1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
|
################################################
Using GCC's code coverage tool, gcov, with udev
################################################
For more information on using gcov please see:
http://gcc.gnu.org/onlinedocs/gcc/Gcov.html
With that said, here is how to get code coverage analysis for udev files.
Note that this was developed with udev version 024.
- Make sure you've installed udev and that it is working properly.
If you are having problems, refer to the README and HOWTO-udev_for_dev
documents in udev tarball. I've also compiled a udev_for_dev
toubleshooting document for Red Hat which can be found in:
docs/rh_udev_for_dev.txt
- execute make_gcov.sh from udev top level directory
./make_gcov.sh
This will compile udev with gcov support. Basically make_gcov.sh will
run make but override the CFLAGS. It strips any optimization from
CFLAGS in order for gcov to get correct code coverage analysis. It will
also add the -fprofile-arcs and -ftest-coverage options which are the
necessary flags needed to use gcov.
make_gcov.sh will assume the same default parameters as the regular
make but also accepts the same parameters. For example if you want
to get code coverage analysis for udev with the DEBUG flag turned
on, you would just execute:
./make_gcov.sh DEBUG=true
There is one exception, gcov will not work with klibc as it does not
compile cleanly with the -fprofile-arcs and -ftest-coverage flags.
With this said it is pretty much useless to set the KERNEL_DIR flag
when using make_gcov.sh as well.
Don't be alarmed if you look into your udev directory and see that it
has been polluted with a bunch of *.bb, *.bbg, *.da, and *.gcov files.
gcov creates and uses these files to extract the code coverage info.
- After running make_gcov.sh you need to install udev again. So basically,
su to root
make install
- Then execute some udev tasks. You can run some udev tests, reboot, or
do anything your little udev heart desires. Once you are satisfied, you
can now see how much udev code was covered. I personally recommend just
running test/udev-test.pl for starters.
- To get the udev code coverage analysis, execute run_gcov.sh from udev top
level directory. You need to be root to do this.
su to root
./run_gcov.sh
- This creates udev_gcov.txt in the udev top level directory which holds all
the code coverage information. To see an example of the code coverage info
after executing the udev-test.pl test, please see:
http://developer.osdl.org/ogasawara/gcov_for_udev/udev_gcov.txt
- Also, after having executed gcov on udev (ie executing run_gcov.sh) a
*.gcov file is created for every file which contained code that was
used. Looking at the *.gcov files, one will see what lines of code
were hit, and what lines were missed. For, example if code in udev-add.c
were executed, gcov then created a file called udev-add.c.gcov. And a
portion of udev-add.c.gov might look like:
static int get_major_minor(struct sysfs_class_device *class_dev, struct udevice *udev)
95 {
95 struct sysfs_attribute *attr = NULL;
95 attr = sysfs_get_classdev_attr(class_dev, "dev");
95 if (attr == NULL)
###### goto error;
dbg("dev='%s'", attr->value);
95 if (sscanf(attr->value, "%u:%u", &udev->major, &udev->minor) != 2)
###### goto error;
dbg("found major=%d, minor=%d", udev->major, udev->minor);
95 return 0;
error:
###### return -1;
}
Any line of code that is preceded by a "######" implies that the code
was never hit during execution.
- Once you are done with using gcov for udev and want to return to your
normal use of udev. Simply,
./make_gcov.sh clean
This will clean out all the *.bb, *.bbg, *.da, *.gcov files produced by gcov.
It will also run a regular make clean on your udev directory. Then just run
a regular make and make install and you are back to normal:
make
su to root
make isntall
|