed_133_7_20130410-154749_1365608869.core

#0  0x184720bc

#1  0x10006b4c

Backtrace stopped.

                          Registers' content

grp00: 0x000000ee 0x7ffd6ad0 0x1800f440 0x00000004

grp04: 0x7ffd6af8 0x0000000a 0xffffffff 0x184720bc

grp08: 0x0002d200 0x00000003 0x00000001 0x1847209c

grp12: 0x10006b4c 0x10020534 0xd6744100 0x00000000

grp16: 0x00000000 0xa0203ff0 0xa028b12c 0xa028b13c

grp20: 0xa028b148 0xa028b168 0xa028b178 0xa028b190

grp24: 0xa028b1a8 0xa028b1b8 0x00000000 0x7ffd6c08

grp28: 0x10006cac 0x7ffd6f92 0x184c1b84 0x7ffd6ae0

 

  nip:0x184720bc    lr:0x10006b4c    cr:0x38000022   ctr:0x1847209c

  msr:0x0002db00   xer:0x00000000   ret:0xfffffffc dsisr:0x08000000

  gr3:0x00000003    mq:0x00000000  trap:0x00000c00   dar:0x1833114c

# 显示在powerpc体系64位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 172 (routed)

Crash signal: SIGBUS

Crash time: Sat Sep 15 16:53:16 2007

Core file path:

flash:/core/node1_routed_172_7_20070915-165316_1189875196.core

#0  0x00000fff803c66b4

#1  0x0000000010009b94

#2  0x00000fff80401814

Backtrace stopped.

                          Registers' content

     grp00: 0x00000000000000ee 0x00000fffffd04840

     grp02: 0x00000fff80425c28 0x0000000000000004

     grp04: 0x00000fffffd048c0 0x000000000000000a

     grp06: 0xffffffffffffffff 0x00000fff803c66b4

     grp08: 0x000000008002d000 0x0000000000000000

     grp10: 0x0000000000000000 0x0000000000000000

     grp12: 0x0000000000000000 0x00000fff80a096b0

     grp14: 0x000000007b964c00 0x000000007b7d0000

     grp16: 0x0000000000000001 0x000000000000000b

     grp18: 0x0000000000000031 0x0000000000a205b8

     grp20: 0x0000000000a20677 0x0000000000000000

     grp22: 0x000000007bb91014 0x0000000000000000

     grp24: 0xc0000000005ae1c8 0x0000000000000000

     grp26: 0xc0000001f00bff20 0xc0000001f00b0000

     grp28: 0x00000fffffd04a30 0x000000001001aed8

     grp30: 0x00000fffffd04fae 0x00000fffffd04840

 

       nip:0x00000fff803c66b4        lr:0x0000000010009b94

        cr:0x0000000058000482       ctr:0x00000fff803c66ac

       msr:0x000000008002d000       xer:0x0000000000000000

       ret:0xfffffffffffffffc     dsisr:0x0000000000000000

       gr3:0x0000000000000003     softe:0x0000000000000001

      trap:0x0000000000000c00       dar:0x00000fff8059d14c

# 显示在mips体系32位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 182 (routed)

Crash signal: SIGBUS

Crash time: Sun Jan  2 08:11:38 2013

Core file path:

flash:/core/node4_routed_182_10_20130102-081138_1293955898.core

#0  0x2af2faf4

#1  0x00406d8c

Backtrace stopped.

                          Registers' content

 zero:0x00000000   at:0x1000dc00   v0:0x00000004   v1:0x00000003

   a0:0x00000003   a1:0x7fd267e8   a2:0x0000000a   a3:0x00000001

   t0:0x00000000   t1:0xcf08fa14   t2:0x80230510   t3:0xfffffff8

   t4:0x69766520   t5:0x00000000   t6:0x63cc6000   t7:0x44617461

   s0:0x7fd26f81   s1:0x00401948   s2:0x7fd268f8   s3:0x803e1db0

   s4:0x803e1da0   s5:0x803e1d88   s6:0x803e1d70   s7:0x803e1d60

   t8:0x00000008   t9:0x2af2fae0   k0:0x00000000   k1:0x00000000

   gp:0x2af9a3a0   sp:0x7fd267c0   s8:0x7fd267c0   ra:0x00406d8c

   sr:0x0000dc13   lo:0xef9db265   hi:0x0000003f  bad:0x2add2010

cause:0x00800020   pc:0x2af2faf4

# 显示在mips体系64位登录设备上的异常上下文信息。

<Sysname> display exception context

Index 1 of 1

------------------------------

Crashed PID: 270 (routed)

Crash signal: SIGBUS

Crash time: Wed Mar 27 12:39:12 2013

Core file path:

flash:/core/node16_routed_270_10_20130327-123912_1364387952.core

#0  0x0000005555a3bcb4

#1  0x0000000120006c1c

Backtrace stopped.

                          Registers' content

      zero:0x0000000000000000        at:0x0000000000000014

        v0:0x0000000000000004        v1:0x0000000000000003

        a0:0x0000000000000003        a1:0x000000ffff899d90

        a2:0x000000000000000a        a3:0x0000000000000001

        a4:0x0000005555a9b4e0        a5:0x0000000000000000

        a6:0xffffffff8021349c        a7:0x20696e206368616e

        t0:0x0000000000000000        t1:0xffffffff80105068

        t2:0xffffffff80213890        t3:0x0000000000000008

        s0:0x0000005555a99c40        s1:0x000000ffff89af5f

        s2:0x0000000120007320        s3:0x0000005555a5f470

        s4:0x000000ffff899f80        s5:0xffffffff803cc6c0

        s6:0xffffffff803cc6a8        s7:0xffffffff803cc690

        t8:0x0000000000000002        t9:0x0000005555a3bc98

        k0:0x0000000000000000        k1:0x0000000000000000

        gp:0x0000000120020460        sp:0x000000ffff899d70

        s8:0x000000ffff899d80        ra:0x0000000120006c1c

        sr:0x000000000400fff3        lo:0xdf3b645a1cac08c9

        hi:0x000000000000007f       bad:0x000000555589ba84

     cause:0x0000000000800020        pc:0x0000005555a3bcb4

表1-1 display exception context命令输出信息描述表

字段

描述

Crashed PID

发生异常的用户态进程ID

Crash signal

导致异常的信号:

·     SIGABRT:异常终止(abort)

·     SIGBUS:总线错误

·     SIGFPE:浮点异常

·     SIGILL:程序执行了非法指令,导致异常

·     SIGQUIT:终端退出符

·     SIGSEGV:无效存储访问

·     SIGSYS:无效系统调用

·     SIGTRAP:跟踪断点时发生了异常

·     SIGXCPU:超过CPU限制(setrlimit)

·     SIGXFSZ:超过文件长度限制(setrlimit)

·     SIGUNKNOW:未知原因

Crash time

异常发生的时间

Core file path

core文件存放的位置

Backtrace stopped

表示栈信息已经显示完毕

Registers’ content

寄存器的内容

 

【相关命令】

·     reset exception context

1.1.2  display exception filepath

display exception filepath命令用来显示core文件的保存路径。

【命令】

(独立运行模式)

display exception filepath

(IRF模式)

display exception filepath [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

slot slot-number:表示设备在IRF中的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【举例】

# 显示core文件的保存路径。(独立运行模式)

<Sysname> display exception filepath

The exception filepath is flash:.

# 显示指定slot上core文件的保存路径。(IRF模式)

<Sysname> display exception filepath slot 1

The exception filepath on slot 1 is flash:.

1.1.3  display kernel deadloop

display kernel deadloop命令用来显示内核线程死循环信息。

【命令】

(独立运行模式)

display kernel deadloop show-number [ offset ] [ verbose ]

(IRF模式)

display kernel deadloop show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

show-number:需要显示的死循环信息的数目,取值范围为1~10。

offset:需要显示的起始条目距最近条目的偏移,取值范围为0~9,缺省值为0。

verbose:表示显示详细信息。不指定该参数时,显示概要信息。

slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【举例】

# 显示最近一条内核线程死循环的概要信息。(独立运行模式)

<Sysname> display kernel deadloop 1

----------------- Deadloop record 1 -----------------

Description          : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 0

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

# 显示最近一条内核线程死循环的详细信息。(独立运行模式)

<Sysname> display kernel deadloop 1 verbose

----------------- Deadloop record 1 -----------------

Description          : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 0

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

 

Last 5 thread switches : migration/0 (11:16:00.823018)-->

                         swapper (11:16:00.833018)-->

                         kthreadd (11:16:00.833518)-->

                         swapper (11:16:00.833550)-->

                         disk (11:16:00.833560)

 

Register content:

Reg:       r0, Val = 0x00000000 ; Reg:       r1, Val = 0xe2be5ea0 ;

Reg:       r2, Val = 0x00000000 ; Reg:       r3, Val = 0x77777777 ;

Reg:       r4, Val = 0x00000000 ; Reg:       r5, Val = 0x00001492 ;

Reg:       r6, Val = 0x00000000 ; Reg:       r7, Val = 0x0000ffff ;

Reg:       r8, Val = 0x77777777 ; Reg:       r9, Val = 0x00000000 ;

Reg:      r10, Val = 0x00000001 ; Reg:      r11, Val = 0x0000002c ;

Reg:      r12, Val = 0x057d9484 ; Reg:      r13, Val = 0x00000000 ;

Reg:      r14, Val = 0x00000000 ; Reg:      r15, Val = 0x02000000 ;

Reg:      r16, Val = 0xe2be5f00 ; Reg:      r17, Val = 0x00000000 ;

Reg:      r18, Val = 0x00000000 ; Reg:      r19, Val = 0x00000000 ;

Reg:      r20, Val = 0x024c10f8 ; Reg:      r21, Val = 0x057d9244 ;

Reg:      r22, Val = 0x00002000 ; Reg:      r23, Val = 0x0000002c ;

Reg:      r24, Val = 0x00000002 ; Reg:      r25, Val = 0x24000024 ;

Reg:      r26, Val = 0x00000000 ; Reg:      r27, Val = 0x057d9484 ;

Reg:      r28, Val = 0x0000002c ; Reg:      r29, Val = 0x00000000 ;

Reg:      r30, Val = 0x0000002c ; Reg:      r31, Val = 0x00000000 ;

Reg:       cr, Val = 0x84000028 ; Reg:      nip, Val = 0x057d9550 ;

Reg:      xer, Val = 0x00000000 ; Reg:       lr, Val = 0x0186eff0 ;

Reg:      ctr, Val = 0x682f7344 ; Reg:      msr, Val = 0x00784b5c ;

Reg:     trap, Val = 0x0000b030 ; Reg:      dar, Val = 0x77777777 ;

Reg:    dsisr, Val = 0x40000000 ; Reg:   result, Val = 0x00020300 ;

 

Dump stack (total 1024 bytes, 16 bytes/line):

0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84

0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4

0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00

0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00

0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4

0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08

0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00

0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0

0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00

0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30

0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00

0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0

0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00

0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc

0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18

0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f

0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00

0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98

0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98

0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00

0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70

0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44

 

Call trace:

Function Address = 0x8012a4b4

Function Address = 0x8017989c

Function Address = 0x80179b30

Function Address = 0x80127438

Function Address = 0x8012d734

Function Address = 0x80100a00

Function Address = 0xe0071004

Function Address = 0x8016ce0c

Function Address = 0x801223a0

  

Instruction dump:

41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80

4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c

# 显示最近一条内核线程死循环的概要信息。(IRF模式)

<Sysname> display kernel deadloop 1

----------------- Deadloop record 1 -----------------

Description          : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 1

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

# 显示最近一条内核线程死循环的详细信息。(IRF模式)

<Sysname> display kernel deadloop 1 verbose

----------------- Deadloop record 1 -----------------

Description          : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 1

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

 

Last 5 thread switches : migration/0 (11:16:00.823018)-->

                         swapper (11:16:00.833018)-->

                         kthreadd (11:16:00.833518)-->

                         swapper (11:16:00.833550)-->

                         disk (11:16:00.833560)

 

Register content:

Reg:       r0, Val = 0x00000000 ; Reg:       r1, Val = 0xe2be5ea0 ;

Reg:       r2, Val = 0x00000000 ; Reg:       r3, Val = 0x77777777 ;

Reg:       r4, Val = 0x00000000 ; Reg:       r5, Val = 0x00001492 ;

Reg:       r6, Val = 0x00000000 ; Reg:       r7, Val = 0x0000ffff ;

Reg:       r8, Val = 0x77777777 ; Reg:       r9, Val = 0x00000000 ;

Reg:      r10, Val = 0x00000001 ; Reg:      r11, Val = 0x0000002c ;

Reg:      r12, Val = 0x057d9484 ; Reg:      r13, Val = 0x00000000 ;

Reg:      r14, Val = 0x00000000 ; Reg:      r15, Val = 0x02000000 ;

Reg:      r16, Val = 0xe2be5f00 ; Reg:      r17, Val = 0x00000000 ;

Reg:      r18, Val = 0x00000000 ; Reg:      r19, Val = 0x00000000 ;

Reg:      r20, Val = 0x024c10f8 ; Reg:      r21, Val = 0x057d9244 ;

Reg:      r22, Val = 0x00002000 ; Reg:      r23, Val = 0x0000002c ;

Reg:      r24, Val = 0x00000002 ; Reg:      r25, Val = 0x24000024 ;

Reg:      r26, Val = 0x00000000 ; Reg:      r27, Val = 0x057d9484 ;

Reg:      r28, Val = 0x0000002c ; Reg:      r29, Val = 0x00000000 ;

Reg:      r30, Val = 0x0000002c ; Reg:      r31, Val = 0x00000000 ;

Reg:       cr, Val = 0x84000028 ; Reg:      nip, Val = 0x057d9550 ;

Reg:      xer, Val = 0x00000000 ; Reg:       lr, Val = 0x0186eff0 ;

Reg:      ctr, Val = 0x682f7344 ; Reg:      msr, Val = 0x00784b5c ;

Reg:     trap, Val = 0x0000b030 ; Reg:      dar, Val = 0x77777777 ;

Reg:    dsisr, Val = 0x40000000 ; Reg:   result, Val = 0x00020300 ;

 

Dump stack (total 1024 bytes, 16 bytes/line):

0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84

0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4

0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00

0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00

0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4

0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08

0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00

0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0

0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00

0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30

0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00

0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0

0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00

0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc

0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18

0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f

0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00

0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98

0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98

0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00

0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70

0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44

 

Call trace:

Function Address = 0x8012a4b4

Function Address = 0x8017989c

Function Address = 0x80179b30

Function Address = 0x80127438

Function Address = 0x8012d734

Function Address = 0x80100a00

Function Address = 0xe0071004

Function Address = 0x8016ce0c

Function Address = 0x801223a0

  

Instruction dump:

41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80

4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c

表1-2 display kernel deadloop命令显示信息描述表

字段

描述

Description

发生死循环的内核线程的描述信息,包括死循环内核线程所在的CPU的编号、内核线程连续运行的时间、内核线程的名称和编号

Recorded at

内核线程死循环被记录的时间点,精确到微秒

Occurred at

内核线程发生死循环的时间,精确到微秒

Instruction address

内核线程被检测到发生死循环时对应的指令信息

Thread

发生死循环的内核线程的名称和编号

Context

内核线程被检测到发生死循环时所在的上下文环境

Cpu

运行该内核线程的CPU的编号

VCPU ID

运行该内核线程的CPU核的编号

Kernel module info

内核线程被检测到发生死循环时,系统中已加载的内核模块信息。包括:

·     module name表示内核模块名称

·     module address内核模块加载的内存地址

Last 5 thread switches

内核线程被检测到发生死循环时,记录死循环发生的CPU上、最近五次的内核线程切换轨迹。包括内核线程的名称和内核线程切换时间点,时间精确到微秒

Register content

内核线程被检测到发生死循环时现场的寄存器信息。Reg表示寄存器名称,Val表示寄存器中保存的值

Dump stack

内核线程被检测到发生死循环时现场的堆栈信息

Call trace

内核线程被检测到发生死循环时现场的函数调用栈信息,即每级调用函数的指令地址

Instruction dump

内核线程被检测到发生死循环时对应的指令码。非法指令用ffffffff表示

No information to display

表示系统中没有内核线程死循环记录

 

【相关命令】

·     reset kernel deadloop

1.1.4  display kernel deadloop configuration

display kernel deadloop configuration命令用来显示内核线程死循环监控参数配置。

【命令】

(独立运行模式)

display kernel deadloop configuration

(IRF模式)

display kernel deadloop configuration [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【举例】

# 显示内核线程死循环监控参数配置。

<Sysname> display kernel deadloop configuration

Thread dead loop detection: Enabled

Dead loop timer (in seconds): 20

Cores with dead loop detection enabled: 0-1

Dead loop action threshold: 2 consecutive dead loops

Threads excluded from monitoring: 1

  TID:     15   Name: co0   

表1-3 display kernel deadloop configuration命令显示信息描述表

字段

描述

Thread dead loop detection: Enabled

内核线程死循环检测功能处于开启状态

Thread dead loop detection: Disabled

内核线程死循环检测功能处于关闭状态

Dead loop timer (in seconds): n

内核线程死循环判定周期(单位为秒),即内核线程连续运行时间大于n秒时,则判定为死循环

Cores with dead loop detection enabled

开启了内核线程死循环功能的CPU核的编号

Dead loop action threshold: 2 consecutive dead loops

配置内核线程死循环后触发纠错动作的阈值:系统连续检测到内核线程死循环的次数

Threads excluded from monitoring

不进行死循环检测的内核线程列表,配置monitor kernel deadloop exclude-thread命令后才会显示该信息

Name

不进行死循环检测的内核线程的名称

TID

不进行死循环检测的内核线程的编号

No thread is excluded from monitoring

对所有内核线程都进行死循环检查

 

1.1.5  display kernel exception

display kernel exception命令用来显示内核线程的异常信息。

【命令】

(独立运行模式)

display kernel exception show-number [ offset ] [ verbose ]

(IRF模式)

display kernel exception show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

show-number:需要显示的异常信息的数目,取值范围为1~10。

offset:需要显示的条目距最近条目的偏移,取值范围为0~9,缺省值为0。

verbose:显示详细信息。不指定该参数时,显示概要信息。

slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【使用指导】

当内核线程在运行过程中发生异常时,系统会自动记录异常信息,以便设备维护人员定位问题。

【举例】

# 显示最近一条内核线程异常的概要信息。(独立运行模式)

<Sysname> display kernel exception 1

----------------- Exception record 1 -----------------

Description          : Oops[#0]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 0

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

                       module name (disk) module address (0xe00bd000)

# 显示最近一条内核线程异常的详细信息。(独立运行模式)

<Sysname> display kernel exception 1 verbose

----------------- Exception record 1 -----------------

Description          : Oops[#0]

Recorded at          : 2013-05-01  11:16:00.823018

Occurred at          : 2013-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 0

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

                       module name (12500) module address (0xe00bd000)

 

Last 5 thread switches : migration/0 (11:16:00.823018)-->

                         swapper (11:16:00.833018)-->

                         kthreadd (11:16:00.833518)-->

                         swapper (11:16:00.833550)-->

                         disk (11:16:00.833560)

 

Register content:

Reg:       r0, Val = 0x00000000 ; Reg:       r1, Val = 0xe2be5ea0 ;

Reg:       r2, Val = 0x00000000 ; Reg:       r3, Val = 0x77777777 ;

Reg:       r4, Val = 0x00000000 ; Reg:       r5, Val = 0x00001492 ;

Reg:       r6, Val = 0x00000000 ; Reg:       r7, Val = 0x0000ffff ;

Reg:       r8, Val = 0x77777777 ; Reg:       r9, Val = 0x00000000 ;

Reg:      r10, Val = 0x00000001 ; Reg:      r11, Val = 0x0000002c ;

Reg:      r12, Val = 0x057d9484 ; Reg:      r13, Val = 0x00000000 ;

Reg:      r14, Val = 0x00000000 ; Reg:      r15, Val = 0x02000000 ;

Reg:      r16, Val = 0xe2be5f00 ; Reg:      r17, Val = 0x00000000 ;

Reg:      r18, Val = 0x00000000 ; Reg:      r19, Val = 0x00000000 ;

Reg:      r20, Val = 0x024c10f8 ; Reg:      r21, Val = 0x057d9244 ;

Reg:      r22, Val = 0x00002000 ; Reg:      r23, Val = 0x0000002c ;

Reg:      r24, Val = 0x00000002 ; Reg:      r25, Val = 0x24000024 ;

Reg:      r26, Val = 0x00000000 ; Reg:      r27, Val = 0x057d9484 ;

Reg:      r28, Val = 0x0000002c ; Reg:      r29, Val = 0x00000000 ;

Reg:      r30, Val = 0x0000002c ; Reg:      r31, Val = 0x00000000 ;

Reg:       cr, Val = 0x84000028 ; Reg:      nip, Val = 0x057d9550 ;

Reg:      xer, Val = 0x00000000 ; Reg:       lr, Val = 0x0186eff0 ;

Reg:      ctr, Val = 0x682f7344 ; Reg:      msr, Val = 0x00784b5c ;

Reg:     trap, Val = 0x0000b030 ; Reg:      dar, Val = 0x77777777 ;

Reg:    dsisr, Val = 0x40000000 ; Reg:   result, Val = 0x00020300 ;

 

Dump stack (total 1024 bytes, 16 bytes/line):

0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84

0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4

0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00

0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00

0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4

0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08

0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00

0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0

0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00

0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30

0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00

0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0

0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00

0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc

0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18

0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f

0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00

0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98

0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98

0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00

0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70

0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44

 

Call trace:

Function Address = 0x8012a4b4

Function Address = 0x8017989c

Function Address = 0x80179b30

Function Address = 0x80127438

Function Address = 0x8012d734

Function Address = 0x80100a00

Function Address = 0xe0071004

Function Address = 0x8016ce0c

Function Address = 0x801223a0

  

Instruction dump:

41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80

4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c

# 显示最近一条内核线程异常的概要信息。(IRF模式)

<Sysname> display kernel exception 1

----------------- Exception record 1 -----------------

Description          : Oops[#0]

Recorded at          : 2017-05-01  11:16:00.823018

Occurred at          : 2017-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 1

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

                       module name (disk) module address (0xe00bd000)

# 显示最近一条内核线程异常的详细信息。(IRF模式)

<Sysname> display kernel exception 1 verbose

----------------- Exception record 1 -----------------

Description          : Oops[#0]

Recorded at          : 2017-05-01  11:16:00.823018

Occurred at          : 2017-05-01  11:16:00.823018

Instruction address  : 0x4004158c

Thread               : comsh (TID: 16306)

Context              : thread context

Slot                 : 1

Cpu                  : 0

VCPU ID              : 0

Kernel module info   : module name (mrpnc) module address (0xe332a000)

                       module name (12500) module address (0xe00bd000)

 

Last 5 thread switches : migration/0 (11:16:00.823018)-->

                         swapper (11:16:00.833018)-->

                         kthreadd (11:16:00.833518)-->

                         swapper (11:16:00.833550)-->

                         disk (11:16:00.833560)

 

Register content:

Reg:       r0, Val = 0x00000000 ; Reg:       r1, Val = 0xe2be5ea0 ;

Reg:       r2, Val = 0x00000000 ; Reg:       r3, Val = 0x77777777 ;

Reg:       r4, Val = 0x00000000 ; Reg:       r5, Val = 0x00001492 ;

Reg:       r6, Val = 0x00000000 ; Reg:       r7, Val = 0x0000ffff ;

Reg:       r8, Val = 0x77777777 ; Reg:       r9, Val = 0x00000000 ;

Reg:      r10, Val = 0x00000001 ; Reg:      r11, Val = 0x0000002c ;

Reg:      r12, Val = 0x057d9484 ; Reg:      r13, Val = 0x00000000 ;

Reg:      r14, Val = 0x00000000 ; Reg:      r15, Val = 0x02000000 ;

Reg:      r16, Val = 0xe2be5f00 ; Reg:      r17, Val = 0x00000000 ;

Reg:      r18, Val = 0x00000000 ; Reg:      r19, Val = 0x00000000 ;

Reg:      r20, Val = 0x024c10f8 ; Reg:      r21, Val = 0x057d9244 ;

Reg:      r22, Val = 0x00002000 ; Reg:      r23, Val = 0x0000002c ;

Reg:      r24, Val = 0x00000002 ; Reg:      r25, Val = 0x24000024 ;

Reg:      r26, Val = 0x00000000 ; Reg:      r27, Val = 0x057d9484 ;

Reg:      r28, Val = 0x0000002c ; Reg:      r29, Val = 0x00000000 ;

Reg:      r30, Val = 0x0000002c ; Reg:      r31, Val = 0x00000000 ;

Reg:       cr, Val = 0x84000028 ; Reg:      nip, Val = 0x057d9550 ;

Reg:      xer, Val = 0x00000000 ; Reg:       lr, Val = 0x0186eff0 ;

Reg:      ctr, Val = 0x682f7344 ; Reg:      msr, Val = 0x00784b5c ;

Reg:     trap, Val = 0x0000b030 ; Reg:      dar, Val = 0x77777777 ;

Reg:    dsisr, Val = 0x40000000 ; Reg:   result, Val = 0x00020300 ;

 

Dump stack (total 1024 bytes, 16 bytes/line):

0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84

0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4

0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00

0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00

0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4

0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08

0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00

0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0

0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00

0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30

0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00

0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0

0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00

0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc

0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18

0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f

0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00

0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98

0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68

0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98

0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00

0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0

0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70

0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44

 

Call trace:

Function Address = 0x8012a4b4

Function Address = 0x8017989c

Function Address = 0x80179b30

Function Address = 0x80127438

Function Address = 0x8012d734

Function Address = 0x80100a00

Function Address = 0xe0071004

Function Address = 0x8016ce0c

Function Address = 0x801223a0

  

Instruction dump:

41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80

4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c

本命令显示信息的详细描述请参见表1-2

【相关命令】

·     reset kernel exception

1.1.6  display kernel starvation configuration

display kernel starvation configuration命令用来显示内核线程的饿死监控参数的配置。

【命令】

(独立运行模式)

display kernel starvation configuration

(IRF模式)

display kernel starvation configuration [ slot slot-number [ cpu cpu-number ] ]

【视图】

任意视图

【缺省用户角色】

network-admin

【参数】

slot slot-number:表示IRF中设备的成员编号。不指定该参数时,表示主设备。(IRF模式)

cpu cpu-number:表示CPU的编号。

【举例】

# 显示内核线程饿死监控参数配置。

<Sysname> display kernel starvation configuration

Thread starvation detection: Disabled

Starvation timer (in seconds): 10

Threads excluded from monitoring: 1

  TID:    123   Name: co0

表1-4 display kernel starvation configuration命令显示信息描述表

字段

描述

Thread starvation detection: Enabled

内核线程饿死检测功能处于开启状态

Thread starvation detection: Disabled

内核线程饿死检测功能处于关闭状态

Starvation timer (in seconds): n

内核线程饿死判定周期(单位为秒)。即如果内核线程在n秒内一直不能运行,则判定为饿死

Threads excluded from monitoring

不进行饿死检测的内核线程列表

Name

不进行饿死检测的内核线程的名称

TID

不进行饿死检测的内核线程的编号

 

【相关命令】

·     monitor kernel starvation enable

·     monitor kernel starvation exclude-thread

·     monitor kernel starvation time