Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp950893iob; Fri, 13 May 2022 17:29:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJynqPZbNfjf5dpe/xVDysUsk9QKAswCPpV7KT/X8tOEnQXHUQDH+RTBEP8GG3Clq4UIjTBw X-Received: by 2002:a05:6000:184d:b0:20c:5a30:1e48 with SMTP id c13-20020a056000184d00b0020c5a301e48mr5854220wri.614.1652488191910; Fri, 13 May 2022 17:29:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652488191; cv=none; d=google.com; s=arc-20160816; b=MbTSn6x+xJ0dVwkRqAgGXLpuSw/OWMAOZ2NS0iNkscVnrvDLoR5RsHwadPRDdoIOtE vWdEbMmFZS6mfIDrotocDoLeL4RcdDqDNHmsI8juxHJ7z1SNbqiZbmbPSFudVGXlsNue HUmwirVSGiOU3dlLCNiW9GqsUQPUekadqOKg4I83BMoMEX79qXPe1BV+j92HuiUWvFO1 6nWniYnFai3Ye8kGoRYbDu49mGtDNGdk8PJz4ceVB76OmNF09ZK1MH5c/1trcbyAiKOP el55PZNaMx1KUfZKQirCU9fwgkBv76ZhVvDJd1VhrVJXV9y01N1FZM1loz32tGVtfC0l hrKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Vc3qEKgzq0F0rogpCDgw5fSgCPgqdDHqqfQALmzoY1A=; b=PseoIUhRlnUcZeiF7ljoWULm3Y1fzZKroNAlIuiAqOAWVUylpGzDmJpzYR72/AsTi1 v+ugNI4h9UNetxItcUq0GiRPh1D2fMd6kApqYhTfzKiHjULNnI0QdgWmxBgAMIWKkRAH ZgMhcKg3+Fs8HtP0PGfCc9xy+VKqPkJoulqZSSxLpdtw4SGhlaf0wZRG90tyKPgxXP1f 2V3veT/qDroA2/d0buPBIS5GqNUUr548J0U6JjIcLi3Gi+b6bfbwoV8Gz4a9UIYM6bYW DtlYe/oU0XJZegSA6N+taVQDYiLW76TtfcNZ/h2QvqR9+eMf9Wv0vIUx2ufWiU9VlxRi WSDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@email.cn header.s=dkim header.b=DElkg+jL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id o4-20020a5d4744000000b0020ad0960f13si3006929wrs.554.2022.05.13.17.29.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 May 2022 17:29:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@email.cn header.s=dkim header.b=DElkg+jL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 103D230730F; Fri, 13 May 2022 16:22:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1381445AbiEMOwx (ORCPT + 99 others); Fri, 13 May 2022 10:52:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45468 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234135AbiEMOwv (ORCPT ); Fri, 13 May 2022 10:52:51 -0400 X-Greylist: delayed 270 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Fri, 13 May 2022 07:52:47 PDT Received: from 88.com (m34-101.88.com [104.250.34.101]) by lindbergh.monkeyblade.net (Postfix) with SMTP id 9F0F8286; Fri, 13 May 2022 07:52:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=email.cn; s=dkim; h=Date:From:To; bh=Vc3qEKgzq0F0rogpCDgw5fSgCPgqdDHqqfQAL mzoY1A=; b=DElkg+jLYQ/Jhot+Qb7EMkmPkTU6CLKbxYD96P2P2mJ4l+oPmjSui WcTRsvi457hho75XApcWj8XADI6JAjMEkecJ71kPsuPzrcv4V7VAV2x3ua4e9DcV lGHaAorAhifv2O1JgvY+9o5g8dlHnKm373Z2CJYam3KjgyC2w3/L7o= Received: from bobwxc.top (unknown [120.242.69.152]) by v_coremail2-frontend-2 (Coremail) with SMTP id GiKnCgB3Y4sIb35iLkSNAA--.11154S2; Fri, 13 May 2022 22:45:29 +0800 (CST) Date: Fri, 13 May 2022 22:45:28 +0800 From: "Wu X.C." To: gaochao Cc: alexs@kernel.org, corbet@lwn.net, siyanteng01@gmail.com, src.res@email.cn, wanjiabing@vivo.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, song.bao.hua@hisilicon.com Subject: Re: [PATCH -next] docs/zh_CN: Add dev-tools/gdb-kernel-debugging.rst Chinese translation Message-ID: References: <20220513061035.605-1-gaochao49@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20220513061035.605-1-gaochao49@huawei.com> X-CM-TRANSID: GiKnCgB3Y4sIb35iLkSNAA--.11154S2 X-Coremail-Antispam: 1UD129KBjvJXoW3ArWrJFyUWr4fJr4ruF17ZFb_yoWfXw18pF sIgFyfGF4xJry5Xry8Gr1rCF93Xrs7uay3Kr98J34rta4UCrWIv3W7KF90gFZrX340vFy7 WrZxJr4ak34jy3DanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUqSb7Iv0xC_tr1lb4IE77IF4wAFc2x0x2IEx4CE42xK8VAvwI8I cIk0rVWrJVCq3wA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK021l84ACjcxK6xIIjx v20xvE14v26r1j6r1xM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4j6F4UM28EF7xvwVC2 z280aVAFwI0_GcCE3s1l84ACjcxK6I8E87Iv6xkF7I0E14v26r4UJVWxJr1le2I262IYc4 CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E74AGY7Cv6cx26F4U Jr1UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvEwIxGrwCF04k20xvY0x0EwIxGrwCF04 k20xvE74AGY7Cv6cx26F4UJr1UMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAF wI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCIc4 0Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AK xVWUJVW8JwCI42IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Jr0_Gr 1lIxAIcVC2z280aVCY1x0267AKxVWUJVW8JbIYCTnIWIevJa73UjIFyTuYvjxUUVyIUUUU U X-Originating-IP: [120.242.69.152] X-CM-SenderInfo: pere453f6hztlloou0/ X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 13, 2022 at 02:10:35PM +0800, gaochao wrote: > Translate dev-tools/gdb-kernel-debugging.rst into Chinese. > > Signed-off-by: gaochao > --- > .../zh_CN/dev-tools/gdb-kernel-debugging.rst | 167 ++++++++++++++++++ > .../translations/zh_CN/dev-tools/index.rst | 2 +- > 2 files changed, 168 insertions(+), 1 deletion(-) > create mode 100644 Documentation/translations/zh_CN/dev-tools/gdb-kernel-debugging.rst > > diff --git a/Documentation/translations/zh_CN/dev-tools/gdb-kernel-debugging.rst b/Documentation/translations/zh_CN/dev-tools/gdb-kernel-debugging.rst > new file mode 100644 > index 000000000000..e1293176614a > --- /dev/null > +++ b/Documentation/translations/zh_CN/dev-tools/gdb-kernel-debugging.rst > @@ -0,0 +1,167 @@ > +.. highlight:: none > + > +.. include:: ../disclaimer-zh_CN.rst > + > +:Original: Documentation/dev-tools/gdb-kernel-debugging.rst > +:Translator: 高超 gao chao > + > +通过gdb调试内核和模块 > +===================== > + > +Kgdb内核调试器、QEMU等虚拟机管理程序或基于JTAG的硬件接口,支持在运行时使用gdb > +调试Linux内核及其模块。Gdb提供了一个强大的python脚本接口,内核也提供了一套 > +辅助脚本以简化典型的内核调试步骤。本文档为如何启用和使用这些脚本提供了一个简要的教程。 > +此教程基于QEMU/KVM虚拟机,但文中示例也适用于其他gdb stub。 > + > + > +环境配置要求 > +------------ > + > +- gdb 7.2+ (推荐版本: 7.4+) 、使能python (通常发行版上都已支持) Maybe 且开启python支持 > + > +设置 > +---- > + > +- 创建一个QEMU/KVM的linux虚拟机(详情请参考 www.linux-kvm.org 和 www.qemu.org )。 > + 对于交叉开发,https://landley.net/aboriginal/bin 提供了一些镜像和工具链, > + 可以帮助搭建交叉开发环境。 > + > +- 编译内核时使能CONFIG_GDB_SCRIPTS,但关闭CONFIG_DEBUG_INFO_REDUCED。 > + 如果架构支持CONFIG_FRAME_POINTER,请保持使能。 I'am not sure... is it ok to use 使能 here? It is a very hardware-style translation. If you think 开启 is better, please %s/使能/开启/g > + > +- 在guest环境上安装该内核。如有必要,通过在内核command line中添加“nokaslr”来关闭KASLR。 > + 此外,QEMU允许通过-kernel、-append、-initrd这些命令行选项直接启动内核。 > + 但这通常仅在不依赖内核模块时才有效。有关此模式的更多详细信息,请参阅QEMU文档。 > + 在这种情况下,如果架构支持KASLR,应该在禁用CONFIG_RANDOMIZE_BASE的情况下构建内核。 > + > +- 启用QEMU/KVM的gdb stub,可以通过如下方式实现 > + > + - 在VM启动时,通过在QEMU命令行中添加“-s”参数 > + > + 或 > + > + - 在运行时通过从QEMU监视控制台发送“gdbserver” > + > +- 切换到/path/to/linux-build(内核源码编译)目录 > + > +- 启动gdb:gdb vmlinux > + > + 注意:某些发行版可能会将gdb脚本的自动加载限制在已知的安全目录中。 > + 如果gdb报告拒绝加载vmlinux-gdb.py(相关命令找不到),请将: > + > + add-auto-load-safe-path /path/to/linux-build > + > + 添加到~/.gdbinit。更多详细信息,请参阅gdb帮助信息。 > + > +- 连接到已启动的guest环境: > + > + (gdb) target remote :1234 > + > + > +使用Linux提供的gdb脚本的示例 > +---------------------------- > + > +- 加载模块(以及主内核)符号: as Yanteng said, `::` has a special meaning here, it is a syntax symbol of rst, so please check all of them. > + > + (gdb) lx-symbols > + loading vmlinux > + scanning for modules in /home/user/linux/build > + loading @0xffffffffa0020000: /home/user/linux/build/net/netfilter/xt_tcpudp.ko > + loading @0xffffffffa0016000: /home/user/linux/build/net/netfilter/xt_pkttype.ko > + loading @0xffffffffa0002000: /home/user/linux/build/net/netfilter/xt_limit.ko > + loading @0xffffffffa00ca000: /home/user/linux/build/net/packet/af_packet.ko > + loading @0xffffffffa003c000: /home/user/linux/build/fs/fuse/fuse.ko > + ... > + loading @0xffffffffa0000000: /home/user/linux/build/drivers/ata/ata_generic.ko > + > +- 对一些尚未加载的模块中的函数函数设置断点,例如: > + > + (gdb) b btrfs_init_sysfs > + Function "btrfs_init_sysfs" not defined. > + Make breakpoint pending on future shared library load? (y or [n]) y > + Breakpoint 1 (btrfs_init_sysfs) pending. > + > +- 继续执行: > + > + (gdb) c > + > +- 加载模块并且能观察到正在加载的符号以及断点命中: > + > + loading @0xffffffffa0034000: /home/user/linux/build/lib/libcrc32c.ko > + loading @0xffffffffa0050000: /home/user/linux/build/lib/lzo/lzo_compress.ko > + loading @0xffffffffa006e000: /home/user/linux/build/lib/zlib_deflate/zlib_deflate.ko > + loading @0xffffffffa01b1000: /home/user/linux/build/fs/btrfs/btrfs.ko > + > + Breakpoint 1, btrfs_init_sysfs () at /home/user/linux/fs/btrfs/sysfs.c:36 > + 36 btrfs_kset = kset_create_and_add("btrfs", NULL, fs_kobj); > + > +- 查看内核的日志缓冲区: > + > + (gdb) lx-dmesg > + [ 0.000000] Initializing cgroup subsys cpuset > + [ 0.000000] Initializing cgroup subsys cpu > + [ 0.000000] Linux version 3.8.0-rc4-dbg+ (... > + [ 0.000000] Command line: root=/dev/sda2 resume=/dev/sda1 vga=0x314 > + [ 0.000000] e820: BIOS-provided physical RAM map: > + [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable > + [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved > + .... > + > +- 查看当前task struct结构体的字段(仅x86和arm64支持) > + > + (gdb) p $lx_current().pid > + $1 = 4998 > + (gdb) p $lx_current().comm > + $2 = "modprobe\000\000\000\000\000\000\000" > + > +- 对当前或指定的CPU使用per-cpu函数: > + > + (gdb) p $lx_per_cpu("runqueues").nr_running > + $3 = 1 > + (gdb) p $lx_per_cpu("runqueues", 2).nr_running > + $4 = 0 > + > +- 使用container_of查看更多hrtimers信息: > + > + (gdb) set $next = $lx_per_cpu("hrtimer_bases").clock_base[0].active.next > + (gdb) p *$container_of($next, "struct hrtimer", "node") > + $5 = { > + node = { > + node = { > + __rb_parent_color = 18446612133355256072, > + rb_right = 0x0 , > + rb_left = 0x0 > + }, > + expires = { > + tv64 = 1835268000000 > + } > + }, > + _softexpires = { > + tv64 = 1835268000000 > + }, > + function = 0xffffffff81078232 , > + base = 0xffff88003fd0d6f0, > + state = 1, > + start_pid = 0, > + start_site = 0xffffffff81055c1f , > + start_comm = "swapper/2\000\000\000\000\000\000" > + } > + > + > +命令和辅助调试功能列表 > +---------------------- > + > +命令和辅助调试功能可能会随着时间的推移而改进,此文显示的是初始版本的部分示例: > + > + (gdb) apropos lx > + function lx_current -- Return current task > + function lx_module -- Find module by name and return the module variable > + function lx_per_cpu -- Return per-cpu variable > + function lx_task_by_pid -- Find Linux task by PID and return the task_struct variable > + function lx_thread_info -- Calculate Linux thread_info from task variable > + lx-dmesg -- Print Linux kernel log buffer > + lx-lsmod -- List currently loaded modules > + lx-symbols -- (Re-)load symbols of Linux kernel and currently loaded modules > + > +可以通过“help ”或“help function ”命令 > +获取指定命令或指定调试功能的更多详细信息。 > diff --git a/Documentation/translations/zh_CN/dev-tools/index.rst b/Documentation/translations/zh_CN/dev-tools/index.rst > index 77a8c44cdf49..02577c379007 100644 > --- a/Documentation/translations/zh_CN/dev-tools/index.rst > +++ b/Documentation/translations/zh_CN/dev-tools/index.rst > @@ -25,6 +25,7 @@ Documentation/translations/zh_CN/dev-tools/testing-overview.rst > sparse > gcov > kasan > + gdb-kernel-debugging > > Todolist: > > @@ -34,7 +35,6 @@ Todolist: > - kmemleak > - kcsan > - kfence > - - gdb-kernel-debugging > - kgdb > - kselftest > - kunit/index > -- > 2.17.1 Thanks! Wu