日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

pr_debug、dev_dbg等动态调试三

發布時間:2025/3/20 编程问答 24 豆豆
生活随笔 收集整理的這篇文章主要介紹了 pr_debug、dev_dbg等动态调试三 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

內核版本:Linux-3.14

作者:彭東林

郵箱:pengdonglin137@163.com

?

如果沒有使用CONFIG_DYNAMIC_DEBUG,那么就需要定義DEBUG,那么此時pr_debug就退化為了printk。

如果定義了CONFIG_DYNAMIC_DEBUG,下面有幾種方法:

參考內核文檔:Documentation/dynamic-debug-howto.txt

?

Introduction

============

This document describes how to use the dynamic debug (dyndbg) feature.

Dynamic debug is designed to allow you to dynamically enable/disable
kernel code to obtain additional kernel information.? Currently, if
CONFIG_DYNAMIC_DEBUG is set, then all pr_debug()/dev_dbg() and
print_hex_dump_debug()/print_hex_dump_bytes() calls can be dynamically
enabled per-callsite.

If CONFIG_DYNAMIC_DEBUG is not set, print_hex_dump_debug() is just
shortcut for print_hex_dump(KERN_DEBUG).

For print_hex_dump_debug()/print_hex_dump_bytes(), format string is
its 'prefix_str' argument, if it is constant string; or "hexdump"
in case 'prefix_str' is build dynamically.

Dynamic debug has even more useful features:

* Simple query language allows turning on and off debugging
?? statements by matching any combination of 0 or 1 of:

?? - source filename
?? - function name
?? - line number (including ranges of line numbers)
?? - module name
?? - format string

* Provides a debugfs control file: <debugfs>/dynamic_debug/control
?? which can be read to display the complete list of known debug
?? statements, to help guide you

Controlling dynamic debug Behaviour

===================================

The behaviour of pr_debug()/dev_dbg()s are controlled via writing to a
control file in the 'debugfs' filesystem. Thus, you must first mount
the debugfs filesystem, in order to make use of this feature.
Subsequently, we refer to the control file as:
<debugfs>/dynamic_debug/control. For example, if you want to enable
printing from source file 'svcsock.c', line 1603 you simply do:

1: nullarbor:~ # echo 'file svcsock.c line 1603 +p' > 2: <debugfs>/dynamic_debug/control

If you make a mistake with the syntax, the write will fail thus:

1: nullarbor:~ # echo 'file svcsock.c wtf 1 +p' > 2: <debugfs>/dynamic_debug/control 3: -bash: echo: write error: Invalid argument

Viewing Dynamic Debug Behaviour

===========================

You can view the currently configured behaviour of all the debug
statements via:

1: nullarbor:~ # cat <debugfs>/dynamic_debug/control 2: # filename:lineno [module]function flags format 3: /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svc_rdma.c:323 [svcxprt_rdma]svc_rdma_cleanup =_ "SVCRDMA Module Removed, deregister RPC RDMA transport\012" 4: /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svc_rdma.c:341 [svcxprt_rdma]svc_rdma_init =_ "\011max_inline : %d\012" 5: /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svc_rdma.c:340 [svcxprt_rdma]svc_rdma_init =_ "\011sq_depth : %d\012" 6: /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svc_rdma.c:338 [svcxprt_rdma]svc_rdma_init =_ "\011max_requests : %d\012" 7: ...

You can also apply standard Unix text manipulation filters to this
data, e.g.

1: nullarbor:~ # grep -i rdma <debugfs>/dynamic_debug/control | wc -l 2: 62 3:? 4: nullarbor:~ # grep -i tcp <debugfs>/dynamic_debug/control | wc -l 5: 42 6:?

The third column shows the currently enabled flags for each debug
statement callsite (see below for definitions of the flags).? The
default value, with no flags enabled, is "=_".? So you can view all
the debug statement callsites with any non-default flags:

1: nullarbor:~ # awk '$3 != "=_"' <debugfs>/dynamic_debug/control 2: # filename:lineno [module]function flags format 3: /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svcsock.c:1603 [sunrpc]svc_send p "svc_process: st_sendto returned %d\012"

?

Command Language Reference

==========================

At the lexical level, a command comprises a sequence of words separated
by spaces or tabs.? So these are all equivalent:

1: nullarbor:~ # echo -c 'file svcsock.c line 1603 +p' > 2: <debugfs>/dynamic_debug/control 3: nullarbor:~ # echo -c ' file svcsock.c line 1603 +p ' > 4: <debugfs>/dynamic_debug/control 5: nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' > 6: <debugfs>/dynamic_debug/control

Command submissions are bounded by a write() system call.
Multiple commands can be written together, separated by ';' or '\n'.

1: ~# echo "func pnpacpi_get_resources +p; func pnp_assign_mem +p" \ 2: > <debugfs>/dynamic_debug/control

If your query set is big, you can batch them too:

1: ~# cat query-batch-file > <debugfs>/dynamic_debug/control

A another way is to use wildcard. The match rule support '*' (matches
zero or more characters) and '?' (matches exactly one character).For
example, you can match all usb drivers:

1: ~# echo "file drivers/usb/* +p" > <debugfs>/dynamic_debug/control

At the syntactical level, a command comprises a sequence of match
specifications, followed by a flags change specification.

1: command ::= match-spec* flags-spec

The match-spec's are used to choose a subset of the known pr_debug()
callsites to which to apply the flags-spec.? Think of them as a query
with implicit ANDs between each pair.? Note that an empty list of
match-specs will select all debug statement callsites.

A match specification comprises a keyword, which controls the
attribute of the callsite to be compared, and a value to compare
against.? Possible keywords are:

1: match-spec ::= 'func' string | 2: 'file' string | 3: 'module' string | 4: 'format' string | 5: 'line' line-range 6:? 7: line-range ::= lineno | 8: '-'lineno | 9: lineno'-' | 10: lineno'-'lineno

// Note: line-range cannot contain space, e.g.
// "1-30" is valid range but "1 - 30" is not.

lineno ::= unsigned-int

The meanings of each keyword are:

func
??? The given string is compared against the function name
??? of each callsite.? Example:

1: func svc_tcp_accept

file
??? The given string is compared against either the full pathname, the
??? src-root relative pathname, or the basename of the source file of
??? each callsite.? Examples:

1: file svcsock.c 2: file kernel/freezer.c 3: file /usr/src/packages/BUILD/sgi-enhancednfs-1.4/default/net/sunrpc/svcsock.c

module
??? The given string is compared against the module name
??? of each callsite.? The module name is the string as
??? seen in "lsmod", i.e. without the directory or the .ko
??? suffix and with '-' changed to '_'.? Examples:

1: module sunrpc 2: module nfsd

format
??? The given string is searched for in the dynamic debug format
??? string.? Note that the string does not need to match the
??? entire format, only some part.? Whitespace and other
??? special characters can be escaped using C octal character
??? escape \ooo notation, e.g. the space character is \040.
??? Alternatively, the string can be enclosed in double quote
??? characters (") or single quote characters (').
??? Examples:

1: format svcrdma: // many of the NFS/RDMA server pr_debugs 2: format readahead // some pr_debugs in the readahead cache 3: format nfsd:\040SETATTR // one way to match a format with whitespace 4: format "nfsd: SETATTR" // a neater way to match a format with whitespace 5: format 'nfsd: SETATTR' // yet another way to match a format with whitespace

line
??? The given line number or range of line numbers is compared
??? against the line number of each pr_debug() callsite.? A single
??? line number matches the callsite line number exactly.? A
??? range of line numbers matches any callsite between the first
??? and last line number inclusive.? An empty first number means
??? the first line in the file, an empty line number means the
??? last number in the file.? Examples:

1: line 1603 // exactly line 1603 2: line 1600-1605 // the six lines from line 1600 to line 1605 3: line -1605 // the 1605 lines from line 1 to line 1605 4: line 1600- // all lines from line 1600 to the end of the file

The flags specification comprises a change operation followed
by one or more flag characters.? The change operation is one
of the characters:

1: - remove the given flags 2: + add the given flags 3: = set the flags to the given flags

The flags are:

1: p enables the pr_debug() callsite. 2: f Include the function name in the printed message 3: l Include line number in the printed message 4: m Include module name in the printed message 5: t Include thread ID in messages not generated from interrupt context 6: _ No flags are set. (Or'd with others on input)

For print_hex_dump_debug() and print_hex_dump_bytes(), only 'p' flag
have meaning, other flags ignored.

For display, the flags are preceded by '='
(mnemonic: what the flags are currently equal to).

Note the regexp ^[-+=][flmpt_]+$ matches a flags specification.
To clear all flags at once, use "=_" or "-flmpt".

?

Debug messages during Boot Process

==================================

To activate debug messages for core code and built-in modules during
the boot process, even before userspace and debugfs exists, use
dyndbg="QUERY", module.dyndbg="QUERY", or ddebug_query="QUERY"
(ddebug_query is obsoleted by dyndbg, and deprecated).? QUERY follows
the syntax described above, but must not exceed 1023 characters.? Your
bootloader may impose lower limits.

These dyndbg params are processed just after the ddebug tables are
processed, as part of the arch_initcall.? Thus you can enable debug
messages in all code run after this arch_initcall via this boot
parameter.

On an x86 system for example ACPI enablement is a subsys_initcall and
??

1: dyndbg="file ec.c +p" will show early Embedded Controller transactions during ACPI setup if
your machine (typically a laptop) has an Embedded Controller.
PCI (or other devices) initialization also is a hot candidate for using
this boot parameter for debugging purposes.

If foo module is not built-in, foo.dyndbg will still be processed at
boot time, without effect, but will be reprocessed when module is
loaded later.? dyndbg_query= and bare dyndbg= are only processed at
boot.

?

Debug Messages at Module Initialization Time

============================================

When "modprobe foo" is called, modprobe scans /proc/cmdline for
foo.params, strips "foo.", and passes them to the kernel along with
params given in modprobe args or /etc/modprob.d/*.conf files,
in the following order:

1. # parameters given via /etc/modprobe.d/*.conf

1: options foo dyndbg=+pt 2: options foo dyndbg # defaults to +p

2. # foo.dyndbg as given in boot args, "foo." is stripped and passed
??

1: foo.dyndbg=" func bar +p; func buz +mp"

3. # args to modprobe
??

1: modprobe foo dyndbg==pmf # override previous settings

These dyndbg queries are applied in order, with last having final say.
This allows boot args to override or modify those from /etc/modprobe.d
(sensible, since 1 is system wide, 2 is kernel or boot specific), and
modprobe args to override both.

In the foo.dyndbg="QUERY" form, the query must exclude "module foo".
"foo" is extracted from the param-name, and applied to each query in
"QUERY", and only 1 match-spec of each type is allowed.

The dyndbg option is a "fake" module parameter, which means:

- modules do not need to define it explicitly
- every module gets it tacitly, whether they use pr_debug or not
- it doesn't appear in /sys/module/$module/parameters/
? To see it, grep the control file, or inspect /proc/cmdline.

For CONFIG_DYNAMIC_DEBUG kernels, any settings given at boot-time (or
enabled by -DDEBUG flag during compilation) can be disabled later via
the sysfs interface if the debug messages are no longer needed:

1: echo "module module_name -p" > <debugfs>/dynamic_debug/control

Examples
========

1: // enable the message at line 1603 of file svcsock.c 2: nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' > 3: <debugfs>/dynamic_debug/control 4:? 5: // enable all the messages in file svcsock.c 6: nullarbor:~ # echo -n 'file svcsock.c +p' > 7: <debugfs>/dynamic_debug/control 8:? 9: // enable all the messages in the NFS server module 10: nullarbor:~ # echo -n 'module nfsd +p' > 11: <debugfs>/dynamic_debug/control 12:? 13: // enable all 12 messages in the function svc_process() 14: nullarbor:~ # echo -n 'func svc_process +p' > 15: <debugfs>/dynamic_debug/control 16:? 17: // disable all 12 messages in the function svc_process() 18: nullarbor:~ # echo -n 'func svc_process -p' > 19: <debugfs>/dynamic_debug/control 20:? 21: // enable messages for NFS calls READ, READLINK, READDIR and READDIR+. 22: nullarbor:~ # echo -n 'format "nfsd: READ" +p' > 23: <debugfs>/dynamic_debug/control 24:? 25: // enable messages in files of which the pathes include string "usb" 26: nullarbor:~ # echo -n '*usb* +p' > <debugfs>/dynamic_debug/control 27:? 28: // enable all messages 29: nullarbor:~ # echo -n '+p' > <debugfs>/dynamic_debug/control 30:? 31: // add module, function to all enabled messages 32: nullarbor:~ # echo -n '+mf' > <debugfs>/dynamic_debug/control 33:? 34: // boot-args example, with newlines and comments for readability 35: Kernel command line: ... 36: // see whats going on in dyndbg=value processing 37: dynamic_debug.verbose=1 38: // enable pr_debugs in 2 builtins, #cmt is stripped 39: dyndbg="module params +p #cmt ; module sys +p" 40: // enable pr_debugs in 2 functions in a module loaded later 41: pc87360.dyndbg="func pc87360_init_device +p; func pc87360_find +p" 42:?

?

完。

轉載于:https://www.cnblogs.com/pengdonglin137/p/4622460.html

總結

以上是生活随笔為你收集整理的pr_debug、dev_dbg等动态调试三的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

主站蜘蛛池模板: 欧美精品一区二区免费 | 久久亚洲免费视频 | 国产精品51麻豆cm传媒 | 在线观看你懂的网址 | 第一页综合 | 国产91专区| heyzo北岛玲在线播放 | 伊人影院在线观看视频 | 国产综合久久 | 亚洲一区二区三区在线播放 | 日本一区二区视频 | 国产视频1区 | 青青草国内自拍 | 国产成人av片| 美国一级黄色大片 | www.九九九 | 欧美a v在线播放 | 这里只有精品久久 | 91精彩视频| 韩国电影一区二区三区 | 91一级片 | 亚洲经典一区 | 中文字幕+乱码+中文乱码www | 国产精品自拍合集 | 精品综合 | 国产精品1234区 | 成人三级黄色片 | 涩涩视频免费在线观看 | 日韩视频网址 | 长篇高h肉爽文丝袜 | 黄色av一级 | 在线观看av片 | 天堂网久久 | a√在线 | 欧美一区二区三区在线播放 | 校园春色综合网 | 日本少妇影院 | 亚洲欧美变态另类丝袜第一区 | av观看在线免费 | 欧美a v在线播放 | 五十路中文字幕 | 日日摸日日操 | 免费av在线网 | 国产一区欧美日韩 | 欧美三个黑人玩3p | 综合激情视频 | 毛片动态图 | 在线观看成人小视频 | 羞羞动漫免费观看 | 日韩精品毛片 | 欧美大片91 | 尤物视频最新网址 | 欧美一级免费 | 欧美一区二区三区婷婷 | 欧美日韩精品一区二区三区蜜桃 | 亚洲aⅴ| 涩色网| 激情伊人网 | www.黄色小说.com | 色欲久久久天天天综合网精品 | 国产成人综合自拍 | 91 免费看片 | 99热播| 日本激情电影 | 丁香婷婷深情五月亚洲 | 日批免费看 | 操极品女神 | 91久久精品一区二区三区 | 日本亲与子乱人妻hd | 亚洲黑丝在线 | 亚洲特黄特色 | 国产高潮国产高潮久久久 | 国产成人在线一区二区 | 日韩精品在线视频免费观看 | 国产一区二区在线免费观看 | 裸体裸乳免费看 | 成人看的视频 | 北条麻妃av在线 | 国产一区亚洲一区 | 免费不卡视频 | 日本精品人妻无码免费大全 | 东北少妇bbbb搡bbb搡 | 免费黄视频网站 | 欧美黄色视屏 | 超碰97人人干 | 日美毛片| 久久91久久| 午夜视频日韩 | 日韩午夜高清 | 麻豆网站在线免费观看 | 久久叉| 午夜性色福利影院 | 久久久免费高清视频 | 国产精品三级av | 国产三区av | 亚洲成人18 | 黄色xxxxxx | 国精产品一品二品国精品69xx | 欧美 日韩 国产 中文 |