ACRN Debugging Tools¶
This document describes how to use ACRN tools to collect log and trace data for debugging.
ACRN Console Command¶
The ACRN console provides shell commands for a user to check system states
and environment settings. See the ACRN Shell Commands documentation for a
full list of commands, or see a summary of available commands by using
the help
command within the ACRN shell.
An example¶
As an example, we’ll show how to obtain the interrupts of a pass-through USB device.
First, we can get the USB controller BDF number (0:15.0) through the following command in the SOS console:
lspci | grep "USB controller"
Second, we use the pt
command in the ACRN console, and use this BDF number
to find the interrupt vector (VEC) “0x31”.
Finally we use the int
command in the ACRN console, and use this
interrupt vector to find the interrupt number (909) on CPU3.
ACRN Log¶
ACRN log provides console log and mem log for a user to analyze. We can use console log to debug directly, while mem log is a userland tool used to capture a ACRN hypervisor log.
Turn on the logging info¶
ACRN enables a console log by default.
To enable and start the mem log:
$ systemctl enable acrnlog
$ systemctl start acrnlog
Set and grab log¶
We have 1-6 log levels for console log and mem log. The following functions print different levels of console log and mem log:
pr_dbg("debug...level %d", LOG_DEBUG); //level 6
pr_info("info...level %d", LOG_INFO); //level 5
pr_warn("warn...level %d", LOG_WARNING); //level 4
pr_err("err...level %d", LOG_ERROR); //level 3
pr_acrnlog("acrnlog...level %d", LOG_ACRN); //level 2
pr_fatal("fatal...level %d", LOG_FATAL); //level 1
If the built-in logging doesn’t provide enough information, you can add
additional logging in functions you want to debug, using the functions
noted above. For example, add the following code into function
shell_cmd_help
in the source file
acrn-hypervisor/hypervisor/debug/shell.c
:
We set console log level to 5, and mem log level to 2 through the command:
loglevel 5 2
Then we input “help” into the ACRN console, and find the log as follows.
Then we use the command, on the ACRN console:
sos_console
to switch to the SOS console the use the commands:
systemctl enable acrnlog
reboot
to enable the mem log and reboot the SOS.
Next we set the console and mem log levels with:
loglevel 5 2
and run the command:
help
Finally we get into the SOS and use the command:
cat /tmp/acrnlog/acrnlog_cur.0
on the console, and we’ll see the following log:
ACRN Trace¶
ACRN trace is a tool running on the Service OS (SOS) to capture trace data. We can use the existing trace information to analyze, and we can add self-defined tracing to analyze code which we care about.
Using Existing trace event id to analyze trace¶
As an example, we can use the existing vm_exit trace to analyze the reason and times of each vm_exit after we have done some operations.
Run the following SOS console command to collect trace data:
# acrntrace -c
Check current directory, and confirm the directory contains four trace files:
# ls 0 1 2 3
Use the command to get a summary of vmexit:
# acrnalyze.py -i /home/trace/acrntrace/20190219-001529/1 -o vmexit --vm_exit
Note
The acrnalyze.py script is in the
acrn-hypervisor/tools/acrntrace/scripts
folder. The location of the trace files produced byacrntrace
may be different in your system.
Using Self-defined trace event id to analyze trace¶
For some undefined trace event id, we can define it by ourselves as shown in the following example:
Add the following new event id into
acrn-hypervisor/hypervisor/include/debug/trace.h
:Add the following format to
acrn-hypervisor/tools/acrntrace/scripts/formats
:Note
- Formats:
0x00000005: event id for trace test
%(cpu)d: corresponding cpu index with ‘decimal’ format
%(event)016x: corresponding event id with ‘hex’ format
%(tsc)d: corresponding event time stamp with ‘decimal’ format
%(1)08x: corresponding first ‘Long’ data in TRACE_2L
Add trace into function
emulate_io
inacrn-hypervisor/hypervisor/arch/x86/guest/io_emul.c
which we want to trace for the calling times of functionemulate_io
:After we have inserted the trace code addition, we need to rebuild the acrn-hypervisor in the
acrn-hypervisor
directory:# make PLATFORM=uefi
and replace the existing
acrn.efi
with the new one we just built in thebuild/hypervisor/
folder:# mount /dev/sda1 /mnt && mkdir -p /mnt/EFI/acrn # mv /mnt/EFI/acrn/acrn.efi /mnt/EFI/acrn/acrn.efi.old # cp build/hypervisor/acrn.efi /mnt/EFI/acrn/
Now we can use the following command in the SOS console to generate acrntrace data into the current directory:
acrntrace -c
Run the console command:
# acrntrace_format.py \ formats /home/trace/acrntrace/20190219-001529/1 | grep "trace test"
Note
The acrnalyze.py script is in the
acrn-hypervisor/tools/acrntrace/scripts
folder. The location of the trace files produced byacrntrace
may be different in your system.and we will get the following log:
Note
The trace data may generate on any of the available CPUs, so you’ll need to check which CPU number was used and specify that CPU to analyze its trace.