Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp5818144ybc; Wed, 27 Nov 2019 09:54:14 -0800 (PST) X-Google-Smtp-Source: APXvYqwkt9ZSaXGxbcXwNxTrMWcacbzLWYD4N/pSJbviFcVdqSdk6Kva8Qb5I4ZqrinUrLl66Glq X-Received: by 2002:a50:9b1a:: with SMTP id o26mr32916828edi.208.1574877254072; Wed, 27 Nov 2019 09:54:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574877254; cv=none; d=google.com; s=arc-20160816; b=s/neBj81Yo/GQ/svMLhbttvkjBKZT/bOYmgk5pdVFbA3rZdHqpw5pWLg2EG/qKiJ50 Sx/J8nuVp07xKnuQcInAR9p0Q6kXt0zstyd3ZEyd1n0SBTv9MTxLgAam4mPFhULn3pqb skLIgs5qbQ6+W+CMq1GVIulv+yptMOdFz0E7BEw5fJ0YTM6aqCPiaCkXSXqWVONUOJDG Rj4/Z8obdZlBUI8XNOjoSt21NxQoCW10sn1+L9PBVRVT4x2W26AN8LDu8c97CNDAZ0X0 ztwULCL/TTuv8mR292Sfuq0o416xiQ1RTzMuCkIqxr4eKalOrnPkO5Vw+ArytcBkrwXt I+5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=q2tEW7FTsA73HHhNSU6k3P4LajEnR3VGBalEePUDQOw=; b=oszccEW3jJFhTK5HFSDWa3wb7+ijb8sgG6r+oomQ+C2dYdjISlmioUkt7Z4St9Nll0 F42tH6zprJwi0kbi8uzysH0QHY/HN9nQa2bHaKn2NB4xDMRP2Bdo2NXfonfzD8EAUggn WOC5y7TQnGZgHGPDqTkALCzXW2B39SDl2QcdSPsEsjj+JimK3A890AFJMO6ZZNazu/ZY nweWPoQDwXVMozZrZgiFRumtL/mGaBMaP6ojV03PpLyCNxUQD4sMfE433ZV06o0SA41p E8gjB3Ct+fE0anfFb7DqWB4+p0W0VJf/AlwADIyfqdXaymqSG5sTmG1quSDVrUFQsYkR kn1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tpJK0muq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c8si9800009eja.67.2019.11.27.09.53.50; Wed, 27 Nov 2019 09:54:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=tpJK0muq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727385AbfK0Rvw (ORCPT + 99 others); Wed, 27 Nov 2019 12:51:52 -0500 Received: from mail-il1-f194.google.com ([209.85.166.194]:36260 "EHLO mail-il1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726603AbfK0Rvv (ORCPT ); Wed, 27 Nov 2019 12:51:51 -0500 Received: by mail-il1-f194.google.com with SMTP id b15so1668604iln.3; Wed, 27 Nov 2019 09:51:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q2tEW7FTsA73HHhNSU6k3P4LajEnR3VGBalEePUDQOw=; b=tpJK0muqG5Irb9Lrg4GqPOB4Ey+PWSMVLH+JltOEnBV7wWLWar/X8QDXZobQYi54OT r1yEscJ2IYfppwSSEI4IAXT3tn8TsO8oXndEiu1B6C498T+Liq2+DsUulbjx18HGGcB9 ROKcfWoYDdu0lEYjteC2fwg2kSvtKNWsEuojPADhQAkHp4ZD624VUnR5HL8pUkNI7+Tf eIG2jBkGPweSqswoy6uwxQzDsbtfx3VcGejMZpNWP9jIUC/v8J6LNK7wbddUZ503MjHQ RQjEjcIScItifJPQS0QGKEIKvGUI6Mp+Wa2Y413Fg0g4A1qpGz4JG6+9DO7FLzM82fXz TB2w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q2tEW7FTsA73HHhNSU6k3P4LajEnR3VGBalEePUDQOw=; b=DoUNT/uVZkLmdKYqmcDT/JeLPT0tO9L+bKG3mCFwHOeJ8kB2N3KESlV/mQUsC+dn0H 5CDUkaKze/65ZUJWMHkdsf4d8NVc/u6jqzG9NM47LakSQhbgc33u+QB56pMqL4EvlOEe yLUut/iB6+FkqPdoGMlBGVlC0UIMjS+AvOmGomthMKe6Wp1/St6Qd0Llu+57JsZ/vfjE Zf45gaAq6efEOFYziw8OnLrY6hpcUff6SrymYBgG8N8ZPNf0q8HtOxPBRK1VJF+0LiuN v11QKajXIKvyY95pIHLNzvsoyI8YMWhtZ2k1s5FbMoPMuUw1c3v/HdwcVulQzERt5WY1 09Bg== X-Gm-Message-State: APjAAAX1bMoHyR7ium36kteI4HoxVkOvrGegI8c0blw0IrKLQhgtzMdP KD61rEnUuBA2qm9Yq1+aLN9dvakuCF0= X-Received: by 2002:a92:cc51:: with SMTP id t17mr9263456ilq.10.1574877110195; Wed, 27 Nov 2019 09:51:50 -0800 (PST) Received: from localhost.localdomain (c-24-9-77-57.hsd1.co.comcast.net. [24.9.77.57]) by smtp.googlemail.com with ESMTPSA id o4sm4547813ilq.15.2019.11.27.09.51.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Nov 2019 09:51:49 -0800 (PST) From: Jim Cromie To: jbaron@akamai.com, linux-kernel@vger.kernel.org Cc: linux@rasmusvillemoes.dk, greg@kroah.com, Jim Cromie , Jonathan Corbet , linux-doc@vger.kernel.org Subject: [PATCH 14/16] dyndbg: add inverted-flags, implement filtering on flags Date: Wed, 27 Nov 2019 10:51:43 -0700 Message-Id: <20191127175144.1351934-1-jim.cromie@gmail.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 1. Add 3 user-flags [xyz] which work like original [pfmlt] flags, but have no effect on callsite behavior; they allow marking of arbitrary sets of callsites. Just adding the flag defs themselves is enough, they inherit the existing flags mechanics. 2. Add [PFMLT],[XYZ] flags, which invert their counterparts; P===!p etc. And in ddebug_read_flags(): current code does: [pfmlt_xyz] -> flags copy it to: [PFMLT_XYZ] -> mask also disallow both of a pair: ie no 'xX', no true & false. 3. Add filtering ops into ddebug_change(), right after all the callsite-property selections are complete. These test the callsite's current flagstate before applying modflags. Why ? The 3 new/user flags facilitate batching of changes. By marking individual callsites with 'xyz', user can compose an arbitrary set of changes, then activate them together by selecting on 'xyz': #> echo 'file foo.c +xyz; file bar.c +xyz' > control #> echo 'xyz+p' > control These user flags aren't strictly needed, but with them you can avoid using [fmlt] flags for marking, which would alter logging. Signed-off-by: Jim Cromie --- .../admin-guide/dynamic-debug-howto.rst | 28 ++++++++++++++-- include/linux/dynamic_debug.h | 3 ++ lib/dynamic_debug.c | 33 ++++++++++++++----- 3 files changed, 54 insertions(+), 10 deletions(-) diff --git a/Documentation/admin-guide/dynamic-debug-howto.rst b/Documentation/admin-guide/dynamic-debug-howto.rst index cdc45dcb3e0c..5404e23eeac8 100644 --- a/Documentation/admin-guide/dynamic-debug-howto.rst +++ b/Documentation/admin-guide/dynamic-debug-howto.rst @@ -231,9 +231,33 @@ The flags are:: m Include module name in the printed message t Include thread ID in messages not generated from interrupt context _ No flags are set. (Or'd with others on input) + x user flag, to mark callsites into a group + y user flag, ... + z user flag, ... -For ``print_hex_dump_debug()`` and ``print_hex_dump_bytes()``, only ``p`` flag -have meaning, other flags ignored. +Additionally, the flags above have upper-case versions, which invert +their respective meanings. Their use follows. + +Using Filters:: + +Filter-flags specify an optional additional selector on pr_debug +callsites; with them you can compose an arbitrary set of callsites, by +iteratively marking them with ``+xyz``, then enabling them all with +``xyz+p``. + +Filters can also contain upper-case flags, like ``XY``, which select +only callsites with x&y cleared. + +Flagsets cannot contain ``xX`` etc, a flag cannot be true and false. + +modflags containing upper-case flags is reserved/undefined for now. +inverted-flags are currently ignored, usage gets trickier if given +``-pXy``, it should leave x set. + +Notes:: + +For ``print_hex_dump_debug()`` and ``print_hex_dump_bytes()``, only +``p`` flag has meaning, other flags are ignored. For display, the flags are preceded by ``=`` (mnemonic: what the flags are currently equal to). diff --git a/include/linux/dynamic_debug.h b/include/linux/dynamic_debug.h index 802480ea8708..0d7c9a3538b6 100644 --- a/include/linux/dynamic_debug.h +++ b/include/linux/dynamic_debug.h @@ -32,6 +32,9 @@ struct _ddebug { #define _DPRINTK_FLAGS_INCL_FUNCNAME (1<<2) #define _DPRINTK_FLAGS_INCL_LINENO (1<<3) #define _DPRINTK_FLAGS_INCL_TID (1<<4) +#define _DPRINTK_FLAGS_USR_X (1<<5) +#define _DPRINTK_FLAGS_USR_Y (1<<6) +#define _DPRINTK_FLAGS_USR_Z (1<<7) #if defined DEBUG #define _DPRINTK_FLAGS_DEFAULT _DPRINTK_FLAGS_PRINT #else diff --git a/lib/dynamic_debug.c b/lib/dynamic_debug.c index 26432f88b329..b2630df0c3a5 100644 --- a/lib/dynamic_debug.c +++ b/lib/dynamic_debug.c @@ -85,13 +85,16 @@ static inline const char *trim_prefix(const char *path) return path + skip; } -static struct { unsigned flag:8; char opt_char; } opt_array[] = { - { _DPRINTK_FLAGS_PRINT, 'p' }, - { _DPRINTK_FLAGS_INCL_MODNAME, 'm' }, - { _DPRINTK_FLAGS_INCL_FUNCNAME, 'f' }, - { _DPRINTK_FLAGS_INCL_LINENO, 'l' }, - { _DPRINTK_FLAGS_INCL_TID, 't' }, - { _DPRINTK_FLAGS_NONE, '_' }, +static struct { unsigned flag:8; char opt_char, not_char; } opt_array[] = { + { _DPRINTK_FLAGS_PRINT, 'p', 'P' }, + { _DPRINTK_FLAGS_INCL_MODNAME, 'm', 'M' }, + { _DPRINTK_FLAGS_INCL_FUNCNAME, 'f', 'F' }, + { _DPRINTK_FLAGS_INCL_LINENO, 'l', 'L' }, + { _DPRINTK_FLAGS_INCL_TID, 't', 'T' }, + { _DPRINTK_FLAGS_NONE, '_', '_' }, + { _DPRINTK_FLAGS_USR_X, 'x', 'X' }, + { _DPRINTK_FLAGS_USR_Y, 'y', 'Y' }, + { _DPRINTK_FLAGS_USR_Z, 'z', 'Z' }, }; /* format a string into buf[] which describes the _ddebug's flags */ @@ -195,6 +198,13 @@ static int ddebug_change(const struct ddebug_query *query, dp->lineno > query->last_lineno) continue; + /* filter for required flags */ + if ((dp->flags & filter->flags) != filter->flags) + continue; + /* filter on prohibited bits */ + if ((~dp->flags & filter->mask) != filter->mask) + continue; + nfound++; newflags = (dp->flags & mods->mask) | mods->flags; @@ -428,10 +438,17 @@ static int ddebug_read_flags(const char *str, struct flagsettings *f) if (*str == opt_array[i].opt_char) { f->flags |= opt_array[i].flag; break; + } else if (*str == opt_array[i].not_char) { + f->mask |= opt_array[i].flag; + break; } } if (i < 0) { - pr_err("unknown flag '%c' in \"%s\"\n", *str, str); + pr_err("unknown flag '%c'", *str); + return -EINVAL; + } + if (f->flags & f->mask) { + pr_err("flag '%c' conflicts with earlier one\n", *str); return -EINVAL; } } -- 2.23.0