Acknowledgment: The original version of this document was written by Prof. Ryan Huang, and is used by permission.
1. Testing
Your test result grade will be based on our tests. Each project has
several tests, each of which has a name beginning with “tests
”. To
completely test your submission, invoke make check
from the project
“build
” directory. This will build and run each test and print a
"pass" or "fail" message for each one. When a test fails,
make check
also prints some details of the reason for failure. After
running all the tests, make check
also prints a summary of the test
results.
For project 1, the tests will probably run faster in Bochs. For the rest
of the projects, they will run much faster in QEMU. make check
will
select the faster simulator by default, but you can override its choice
by specifying “SIMULATOR=--bochs
” or
“SIMULATOR=--qemu
” on the make
command line.
You can also run individual tests one at a time. A given test
t
writes its output to “t
.output
”, then a
script scores the output as "pass" or "fail" and writes the verdict
to “t
.result
”. To run and grade a single test, make
the
“.result
” file explicitly from the “build
” directory, e.g.
make tests/threads/alarm-multiple.result
. If make
says that the test
result is up-to-date, but you want to re-run it anyway, either delete
the “.output
” file by hand, e.g.,
rm tests/threads/alarm-multiple.output
, or run make clean
to purge
all build and test output files.
By default, each test provides feedback only at completion, not during
its run. If you prefer, you can observe the progress of each test by
specifying “VERBOSE=1
” on the make
command line, as in
make check VERBOSE=1
. You can also provide arbitrary options to the
pintos
run by the tests with
“PINTOSOPTS='
[...
]'
”, e.g.
make check PINTOSOPTS='-j 1'
to select a jitter value of 1 (see
section 2. Debugging versus Testing).
All of the tests and related files are in “pintos/src/tests
”. Before
we test your submission, we will replace the contents of that directory
by a pristine, unmodified copy, to ensure that the correct tests are
used. Thus, you can modify some of the tests if that helps in debugging,
but we will run the originals.
All software has bugs, so some of our tests may be flawed. If you think a test failure is a bug in the test, not a bug in your code, please point it out. We will look at it and fix it if necessary.
Please don't try to take advantage of our generosity in giving out our test suite. Your code has to work properly in the general case, not just for the test cases we supply. For example, it would be unacceptable to explicitly base the kernel's behavior on the name of the running test case. Such attempts to side-step the test cases will receive no credit. If you think your solution may be in a gray area here, please ask us about it.
2. Debugging versus Testing
When you're debugging code, it's useful to be able to run a program
twice and have it do exactly the same thing. On second and later runs,
you can make new observations without having to discard or verify your
old observations. This property is called "reproducibility." One of
the simulators that Pintos supports, Bochs, can be set up for
reproducibility, and that's the way that pintos
invokes it by
default.
Of course, a simulation can only be reproducible from one run to the next if its input is the same each time. For simulating an entire computer, as we do, this means that every part of the computer must be the same. For example, you must use the same command-line argument, the same disks, the same version of Bochs, and you must not hit any keys on the keyboard (because you could not be sure to hit them at exactly the same point each time) during the runs.
While reproducibility is useful for debugging, it is a problem for testing thread synchronization, an important part of most of the projects. In particular, when Bochs is set up for reproducibility, timer interrupts will come at perfectly reproducible points, and therefore so will thread switches. That means that running the same test several times doesn't give you any greater confidence in your code's correctness than does running it only once.
So, to make your code easier to test, we've added a feature, called
"jitter," to Bochs, that makes timer interrupts come at random
intervals, but in a perfectly predictable way. In particular, if you
invoke pintos
with the option “-j
seed
”, timer
interrupts will come at irregularly spaced intervals. Within a single
seed
value, execution will still be reproducible, but timer
behavior will change as seed
is varied. Thus, for the
highest degree of confidence you should test your code with many seed
values.
On the other hand, when Bochs runs in reproducible mode, timings are not
realistic, meaning that a "one-second" delay may be much shorter or
even much longer than one second. You can invoke pintos
with a
different option, “-r
”, to set up Bochs for realistic
timings, in which a one-second delay should take approximately one
second of real time. Simulation in real-time mode is not reproducible,
and options “-j
” and “-r
” are mutually exclusive.
The QEMU simulator is available as an alternative to Bochs (use
“--qemu
” when invoking pintos
). The QEMU simulator is much
faster than Bochs, but it only supports real-time simulation and does
not have a reproducible mode.
3. Debugging Tools
Many tools lie at your disposal for debugging Pintos. This appendix introduces you to a few of them.
3.1 printf()
Don't underestimate the value of printf()
. The way printf()
is
implemented in Pintos, you can call it from practically anywhere in the
kernel, whether it's in a kernel thread or an interrupt handler, almost
regardless of what locks are held.
printf()
is useful for more than just examining data. It can also help
figure out when and where something goes wrong, even when the kernel
crashes or panics without a useful error message. The strategy is to
sprinkle calls to printf()
with different strings (e.g. "<1>"
,
"<2>"
, [...]) throughout the pieces of code you suspect are
failing. If you don't even see <1>
printed, then something bad
happened before that point, if you see <1>
but not <2>
, then
something bad happened between those two points, and so on. Based on
what you learn, you can then insert more printf()
calls in the new,
smaller region of code you suspect. Eventually you can narrow the
problem down to a single statement. See section E.6 Triple
Faults, for a related technique.
3.2 ASSERT
Assertions are useful because they can catch problems early, before they'd otherwise be noticed. Ideally, each function should begin with a set of assertions that check its arguments for validity. (Initializers for functions' local variables are evaluated before assertions are checked, so be careful not to assume that an argument is valid in an initializer.) You can also sprinkle assertions throughout the body of functions in places where you suspect things are likely to go wrong. They are especially useful for checking loop invariants.
Pintos provides the ASSERT
macro, defined in “<debug.h>
”, for
checking assertions.
- Macro: ASSERT (expression)
- Tests the value of
expression
. If it evaluates to zero (false), the kernel panics. The panic message includes the expression that failed, its file and line number, and a backtrace, which should help you to find the problem. See section E.4 Backtraces, for more information.
3.3 Function and Parameter Attributes
These macros defined in “<debug.h>
” tell the compiler special
attributes of a function or function parameter. Their expansions are
GCC-specific.
- Macro: UNUSED
- Appended to a function parameter to tell the compiler that the parameter might not be used within the function. It suppresses the warning that would otherwise appear.
- Macro: NO_RETURN
- Appended to a function prototype to tell the compiler that the function never returns. It allows the compiler to fine-tune its warnings and its code generation.
- Macro: NO_INLINE
- Appended to a function prototype to tell the compiler to never emit the function in-line. Occasionally useful to improve the quality of backtraces (see below).
- Macro: PRINTF_FORMAT (
format
,first
) - Appended to a function prototype to tell the compiler that the
function takes a
printf()
-like format string as the argument numberedformat
(starting from 1) and that the corresponding value arguments start at the argument numberedfirst
. This lets the compiler tell you if you pass the wrong argument types.
3.4 Backtraces
When the kernel panics, it prints a "backtrace," that is, a summary of
how your program got where it is, as a list of addresses inside the
functions that were running at the time of the panic. You can also
insert a call to debug_backtrace()
, prototyped in “<debug.h>
”, to
print a backtrace at any point in your code. debug_backtrace_all()
,
also declared in “<debug.h>
”, prints backtraces of all threads.
The addresses in a backtrace are listed as raw hexadecimal numbers,
which are difficult to interpret. We provide a tool called backtrace
to translate these into function names and source file line numbers.
Give it the name of your “kernel.o
” as the first argument and the
hexadecimal numbers composing the backtrace (including the
“0x
” prefixes) as the remaining arguments. It outputs the
function name and source file line numbers that correspond to each
address.
If the translated form of a backtrace is garbled, or doesn't make sense
(e.g. function A is listed above function B, but B doesn't call A),
then it's a good sign that you're corrupting a kernel thread's stack,
because the backtrace is extracted from the stack. Alternatively, it
could be that the “kernel.o
” you passed to backtrace
is not the same
kernel that produced the backtrace.
Sometimes backtraces can be confusing without any corruption. Compiler
optimizations can cause surprising behavior. When a function has called
another function as its final action (a tail call), the calling
function may not appear in a backtrace at all. Similarly, when function
A calls another function B that never returns, the compiler may optimize
such that an unrelated function C appears in the backtrace instead of A.
Function C is simply the function that happens to be in memory just
after A. In the threads project, this is commonly seen in backtraces for
test failures; see pass()
Fails, for more
information.
3.4.1 Example
Here's an example. Suppose that Pintos printed out this following call stack, which is taken from an actual Pintos submission for the file system project:
Call stack: 0xc0106eff 0xc01102fb 0xc010dc22 0xc010cf67 0xc0102319
0xc010325a 0x804812c 0x8048a96 0x8048ac8.
You would then invoke the backtrace
utility like shown below, cutting
and pasting the backtrace information into the command line. This
assumes that “kernel.o
” is in the current directory. You would of
course enter all of the following on a single shell command line, even
though that would overflow our margins here:
backtrace kernel.o 0xc0106eff 0xc01102fb 0xc010dc22 0xc010cf67
0xc0102319 0xc010325a 0x804812c 0x8048a96 0x8048ac8
The backtrace output would then look something like this:
0xc0106eff: debug_panic (lib/debug.c:86)
0xc01102fb: file_seek (filesys/file.c:405)
0xc010dc22: seek (userprog/syscall.c:744)
0xc010cf67: syscall_handler (userprog/syscall.c:444)
0xc0102319: intr_handler (threads/interrupt.c:334)
0xc010325a: intr_entry (threads/intr-stubs.S:38)
0x0804812c: (unknown)
0x08048a96: (unknown)
0x08048ac8: (unknown)
(You will probably not see exactly the same addresses if you run the command above on your own kernel binary, because the source code you compiled and the compiler you used are probably different.)
The first line in the backtrace refers to debug_panic()
, the function
that implements kernel panics. Because backtraces commonly result from
kernel panics, debug_panic()
will often be the first function shown in
a backtrace.
The second line shows file_seek()
as the function that panicked, in
this case as the result of an assertion failure. In the source code tree
used for this example, line 405 of “filesys/file.c
” is the assertion
ASSERT (file_ofs >= 0);
(This line was also cited in the assertion failure message.) Thus,
file_seek()
panicked because it passed a negative file offset
argument.
The third line indicates that seek()
called file_seek()
, presumably
without validating the offset argument. In this submission, seek()
implements the seek
system call.
The fourth line shows that syscall_handler()
, the system call handler,
invoked seek()
.
The fifth and sixth lines are the interrupt handler entry path.
The remaining lines are for addresses below PHYS_BASE
. This means that
they refer to addresses in the user program, not in the kernel. If you
know what user program was running when the kernel panicked, you can
re-run backtrace
on the user program, like so: (typing the command on
a single line, of course):
backtrace tests/filesys/extended/grow-too-big 0xc0106eff 0xc01102fb
0xc010dc22 0xc010cf67 0xc0102319 0xc010325a 0x804812c 0x8048a96
0x8048ac8
The results look like this:
0xc0106eff: (unknown)
0xc01102fb: (unknown)
0xc010dc22: (unknown)
0xc010cf67: (unknown)
0xc0102319: (unknown)
0xc010325a: (unknown)
0x0804812c: test_main (...xtended/grow-too-big.c:20)
0x08048a96: main (tests/main.c:10)
0x08048ac8: _start (lib/user/entry.c:9)
You can even specify both the kernel and the user program names on the command line, like so:
backtrace kernel.o tests/filesys/extended/grow-too-big 0xc0106eff
0xc01102fb 0xc010dc22 0xc010cf67 0xc0102319 0xc010325a 0x804812c
0x8048a96 0x8048ac8
The result is a combined backtrace:
In kernel.o:
0xc0106eff: debug_panic (lib/debug.c:86)
0xc01102fb: file_seek (filesys/file.c:405)
0xc010dc22: seek (userprog/syscall.c:744)
0xc010cf67: syscall_handler (userprog/syscall.c:444)
0xc0102319: intr_handler (threads/interrupt.c:334)
0xc010325a: intr_entry (threads/intr-stubs.S:38)
In tests/filesys/extended/grow-too-big:
0x0804812c: test_main (...xtended/grow-too-big.c:20)
0x08048a96: main (tests/main.c:10)
0x08048ac8: _start (lib/user/entry.c:9)
Here's an extra tip for anyone who read this far: backtrace
is smart
enough to strip the Call stack:
header and “.
” trailer from
the command line if you include them. This can save you a little bit of
trouble in cutting and pasting. Thus, the following command prints the
same output as the first one we used:
backtrace kernel.o Call stack: 0xc0106eff 0xc01102fb 0xc010dc22
0xc010cf67 0xc0102319 0xc010325a 0x804812c 0x8048a96 0x8048ac8.
3.5 GDB
You can run Pintos under the supervision of the GDB debugger. First,
start Pintos with the “--gdb
” option, e.g.
pintos --gdb -- run alarm-zero
. Second, open a second terminal on the
same machine and use pintos-gdb
to invoke GDB on
“kernel.o
”:(7){#DOCF7}
pintos-gdb kernel.o
and issue the following GDB command:
target remote localhost:1234
Now GDB is connected to the simulator over a local network connection.
You can now issue any normal GDB commands. If you issue the
“c
” command, the simulated BIOS will take control, load
Pintos, and then Pintos will run in the usual way. You can pause the
process at any point with Ctrl+C.
A GDB macro debugpintos
is provided as a shorthand for
target remote localhost:1234
, so you can type this shorter command
(debugpintos
) instead.
If you are using gdb on the JHU CS lab machines to debug
Pintos, you may encounter a port conflict error. That’s because
pintos --gdb
will invoke the -s
option with QEMU, which in
turn is a short-hand for -gdb tcp::1234
. So multiple users might
try to compete for the same port. We’ve modified the pintos
script
to add two options to work around this.
--gdb-port
to specify a port explicitly. You can choose any port that’s available to bind gdb, e.g.,pintos --gdb --gdb-port=2430
.--uport
to calculate a port number deterministically based on the user id. So different users on the lab machines will get a different port. Example:pintos --gdb --uport
. You can find the generated port in the command verbose output (e.g.,qemu-system-i386 ... -gdb tcp::25501
).
When you use these two options, you also need to change the
target remote
command in the gdb session to point to the specified/calculated port
instead of 1234, e.g., target remote localhost:2430
.
3.5.1 Using GDB
You can read the GDB manual by typing info gdb
at a terminal command
prompt. Here's a few commonly useful GDB commands:
- GDB Command: c
- Continues execution until Ctrl+C or the next breakpoint.
- GDB Command: si
- Execute one machine instruction
- GDB Command: s
- Execute until next line reached, step into function calls
- GDB Command: n
- Execute until next line reached, step over function calls
- GDB Command: p expression
- Evaluates the given
expression
{.variable} and prints its value. If the expression contains a function call, that function will actually be executed. - GDB Command: finish
- Run until the selected function (stack frame) returns
- GDB Command: b function
GDB Command: b file:line
GDB Command: b *address - Sets a breakpoint at
function
, atline
withinfile
, oraddress
.b
is short forbreak
orbreakpoint
. (Use a “0x
” prefix to specify an address in hex.)Use
b pintos_init
to make GDB stop when Pintos starts running. - GDB Command: info registers
- Print the general purpose registers, eip, eflags, and the segment selectors. For a much more thorough dump of the machine register state, see QEMU's own info registers command.
- GDB Command: x/Nx addr
- Display a hex dump of N words starting at virtual address addr. If N is omitted, it defaults to 1. addr can be any expression.
- GDB Command: x/Ni addr
- Display the N assembly instructions starting at addr. Using $eip as addr will display the instructions at the current instruction pointer.
- GDB Command: l *address
- Lists a few lines of code around
address
. (Use a “0x
” prefix to specify an address in hex.) - GDB Command: bt
- Prints a stack backtrace similar to that output by the
backtrace
program described above. - GDB Command: frame n
- Select frame number
n
or frame at addressn
- GDB Command: p/a address
- Prints the name of the function or variable that occupies
address
. (Use a “0x
” prefix to specify an address in hex.) - GDB Command: diassemble function
- Disassembles
function
. - GDB Command: thread n
- GDB focuses on one thread (i.e., CPU) at a time. This command switches that focus to thread n, numbered from zero.
- GDB Command: info threads
- List all threads (i.e., CPUs), including their state (active or halted) and what function they're in.
- GDB Command: symbol-file file
- Switch to symbol file file. When GDB attaches to QEMU, it has no
notion of the process boundaries within the virtual machine, so we
have to tell it which symbols to use. By default, we configure GDB
to use the kernel symbol file, “
build/kernel.o
”. If the machine is running user code, say “hello.c
”, you can switch to the “hello
” symbol file usingsymbol-file examples/hello.o
.
We also provide a set of macros specialized for debugging Pintos,
written by Godmar Back (gback@cs.vt.edu). You can type
help user-defined
for basic help with the macros. Here is an overview
of their functionality, based on Godmar's documentation:
- GDB Macro: debugpintos
- Attach debugger to a waiting pintos process on the same machine.
Shorthand for
target remote localhost:1234
. - GDB Macro: dumplist list type element
-
Prints the elements of
list
, which should be astruct
list that contains elements of the giventype
(without the wordstruct
) in whichelement
is thestruct list_elem
member that links the elements.Example:
dumplist &all_list thread allelem
prints all elements ofstruct thread
that are linked instruct list all_list
using thestruct list_elem allelem
which is part ofstruct thread
. - GDB Macro: btthread thread
- Shows the backtrace of
thread
, which is a pointer to thestruct thread
of the thread whose backtrace it should show. For the current thread, this is identical to thebt
(backtrace) command. It also works for any thread suspended inschedule()
, provided you know where its kernel stack page is located. - GDB Macro: btthreadlist list element
-
Shows the backtraces of all threads in
list
, thestruct list
in which the threads are kept. Specifyelement
as thestruct list_elem
field used insidestruct thread
to link the threads together.Example:
btthreadlist &all_list allelem
shows the backtraces of all threads contained instruct list all_list
, linked together byallelem
. This command is useful to determine where your threads are stuck when a deadlock occurs. Please see the example scenario below. - GDB Macro: btthreadall
- Short-hand for
btthreadlist &all_list allelem
. - GDB Macro: btpagefault
-
Print a backtrace of the current thread after a page fault exception. Normally, when a page fault exception occurs, GDB will stop with a message that might say:
Program received signal 0, Signal 0. 0xc0102320 in intr0e_stub ()
In that case, the
bt
command might not give a useful backtrace. Usebtpagefault
instead.You may also use
btpagefault
for page faults that occur in a user process. In this case, you may wish to also load the user program's symbol table using theloadusersymbols
macro, as described above. - GDB Macro: hook-stop
-
GDB invokes this macro every time the simulation stops, which Bochs will do for every processor exception, among other reasons. If the simulation stops due to a page fault,
hook-stop
will print a message that says and explains further whether the page fault occurred in the kernel or in user code.If the exception occurred from user code,
hook-stop
will say:pintos-debug: a page fault exception occurred in user mode pintos-debug: hit 'c' to continue, or 's' to step to intr_handler
In Project 2, a page fault in a user process leads to the termination of the process. You should expect those page faults to occur in the robustness tests where we test that your kernel properly terminates processes that try to access invalid addresses. To debug those, set a break point in
page_fault()
in “exception.c
”, which you will need to modify accordingly.In Project 3, a page fault in a user process no longer automatically leads to the termination of a process. Instead, it may require reading in data for the page the process was trying to access, either because it was swapped out or because this is the first time it's accessed. In either case, you will reach
page_fault()
and need to take the appropriate action there.If the page fault did not occur in user mode while executing a user process, then it occurred in kernel mode while executing kernel code. In this case,
hook-stop
will print this message:pintos-debug: a page fault occurred in kernel mode
followed by the output of the
btpagefault
command.Before Project 3, a page fault exception in kernel code is always a bug in your kernel, because your kernel should never crash. Starting with Project 3, the situation will change if you use the
get_user()
andput_user()
strategy to verify user memory accesses (see section 4.1.5 Accessing User Memory).
3.5.2 Example GDB Session
This section narrates a sample GDB session, provided by Godmar Back.
This example illustrates how one might debug a Project 1 solution in
which occasionally a thread that calls timer_sleep()
is not woken up.
With this bug, tests such as mlfqs_load_1
get stuck.
This session was captured with a slightly older version of Bochs and the GDB macros for Pintos, so it looks slightly different than it would now. Program output is shown in normal type, user input in strong type.
First, I start Pintos:
$ pintos -v --gdb -- -q -mlfqs run mlfqs-load-1
Writing command line to /tmp/gDAlqTB5Uf.dsk...
bochs -q
========================================================================
Bochs x86 Emulator 2.2.5
Build from CVS snapshot on December 30, 2005
========================================================================
00000000000i[ ] reading configuration from bochsrc.txt
00000000000i[ ] Enabled gdbstub
00000000000i[ ] installing nogui module as the Bochs GUI
00000000000i[ ] using log file bochsout.txt
Waiting for gdb connection on localhost:1234
Then, I open a second window on the same machine and start GDB:
$ pintos-gdb kernel.o
GNU gdb Red Hat Linux (6.3.0.0-1.84rh)
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-redhat-linux-gnu"...
Using host libthread_db library "/lib/libthread_db.so.1".
Then, I tell GDB to attach to the waiting Pintos emulator:
(gdb) debugpintos
Remote debugging using localhost:1234
0x0000fff0 in ?? ()
Reply contains invalid hex digit 78
Now I tell Pintos to run by executing c
(short for continue
) twice:
(gdb) c
Continuing.
Reply contains invalid hex digit 78
(gdb) c
Continuing.
Now Pintos will continue and output:
Pintos booting with 4,096 kB RAM...
Kernel command line: -q -mlfqs run mlfqs-load-1
374 pages available in kernel pool.
373 pages available in user pool.
Calibrating timer... 102,400 loops/s.
Boot complete.
Executing 'mlfqs-load-1':
(mlfqs-load-1) begin
(mlfqs-load-1) spinning for up to 45 seconds, please wait...
(mlfqs-load-1) load average rose to 0.5 after 42 seconds
(mlfqs-load-1) sleeping for another 10 seconds, please wait...
…until it gets stuck because of the bug I had introduced. I hit Ctrl+C in the debugger window:
Program received signal 0, Signal 0.
0xc010168c in next_thread_to_run () at ../../threads/thread.c:649
649 while (i <= PRI_MAX && list_empty (&ready_list[i]))
(gdb)
The thread that was running when I interrupted Pintos was the idle
thread. If I run backtrace
, it shows this backtrace:
(gdb) bt
#0 0xc010168c in next_thread_to_run () at ../../threads/thread.c:649
#1 0xc0101778 in schedule () at ../../threads/thread.c:714
#2 0xc0100f8f in thread_block () at ../../threads/thread.c:324
#3 0xc0101419 in idle (aux=0x0) at ../../threads/thread.c:551
#4 0xc010145a in kernel_thread (function=0xc01013ff , aux=0x0)
at ../../threads/thread.c:575
#5 0x00000000 in ?? ()
Not terribly useful. What I really like to know is what's up with the
other thread (or threads). Since I keep all threads in a linked list
called all_list
, linked together by a struct list_elem
member named
allelem
, I can use the btthreadlist
macro from the macro library I
wrote. btthreadlist
iterates through the list of threads and prints
the backtrace for each thread:
(gdb) btthreadlist all_list allelem
pintos-debug: dumping backtrace of thread 'main' @0xc002f000
#0 0xc0101820 in schedule () at ../../threads/thread.c:722
#1 0xc0100f8f in thread_block () at ../../threads/thread.c:324
#2 0xc0104755 in timer_sleep (ticks=1000) at ../../devices/timer.c:141
#3 0xc010bf7c in test_mlfqs_load_1 () at ../../tests/threads/mlfqs-load-1.c:49
#4 0xc010aabb in run_test (name=0xc0007d8c "mlfqs-load-1")
at ../../tests/threads/tests.c:50
#5 0xc0100647 in run_task (argv=0xc0110d28) at ../../threads/init.c:281
#6 0xc0100721 in run_actions (argv=0xc0110d28) at ../../threads/init.c:331
#7 0xc01000c7 in main () at ../../threads/init.c:140
pintos-debug: dumping backtrace of thread 'idle' @0xc0116000
#0 0xc010168c in next_thread_to_run () at ../../threads/thread.c:649
#1 0xc0101778 in schedule () at ../../threads/thread.c:714
#2 0xc0100f8f in thread_block () at ../../threads/thread.c:324
#3 0xc0101419 in idle (aux=0x0) at ../../threads/thread.c:551
#4 0xc010145a in kernel_thread (function=0xc01013ff , aux=0x0)
at ../../threads/thread.c:575
#5 0x00000000 in ?? ()
In this case, there are only two threads, the idle thread and the main
thread. The kernel stack pages (to which the struct thread
points) are
at 0xc0116000
and 0xc002f000
, respectively. The main thread is stuck
in timer_sleep()
, called from test_mlfqs_load_1
.
Knowing where threads are stuck can be tremendously useful, for instance when diagnosing deadlocks or unexplained hangs.
- GDB Macro: loadusersymbols
-
You can also use GDB to debug a user program running under Pintos. To do that, use the
loadusersymbols
macro to load the program's symbol table:loadusersymbols program
where
program
is the name of the program's executable (in the host file system, not in the Pintos file system). For example, you may issue:(gdb) loadusersymbols tests/userprog/exec-multiple
add symbol table from file "tests/userprog/exec-multiple" at
.text_addr = 0x80480a0
(gdb)After this, you should be able to debug the user program the same way you would the kernel, by placing breakpoints, inspecting data, etc. Your actions apply to every user program running in Pintos, not just to the one you want to debug, so be careful in interpreting the results: GDB does not know which process is currently active (because that is an abstraction the Pintos kernel creates). Also, a name that appears in both the kernel and the user program will actually refer to the kernel name. (The latter problem can be avoided by giving the user executable name on the GDB command line, instead of “
kernel.o
”, and then usingloadusersymbols
to load “kernel.o
”.)loadusersymbols
is implemented via GDB'sadd-symbol-file
command.
3.5.3 FAQ
- GDB can't connect to Bochs.
-
If the
target remote
command fails, then make sure that both GDB andpintos
are running on the same machine by runninghostname
in each terminal. If the names printed differ, then you need to open a new terminal for GDB on the machine runningpintos
. - GDB doesn't recognize any of the macros.
-
If you start GDB with
pintos-gdb
, it should load the Pintos macros automatically. If you start GDB some other way, then you must issue the commandsource
pintosdir
/src/misc/gdb-macros
, wherepintosdir
is the root of your Pintos directory, before you can use them. - Can I debug Pintos with DDD?
-
Yes, you can. DDD invokes GDB as a subprocess, so you'll need to tell it to invokes
pintos-gdb
instead:ddd --gdb --debugger pintos-gdb
- Can I use GDB inside Emacs?
-
Yes, you can. Emacs has special support for running GDB as a subprocess. Type M-x gdb and enter your
pintos-gdb
command at the prompt. The Emacs manual has information on how to use its debugging features in a section titled "Debuggers." - GDB is doing something weird.
-
If you notice strange behavior while using GDB, there are three possibilities: a bug in your modified Pintos, a bug in Bochs's interface to GDB or in GDB itself, or a bug in the original Pintos code. The first and second are quite likely, and you should seriously consider both. We hope that the third is less likely, but it is also possible.
3.6 Triple Faults
When a CPU exception handler, such as a page fault handler, cannot be invoked because it is missing or defective, the CPU will try to invoke the "double fault" handler. If the double fault handler is itself missing or defective, that's called a "triple fault." A triple fault causes an immediate CPU reset.
Thus, if you get yourself into a situation where the machine reboots in
a loop, that's probably a "triple fault." In a triple fault
situation, you might not be able to use printf()
for debugging,
because the reboots might be happening even before everything needed for
printf()
is initialized.
There are at least two ways to debug triple faults. First, you can run Pintos in Bochs under GDB (see section E.5 GDB). If Bochs has been built properly for Pintos, a triple fault under GDB will cause it to print the message "Triple fault: stopping for gdb" on the console and break into the debugger. (If Bochs is not running under GDB, a triple fault will still cause it to reboot.) You can then inspect where Pintos stopped, which is where the triple fault occurred.
Another option is what I call "debugging by infinite loop." Pick a
place in the Pintos code, insert the infinite loop for (;;);
there,
and recompile and run. There are two likely possibilities:
- The machine hangs without rebooting. If this happens, you know that the infinite loop is running. That means that whatever caused the reboot must be after the place you inserted the infinite loop. Now move the infinite loop later in the code sequence.
- The machine reboots in a loop. If this happens, you know that the machine didn't make it to the infinite loop. Thus, whatever caused the reboot must be before the place you inserted the infinite loop. Now move the infinite loop earlier in the code sequence.
If you move around the infinite loop in a "binary search" fashion, you can use this technique to pin down the exact spot that everything goes wrong. It should only take a few minutes at most.
3.7 Modifying Bochs
An advanced debugging technique is to modify and recompile the simulator. This proves useful when the simulated hardware has more information than it makes available to the OS. For example, page faults have a long list of potential causes, but the hardware does not report to the OS exactly which one is the particular cause. Furthermore, a bug in the kernel's handling of page faults can easily lead to recursive faults, but a "triple fault" will cause the CPU to reset itself, which is hardly conducive to debugging.
In a case like this, you might appreciate being able to make Bochs print
out more debug information, such as the exact type of fault that
occurred. It's not very hard. You start by retrieving the source code
for Bochs 2.6.2 from http://bochs.sourceforge.net and saving the file
“bochs-2.6.2.tar.gz
” into a directory. The script
“pintos/src/misc/bochs-2.6.2-build.sh
” applies a number of patches
contained in “pintos/src/misc
” to the Bochs tree, then builds Bochs
and installs it in a directory of your choice. Run this script without
arguments to learn usage instructions. To use your “bochs
” binary with
pintos
, put it in your PATH
, and make sure that it is earlier than
“/usr/local/data/cs318/x86_64/bin/bochs
”.
Of course, to get any good out of this you'll have to actually modify
Bochs. Instructions for doing this are firmly out of the scope of this
document. However, if you want to debug page faults as suggested above,
a good place to start adding printf()
s is
BX_CPU_C::dtranslate_linear()
in “cpu/paging.cc
”.
3.8 Tips
The page allocator in “threads/palloc.c
” and the block allocator in
“threads/malloc.c
” clear all the bytes in memory to 0xcc
at time of
free. Thus, if you see an attempt to dereference a pointer like
0xcccccccc
, or some other reference to 0xcc
, there's a good chance
you're trying to reuse a page that's already been freed. Also, byte
0xcc
is the CPU opcode for "invoke interrupt 3," so if you see an
error like Interrupt 0x03 (#BP Breakpoint Exception)
, then Pintos
tried to execute code in a freed page or block.
An assertion failure on the expression sec_no < d->capacity
indicates
that Pintos tried to access a file through an inode that has been closed
and freed. Freeing an inode clears its starting sector number to
0xcccccccc
, which is not a valid sector number for disks smaller than
about 1.6 TB.