3371
Comment:
|
5283
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
1. Bug. Well knowed, particular bug. 1. Version of "bugged" kernel. |
1. Bug. Well known particular bug. 1. A buggy kernel. |
Line 5: | Line 5: |
Note: Repeated bug is more then 50% of success. | Note: |
Line 7: | Line 7: |
* Having a repeatable bug is more then 50% of success. * All examples are from 2.6.17.13 (i386) |
|
Line 8: | Line 10: |
printk is very useful function similar to printf(). This function work evrywhere and at any time(apart from early stage of booting kernel when video isn't initialized).It use loglevels to tell console how important is message. Full list of levels: |
printk is a very useful function similar to printf(). This function works everywhere and at any time (apart from early stage of booting the kernel when video isn't initialized). It uses log levels to tell the console the importance of each message. Full list of levels: |
Line 19: | Line 19: |
1. KERN_DEBUG <-- the less important Console will print messages olny with level higher than console_loglevel. And default printk use DEFAULT_MESSAGE_LOGLEVEL == KERN_WARNING (but it mey changed in the future). |
1. KERN_DEBUG <-- the least important The console will print messages only with a level higher than console_loglevel. By default printk uses DEFAULT_MESSAGE_LOGLEVEL == KERN_WARNING (but this may be changed in the future). |
Line 22: | Line 22: |
printk() use cyclic buffer to manage with messages. Next klogd read messages (by /proc/kmsg) from buffer and give it to syslogd with write them to /var/log/messages. (You can configure syslogd by /etc/syslog.conf). | printk() uses a cyclic buffer to manage the messages. Next klogd reads the messages (using /proc/kmsg) from the buffer and gives them to syslogd which writes them to /var/log/messages. (You can configure syslogd by editing /etc/syslog.conf). |
Line 24: | Line 24: |
''Examples:'' . printk(l'''oglevel''' '''"mesages"'''); From: ''Linux/arch/mips/sgi-ip27/ip27-berr.c'' {{{ 20 #if 1 321 printk("FIXME: disabling master aborts\n"); 322 csrs->POx_MSK_HEI.csr &= ~(3UL << 14); 323 #endif }}} |
|
Line 25: | Line 35: |
oops is error caused by uncorrectly worked kernel. Kernel write on console what registers contain and "back trace". Only when kernel is in user space oops kill program and system can work all the time. In other spaces kernel do panic error and stop running.By default back trace contain adresses of functions with were called. But you can use ksymoops file_with_oops.txt to see names of this functions or you can compile your kernel with CONFIG_KALLSYMS that give you this same effect. | An oops is report of a bug in the kernel. When an oops occurs the kernel will print what the registers contain and a "back trace". An oops does not mean the system has crashed, as the system can sometimes recover from the error. If the system can not recover from the error then the kernel will panic and stop running. By default the back trace will contain the addresses of the functions that were called. If you compile your kernel with CONFIG_KALLSYMS=y the oops will be decoded and will display the function names. In the 2.4 kernel you can use ksymoops file_with_oops.txt to see the names of the functions. http://www.urbanmyth.org/linux/oops/slides.html <-- useful link |
Line 28: | Line 40: |
Line 35: | Line 46: |
CONFIG_KALSYMS=y | CONFIG_KALLSYMS=y |
Line 42: | Line 53: |
Line 49: | Line 59: |
''Examples:'' From: ''Linux/arch/arm/plat-omap/dma.c'' {{{ 732 if (omap_dma_in_1510_mode()) { 733 printk(KERN_ERR "DMA linking is not supported in 1510 mode\n"); 734 BUG(); 735 return; 736 } }}} {{{ 1221 BUG_ON(lcd_dma.active); }}} |
|
Line 55: | Line 77: |
''Examples:'' From:'' Linux/arch/cris/arch-v32/kernel/dma.c'' {{{ 40 if (options & DMA_PANIC_ON_ERROR) 41 panic("request_dma error!"); }}} From: ''Linux/drivers/scsi/hosts.c'' {{{ 398 if (!sht->detect) { 399 printk(KERN_WARNING "scsi_register() called on new-style " 400 "template for driver %s\n", sht->name); 401 dump_stack(); 402 } }}} |
|
Line 56: | Line 93: |
Line 60: | Line 96: |
1. SysRq+e Send '''SIGTERM''' to all tasks ('''with out init !!!''') | 1. SysRq+e Send SIGTERM''' to all tasks ('''with out init !!!''') ''' |
Line 62: | Line 98: |
1. SysRq+i Send '''SIGKILL''' to all tasks ('''with out init !!!''') | 1. SysRq+i Send SIGKILL''' to all tasks ('''with out init !!!''') ''' |
Line 64: | Line 100: |
1. SysRq+l Send '''SIGTKILL '''to all tasks ('''with init !!!''') 1. SysRq+m Dump core and show it on console 1. SysRq+o Halt system and shutdown it 1. SysRq+p Print CPU registers on colsole |
1. SysRq+l Send SIGTKILL '''to all tasks ('''with init !!!''') ''' 1. SysRq+m Dump core and show it on console 1. SysRq+o Halt system and shutdown it 1. SysRq+p Print CPU registers on console |
Line 69: | Line 105: |
1. SysRq+s Save dirty buffers on HDD | 1. SysRq+s Save dirty buffers on HDD |
Line 71: | Line 107: |
1. SysRq+u Unmount all filesystems But note that every user can use SysRq's keys. And it can work unproperly on unstable system. |
1. SysRq+u Unmount all filesystems, and remount read only Note that every user can use SysRq keys, and it can work improperly on an unstable system. |
Line 74: | Line 110: |
== How to use non-exist debugger? == | [:KernelHacking-HOWTO/Debugging Kernel/Debuggers:How to use non-exist debugger?] |
Line 76: | Line 112: |
Linus don't want a debugger for kernel because it can cause wrong diffs. And he have right! | == How to use debuggers? == Before i start talking about debuggers you must know one thing. Linus don't give permission to use debuggers, because debuggers show not always true informations. |
Line 78: | Line 115: |
But there are some non-official debuggers. | * gdb gdb vmlinux /proc/kcore <--> vmlinux is un compresed image of kernel( find it in the top level kernel source directory) /proc/kcore allow gdb to see Linux's memory * kgdb * kdb == When everything fail. == No one likes bugs. So when you spend hours/days on bug fixing, you may write a short and descriptive email containing your all of the information you have found, and send it to LKML. ''Good luck with Bug Hunting.'' |
What should I have to fix a bug?
- Bug. Well known particular bug.
- A buggy kernel.
- Bit of luck.
Note:
- Having a repeatable bug is more then 50% of success.
- All examples are from 2.6.17.13 (i386)
Function printk().
printk is a very useful function similar to printf(). This function works everywhere and at any time (apart from early stage of booting the kernel when video isn't initialized). It uses log levels to tell the console the importance of each message. Full list of levels:
KERN_EMERG <-- the most important
- KERN_ALERT
- KERN_CRIT
- KERN_ERR
- KERN_WARNING
- KERN_NOTICE
- KERN_INFO
KERN_DEBUG <-- the least important
The console will print messages only with a level higher than console_loglevel. By default printk uses DEFAULT_MESSAGE_LOGLEVEL == KERN_WARNING (but this may be changed in the future).
printk() uses a cyclic buffer to manage the messages. Next klogd reads the messages (using /proc/kmsg) from the buffer and gives them to syslogd which writes them to /var/log/messages. (You can configure syslogd by editing /etc/syslog.conf).
Examples:
printk(loglevel "mesages");
From: Linux/arch/mips/sgi-ip27/ip27-berr.c
20 #if 1 321 printk("FIXME: disabling master aborts\n"); 322 csrs->POx_MSK_HEI.csr &= ~(3UL << 14); 323 #endif
Error oops.
An oops is report of a bug in the kernel. When an oops occurs the kernel will print what the registers contain and a "back trace". An oops does not mean the system has crashed, as the system can sometimes recover from the error. If the system can not recover from the error then the kernel will panic and stop running. By default the back trace will contain the addresses of the functions that were called. If you compile your kernel with CONFIG_KALLSYMS=y the oops will be decoded and will display the function names. In the 2.4 kernel you can use ksymoops file_with_oops.txt to see the names of the functions.
http://www.urbanmyth.org/linux/oops/slides.html <-- useful link
Additional compiling options.
These options are very useful when debugging kernel:
CONFIG_PREEMPT=y
CONFIG_DEBUG_KERNEL=y
CONFIG_KALLSYMS=y
CONFIG_SPINLOCK_SLEEP=y
CONFIG_MAGIC_SYSRQ=y
Causing errors and printing extra informations.
- Sometimes you will want to see oops informations about some bug. Use BUG() BUG_ON():
if(bad_thing)
- BUG();
or BUG_ON(bad_thing);
Examples:
From: Linux/arch/arm/plat-omap/dma.c
732 if (omap_dma_in_1510_mode()) { 733 printk(KERN_ERR "DMA linking is not supported in 1510 mode\n"); 734 BUG(); 735 return; 736 }
1221 BUG_ON(lcd_dma.active);
- Sometimes you will want to see oops informations and then stop system. Use panic(): if(terrible_error)
- panic("var = %ld \n", var);
- Sometimes you will want to see stack. Use dump_stack():
if(debug_check)
- dump_stack();
Examples:
From: Linux/arch/cris/arch-v32/kernel/dma.c
40 if (options & DMA_PANIC_ON_ERROR) 41 panic("request_dma error!");
From: Linux/drivers/scsi/hosts.c
398 if (!sht->detect) { 399 printk(KERN_WARNING "scsi_register() called on new-style " 400 "template for driver %s\n", sht->name); 401 dump_stack(); 402 }
Magic SysRq Key.
If you set CONFIG_MAGIC_SYSRQ=y or typed 'echo 1 > /proc/sys/kernel/sysrq', you can use SysRq Key (on PPC or i386) 'Alt+PrintScreen'.
SysRq+b Restart computer
SysRq+e Send SIGTERM to all tasks (with out init !!!)
SysRq+h Help
SysRq+i Send SIGKILL to all tasks (with out init !!!)
SysRq+k Kill all tasks ran from this console
SysRq+l Send SIGTKILL to all tasks (with init !!!)
SysRq+m Dump core and show it on console
SysRq+o Halt system and shutdown it
SysRq+p Print CPU registers on console
SysRq+r Change keyboard from RAW to XLATE
SysRq+s Save dirty buffers on HDD
SysRq+t Show current task info on console
SysRq+u Unmount all filesystems, and remount read only
Note that every user can use SysRq keys, and it can work improperly on an unstable system.
[:KernelHacking-HOWTO/Debugging Kernel/Debuggers:How to use non-exist debugger?]
How to use debuggers?
Before i start talking about debuggers you must know one thing. Linus don't give permission to use debuggers, because debuggers show not always true informations.
- gdb
gdb vmlinux /proc/kcore <--> vmlinux is un compresed image of kernel( find it in the top level kernel source directory) /proc/kcore allow gdb to see Linux's memory
- kgdb
- kdb
When everything fail.
No one likes bugs. So when you spend hours/days on bug fixing, you may write a short and descriptive email containing your all of the information you have found, and send it to LKML. Good luck with Bug Hunting.