微知-如何给某个文件打开linux内核的动态打印开关?(echo -n ‘file probe.c +p‘ > /sys/kernel/debug/dynamic_debug/control)

背景

printk 只能支持7个等级,并且是全局统一开关。粒度太粗。如何做到动态开关某个文件的debug?
linux内核提供了dynamic debug的机制(后文称dd)。
本文以pci驱动中的probe.c为例子介绍 开启内核中已使用了dd模块并且并已编译到内核的模块如何直接开启打印。

使用方法

在内核源码中driver/pci/probe.c中使用了`dev_dbg`的打印函数。该函数是dev.h提供的,封装的是`dynamic_dev_debug`。该函数是dynamic_debug.h提供的动态打印函数。类似的还有给`pr_debug`的`dynamic_pr_debug`和给netdev的`dynamic_netdev_debug`。

比如probe中有函数打印了`dev_debug("scanning bus"`,需要linux运行中动态打开它。操作方式

echo -n 'file probe.c +p' > /sys/kernel/debug/dynamic_debug/control

dmesg | grep scanning

这样就打开了
如果要开启某个模块的就用module xxx 替换其中的file xxx
开启后,在dmesg中就会打开

dd大概实现机制

接口依赖

/dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=winnt,errors=remount-ro) [root@localhost kernel-OLK-6.6]# ls -l /boot/vmlinuz-* -rw-r--r--. 1 root root 14119392 Aug 18 19:22 /boot/vmlinuz-0-rescue-b53ae311b4644144a510fed4979e4410 -rw-r--r--. 1 root root 14225920 Dec 1 18:39 /boot/vmlinuz-6.6.0 -rw-r--r--. 1 root root 14119392 Dec 27 2024 /boot/vmlinuz-6.6.0-72.0.0.76.oe2403sp1.x86_64 [root@localhost kernel-OLK-6.6]# grub2-mkconfig -o /boot/grub2/grub.cfg Generating grub configuration file ... File descriptor 17 (/dev/urandom) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 20 (/root/.remotedev-server/data/logs/20251201T170405/ptyhost.log) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 21 (/root/.remotedev-server/data/logs/20251201T170405/remoteagent.log) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 22 (/dev/ptmx) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 23 (/dev/ptmx) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 17 (/dev/urandom) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 20 (/root/.remotedev-server/data/logs/20251201T170405/ptyhost.log) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 21 (/root/.remotedev-server/data/logs/20251201T170405/remoteagent.log) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 22 (/dev/ptmx) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe File descriptor 23 (/dev/ptmx) leaked on vgs invocation. Parent PID 312985: /usr/sbin/grub2-probe Found linux image: /boot/vmlinuz-6.6.0-72.0.0.76.oe2403sp1.x86_64 Found initrd image: /boot/initramfs-6.6.0-72.0.0.76.oe2403sp1.x86_64.img Found linux image: /boot/vmlinuz-6.6.0 Found initrd image: /boot/initramfs-6.6.0.img Found linux image: /boot/vmlinuz-0-rescue-b53ae311b4644144a510fed4979e4410 Found initrd image: /boot/initramfs-0-rescue-b53ae311b4644144a510fed4979e4410.img File descriptor 17 (/dev/urandom) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 20 (/root/.remotedev-server/data/logs/20251201T170405/ptyhost.log) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 21 (/root/.remotedev-server/data/logs/20251201T170405/remoteagent.log) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 22 (/dev/ptmx) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 23 (/dev/ptmx) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 17 (/dev/urandom) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 20 (/root/.remotedev-server/data/logs/20251201T170405/ptyhost.log) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 21 (/root/.remotedev-server/data/logs/20251201T170405/remoteagent.log) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 22 (/dev/ptmx) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe File descriptor 23 (/dev/ptmx) leaked on vgs invocation. Parent PID 313245: /usr/sbin/grub2-probe Adding boot menu entry for UEFI Firmware Settings ... done [root@localhost kernel-OLK-6.6]# [ -d /sys/firmware/efi ] && echo "UEFI 模式" || echo "BIOS 模式" UEFI 模式 [root@localhost kernel-OLK-6.6]# mount | grep /boot/efi /dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=winnt,errors=remount-ro) [root@localhost kernel-OLK-6.6]# 接下来如何设置默认启动内核
最新发布
12-02
评论 1
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值