€•§^Œsphinx.addnodes”Œdocument”“”)”}”(Œ rawsource”Œ”Œchildren”]”(Œ translations”Œ LanguagesNode”“”)”}”(hhh]”(hŒ pending_xref”“”)”}”(hhh]”Œdocutils.nodes”ŒText”“”ŒChinese (Simplified)”…””}”Œparent”hsbaŒ attributes”}”(Œids”]”Œclasses”]”Œnames”]”Œdupnames”]”Œbackrefs”]”Œ refdomain”Œstd”Œreftype”Œdoc”Œ reftarget”Œ#/translations/zh_CN/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuŒtagname”hhh ubh)”}”(hhh]”hŒChinese (Traditional)”…””}”hh2sbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ#/translations/zh_TW/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒItalian”…””}”hhFsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ#/translations/it_IT/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒJapanese”…””}”hhZsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ#/translations/ja_JP/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒKorean”…””}”hhnsbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ#/translations/ko_KR/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubh)”}”(hhh]”hŒSpanish”…””}”hh‚sbah}”(h]”h ]”h"]”h$]”h&]”Œ refdomain”h)Œreftype”h+Œ reftarget”Œ#/translations/sp_SP/trace/debugging”Œmodname”NŒ classname”NŒ refexplicit”ˆuh1hhh ubeh}”(h]”h ]”h"]”h$]”h&]”Œcurrent_language”ŒEnglish”uh1h hhŒ _document”hŒsource”NŒline”NubhŒsection”“”)”}”(hhh]”(hŒtitle”“”)”}”(hŒUsing the tracer for debugging”h]”hŒUsing the tracer for debugging”…””}”(hh¨hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hh£hžhhŸŒ=/var/lib/git/docbuild/linux/Documentation/trace/debugging.rst”h KubhŒ paragraph”“”)”}”(hŒCopyright 2024 Google LLC.”h]”hŒCopyright 2024 Google LLC.”…””}”(hh¹hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khh£hžhubhŒ field_list”“”)”}”(hhh]”(hŒfield”“”)”}”(hhh]”(hŒ field_name”“”)”}”(hŒAuthor”h]”hŒAuthor”…””}”(hhÓhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÑhhÎhŸh¶h KubhŒ field_body”“”)”}”(hŒ$Steven Rostedt ”h]”h¸)”}”(hhåh]”(hŒSteven Rostedt <”…””}”(hhçhžhhŸNh NubhŒ reference”“”)”}”(hŒrostedt@goodmis.org”h]”hŒrostedt@goodmis.org”…””}”(hhðhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”Œrefuri”Œmailto:rostedt@goodmis.org”uh1hîhhçubhŒ>”…””}”(hhçhžhhŸNh Nubeh}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khhãubah}”(h]”h ]”h"]”h$]”h&]”uh1háhhÎubeh}”(h]”h ]”h"]”h$]”h&]”uh1hÌhŸh¶h KhhÉhžhubhÍ)”}”(hhh]”(hÒ)”}”(hŒLicense”h]”hŒLicense”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1hÑhjhŸh¶h Kubhâ)”}”(hŒQThe GNU Free Documentation License, Version 1.2 (dual licensed under the GPL v2) ”h]”h¸)”}”(hŒPThe GNU Free Documentation License, Version 1.2 (dual licensed under the GPL v2)”h]”hŒPThe GNU Free Documentation License, Version 1.2 (dual licensed under the GPL v2)”…””}”(hj+hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khj'ubah}”(h]”h ]”h"]”h$]”h&]”uh1háhjubeh}”(h]”h ]”h"]”h$]”h&]”uh1hÌhŸh¶h KhhÉhžhubeh}”(h]”h ]”h"]”h$]”h&]”uh1hÇhh£hžhhŸh¶h KubhŒ bullet_list”“”)”}”(hhh]”hŒ list_item”“”)”}”(hŒWritten for: 6.12 ”h]”h¸)”}”(hŒWritten for: 6.12”h]”hŒWritten for: 6.12”…””}”(hjVhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K hjRubah}”(h]”h ]”h"]”h$]”h&]”uh1jPhjMhžhhŸh¶h Nubah}”(h]”h ]”h"]”h$]”h&]”Œbullet”Œ-”uh1jKhŸh¶h K hh£hžhubh¢)”}”(hhh]”(h§)”}”(hŒ Introduction”h]”hŒ Introduction”…””}”(hjuhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hjrhžhhŸh¶h Kubh¸)”}”(hŒ The tracing infrastructure can be very useful for debugging the Linux kernel. This document is a place to add various methods of using the tracer for debugging.”h]”hŒ The tracing infrastructure can be very useful for debugging the Linux kernel. This document is a place to add various methods of using the tracer for debugging.”…””}”(hjƒhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khjrhžhubh¸)”}”(hŒ:First, make sure that the tracefs file system is mounted::”h]”hŒ9First, make sure that the tracefs file system is mounted:”…””}”(hj‘hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KhjrhžhubhŒ literal_block”“”)”}”(hŒ3$ sudo mount -t tracefs tracefs /sys/kernel/tracing”h]”hŒ3$ sudo mount -t tracefs tracefs /sys/kernel/tracing”…””}”hj¡sbah}”(h]”h ]”h"]”h$]”h&]”Œ xml:space”Œpreserve”uh1jŸhŸh¶h Khjrhžhubeh}”(h]”Œ introduction”ah ]”h"]”Œ introduction”ah$]”h&]”uh1h¡hh£hžhhŸh¶h Kubh¢)”}”(hhh]”(h§)”}”(hŒUsing trace_printk()”h]”hŒUsing trace_printk()”…””}”(hj¼hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hj¹hžhhŸh¶h Kubh¸)”}”(hXktrace_printk() is a very lightweight utility that can be used in any context inside the kernel, with the exception of "noinstr" sections. It can be used in normal, softirq, interrupt and even NMI context. The trace data is written to the tracing ring buffer in a lockless way. To make it even lighter weight, when possible, it will only record the pointer to the format string, and save the raw arguments into the buffer. The format and the arguments will be post processed when the ring buffer is read. This way the trace_printk() format conversions are not done during the hot path, where the trace is being recorded.”h]”hXotrace_printk() is a very lightweight utility that can be used in any context inside the kernel, with the exception of “noinstr†sections. It can be used in normal, softirq, interrupt and even NMI context. The trace data is written to the tracing ring buffer in a lockless way. To make it even lighter weight, when possible, it will only record the pointer to the format string, and save the raw arguments into the buffer. The format and the arguments will be post processed when the ring buffer is read. This way the trace_printk() format conversions are not done during the hot path, where the trace is being recorded.”…””}”(hjÊhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khj¹hžhubh¸)”}”(hŒòtrace_printk() is meant only for debugging, and should never be added into a subsystem of the kernel. If you need debugging traces, add trace events instead. If a trace_printk() is found in the kernel, the following will appear in the dmesg::”h]”hŒñtrace_printk() is meant only for debugging, and should never be added into a subsystem of the kernel. If you need debugging traces, add trace events instead. If a trace_printk() is found in the kernel, the following will appear in the dmesg:”…””}”(hjØhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K%hj¹hžhubj )”}”(hXþ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** **********************************************************”h]”hXþ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** **********************************************************”…””}”hjæsbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h K*hj¹hžhubeh}”(h]”Œusing-trace-printk”ah ]”h"]”Œusing trace_printk()”ah$]”h&]”uh1h¡hh£hžhhŸh¶h Kubh¢)”}”(hhh]”(h§)”}”(hŒDebugging kernel crashes”h]”hŒDebugging kernel crashes”…””}”(hjÿhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hjühžhhŸh¶h K9ubh¸)”}”(hXThere is various methods of acquiring the state of the system when a kernel crash occurs. This could be from the oops message in printk, or one could use kexec/kdump. But these just show what happened at the time of the crash. It can be very useful in knowing what happened up to the point of the crash. The tracing ring buffer, by default, is a circular buffer than will overwrite older events with newer ones. When a crash happens, the content of the ring buffer will be all the events that lead up to the crash.”h]”hXThere is various methods of acquiring the state of the system when a kernel crash occurs. This could be from the oops message in printk, or one could use kexec/kdump. But these just show what happened at the time of the crash. It can be very useful in knowing what happened up to the point of the crash. The tracing ring buffer, by default, is a circular buffer than will overwrite older events with newer ones. When a crash happens, the content of the ring buffer will be all the events that lead up to the crash.”…””}”(hj hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K:hjühžhubh¸)”}”(hXãThere are several kernel command line parameters that can be used to help in this. The first is "ftrace_dump_on_oops". This will dump the tracing ring buffer when a oops occurs to the console. This can be useful if the console is being logged somewhere. If a serial console is used, it may be prudent to make sure the ring buffer is relatively small, otherwise the dumping of the ring buffer may take several minutes to hours to finish. Here's an example of the kernel command line::”h]”hXèThere are several kernel command line parameters that can be used to help in this. The first is “ftrace_dump_on_oopsâ€. This will dump the tracing ring buffer when a oops occurs to the console. This can be useful if the console is being logged somewhere. If a serial console is used, it may be prudent to make sure the ring buffer is relatively small, otherwise the dumping of the ring buffer may take several minutes to hours to finish. Here’s an example of the kernel command line:”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KBhjühžhubj )”}”(hŒ&ftrace_dump_on_oops trace_buf_size=50K”h]”hŒ&ftrace_dump_on_oops trace_buf_size=50K”…””}”hj)sbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h KJhjühžhubh¸)”}”(hXNote, the tracing buffer is made up of per CPU buffers where each of these buffers is broken up into sub-buffers that are by default PAGE_SIZE. The above trace_buf_size option above sets each of the per CPU buffers to 50K, so, on a machine with 8 CPUs, that's actually 400K total.”h]”hXNote, the tracing buffer is made up of per CPU buffers where each of these buffers is broken up into sub-buffers that are by default PAGE_SIZE. The above trace_buf_size option above sets each of the per CPU buffers to 50K, so, on a machine with 8 CPUs, that’s actually 400K total.”…””}”(hj7hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KLhjühžhubeh}”(h]”Œdebugging-kernel-crashes”ah ]”h"]”Œdebugging kernel crashes”ah$]”h&]”uh1h¡hh£hžhhŸh¶h K9ubh¢)”}”(hhh]”(h§)”}”(hŒPersistent buffers across boots”h]”hŒPersistent buffers across boots”…””}”(hjPhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hjMhžhhŸh¶h KRubh¸)”}”(hX3If the system memory allows it, the tracing ring buffer can be specified at a specific location in memory. If the location is the same across boots and the memory is not modified, the tracing buffer can be retrieved from the following boot. There's two ways to reserve memory for the use of the ring buffer.”h]”hX5If the system memory allows it, the tracing ring buffer can be specified at a specific location in memory. If the location is the same across boots and the memory is not modified, the tracing buffer can be retrieved from the following boot. There’s two ways to reserve memory for the use of the ring buffer.”…””}”(hj^hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KShjMhžhubh¸)”}”(hXDThe more reliable way (on x86) is to reserve memory with the "memmap" kernel command line option and then use that memory for the trace_instance. This requires a bit of knowledge of the physical memory layout of the system. The advantage of using this method, is that the memory for the ring buffer will always be the same::”h]”hXGThe more reliable way (on x86) is to reserve memory with the “memmap†kernel command line option and then use that memory for the trace_instance. This requires a bit of knowledge of the physical memory layout of the system. The advantage of using this method, is that the memory for the ring buffer will always be the same:”…””}”(hjlhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KYhjMhžhubj )”}”(hŒ?memmap==12M$0x284500000 trace_instance=boot_map@0x284500000:12M”h]”hŒ?memmap==12M$0x284500000 trace_instance=boot_map@0x284500000:12M”…””}”hjzsbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h K_hjMhžhubh¸)”}”(hXThe memmap above reserves 12 megabytes of memory at the physical memory location 0x284500000. Then the trace_instance option will create a trace instance "boot_map" at that same location with the same amount of memory reserved. As the ring buffer is broke up into per CPU buffers, the 12 megabytes will be broken up evenly between those CPUs. If you have 8 CPUs, each per CPU ring buffer will be 1.5 megabytes in size. Note, that also includes meta data, so the amount of memory actually used by the ring buffer will be slightly smaller.”h]”hXThe memmap above reserves 12 megabytes of memory at the physical memory location 0x284500000. Then the trace_instance option will create a trace instance “boot_map†at that same location with the same amount of memory reserved. As the ring buffer is broke up into per CPU buffers, the 12 megabytes will be broken up evenly between those CPUs. If you have 8 CPUs, each per CPU ring buffer will be 1.5 megabytes in size. Note, that also includes meta data, so the amount of memory actually used by the ring buffer will be slightly smaller.”…””}”(hjˆhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KahjMhžhubh¸)”}”(hŒuAnother more generic but less robust way to allocate a ring buffer mapping at boot is with the "reserve_mem" option::”h]”hŒxAnother more generic but less robust way to allocate a ring buffer mapping at boot is with the “reserve_mem†option:”…””}”(hj–hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KjhjMhžhubj )”}”(hŒ8reserve_mem=12M:4096:trace trace_instance=boot_map@trace”h]”hŒ8reserve_mem=12M:4096:trace trace_instance=boot_map@trace”…””}”hj¤sbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h KmhjMhžhubh¸)”}”(hŒÃThe reserve_mem option above will find 12 megabytes that are available at boot up, and align it by 4096 bytes. It will label this memory as "trace" that can be used by later command line options.”h]”hŒÇThe reserve_mem option above will find 12 megabytes that are available at boot up, and align it by 4096 bytes. It will label this memory as “trace†that can be used by later command line options.”…””}”(hj²hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KohjMhžhubh¸)”}”(hXrThe trace_instance option creates a "boot_map" instance and will use the memory reserved by reserve_mem that was labeled as "trace". This method is more generic but may not be as reliable. Due to KASLR, the memory reserved by reserve_mem may not be located at the same location. If this happens, then the ring buffer will not be from the previous boot and will be reset.”h]”hXzThe trace_instance option creates a “boot_map†instance and will use the memory reserved by reserve_mem that was labeled as “traceâ€. This method is more generic but may not be as reliable. Due to KASLR, the memory reserved by reserve_mem may not be located at the same location. If this happens, then the ring buffer will not be from the previous boot and will be reset.”…””}”(hjÀhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KshjMhžhubh¸)”}”(hXSometimes, by using a larger alignment, it can keep KASLR from moving things around in such a way that it will move the location of the reserve_mem. By using a larger alignment, you may find better that the buffer is more consistent to where it is placed::”h]”hŒÿSometimes, by using a larger alignment, it can keep KASLR from moving things around in such a way that it will move the location of the reserve_mem. By using a larger alignment, you may find better that the buffer is more consistent to where it is placed:”…””}”(hjÎhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h KyhjMhžhubj )”}”(hŒ=reserve_mem=12M:0x2000000:trace trace_instance=boot_map@trace”h]”hŒ=reserve_mem=12M:0x2000000:trace trace_instance=boot_map@trace”…””}”hjÜsbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h K~hjMhžhubh¸)”}”(hXFOn boot up, the memory reserved for the ring buffer is validated. It will go through a series of tests to make sure that the ring buffer contains valid data. If it is, it will then set it up to be available to read from the instance. If it fails any of the tests, it will clear the entire ring buffer and initialize it as new.”h]”hXFOn boot up, the memory reserved for the ring buffer is validated. It will go through a series of tests to make sure that the ring buffer contains valid data. If it is, it will then set it up to be available to read from the instance. If it fails any of the tests, it will clear the entire ring buffer and initialize it as new.”…””}”(hjêhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K€hjMhžhubh¸)”}”(hŒüThe layout of this mapped memory may not be consistent from kernel to kernel, so only the same kernel is guaranteed to work if the mapping is preserved. Switching to a different kernel version may find a different layout and mark the buffer as invalid.”h]”hŒüThe layout of this mapped memory may not be consistent from kernel to kernel, so only the same kernel is guaranteed to work if the mapping is preserved. Switching to a different kernel version may find a different layout and mark the buffer as invalid.”…””}”(hjøhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K†hjMhžhubh¸)”}”(hŒONB: Both the mapped address and size must be page aligned for the architecture.”h]”hŒONB: Both the mapped address and size must be page aligned for the architecture.”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K‹hjMhžhubeh}”(h]”Œpersistent-buffers-across-boots”ah ]”h"]”Œpersistent buffers across boots”ah$]”h&]”uh1h¡hh£hžhhŸh¶h KRubh¢)”}”(hhh]”(h§)”}”(hŒ)Using trace_printk() in the boot instance”h]”hŒ)Using trace_printk() in the boot instance”…””}”(hjhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h¦hjhžhhŸh¶h KŽubh¸)”}”(hXŽBy default, the content of trace_printk() goes into the top level tracing instance. But this instance is never preserved across boots. To have the trace_printk() content, and some other internal tracing go to the preserved buffer (like dump stacks), either set the instance to be the trace_printk() destination from the kernel command line, or set it after boot up via the trace_printk_dest option.”h]”hXŽBy default, the content of trace_printk() goes into the top level tracing instance. But this instance is never preserved across boots. To have the trace_printk() content, and some other internal tracing go to the preserved buffer (like dump stacks), either set the instance to be the trace_printk() destination from the kernel command line, or set it after boot up via the trace_printk_dest option.”…””}”(hj-hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Khjhžhubh¸)”}”(hŒAfter boot up::”h]”hŒAfter boot up:”…””}”(hj;hžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h K–hjhžhubj )”}”(hŒIecho 1 > /sys/kernel/tracing/instances/boot_map/options/trace_printk_dest”h]”hŒIecho 1 > /sys/kernel/tracing/instances/boot_map/options/trace_printk_dest”…””}”hjIsbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h K˜hjhžhubh¸)”}”(hŒFrom the kernel command line::”h]”hŒFrom the kernel command line:”…””}”(hjWhžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Kšhjhžhubj )”}”(hŒMreserve_mem=12M:4096:trace trace_instance=boot_map^traceprintk^traceoff@trace”h]”hŒMreserve_mem=12M:4096:trace trace_instance=boot_map^traceprintk^traceoff@trace”…””}”hjesbah}”(h]”h ]”h"]”h$]”h&]”j¯j°uh1jŸhŸh¶h Kœhjhžhubh¸)”}”(hXIf setting it from the kernel command line, it is recommended to also disable tracing with the "traceoff" flag, and enable tracing after boot up. Otherwise the trace from the most recent boot will be mixed with the trace from the previous boot, and may make it confusing to read.”h]”hXIf setting it from the kernel command line, it is recommended to also disable tracing with the “traceoff†flag, and enable tracing after boot up. Otherwise the trace from the most recent boot will be mixed with the trace from the previous boot, and may make it confusing to read.”…””}”(hjshžhhŸNh Nubah}”(h]”h ]”h"]”h$]”h&]”uh1h·hŸh¶h Kžhjhžhubeh}”(h]”Œ'using-trace-printk-in-the-boot-instance”ah ]”h"]”Œ)using trace_printk() in the boot instance”ah$]”h&]”uh1h¡hh£hžhhŸh¶h KŽubeh}”(h]”Œusing-the-tracer-for-debugging”ah ]”h"]”Œusing the tracer for debugging”ah$]”h&]”uh1h¡hhhžhhŸh¶h Kubeh}”(h]”h ]”h"]”h$]”h&]”Œsource”h¶uh1hŒcurrent_source”NŒ current_line”NŒsettings”Œdocutils.frontend”ŒValues”“”)”}”(h¦NŒ generator”NŒ datestamp”NŒ source_link”NŒ source_url”NŒ toc_backlinks”Œentry”Œfootnote_backlinks”KŒ sectnum_xform”KŒstrip_comments”NŒstrip_elements_with_classes”NŒ strip_classes”NŒ report_level”KŒ halt_level”KŒexit_status_level”KŒdebug”NŒwarning_stream”NŒ traceback”ˆŒinput_encoding”Œ utf-8-sig”Œinput_encoding_error_handler”Œstrict”Œoutput_encoding”Œutf-8”Œoutput_encoding_error_handler”j´Œerror_encoding”Œutf-8”Œerror_encoding_error_handler”Œbackslashreplace”Œ language_code”Œen”Œrecord_dependencies”NŒconfig”NŒ id_prefix”hŒauto_id_prefix”Œid”Œ dump_settings”NŒdump_internals”NŒdump_transforms”NŒdump_pseudo_xml”NŒexpose_internals”NŒstrict_visitor”NŒ_disable_config”NŒ_source”h¶Œ _destination”NŒ _config_files”]”Œ7/var/lib/git/docbuild/linux/Documentation/docutils.conf”aŒfile_insertion_enabled”ˆŒ raw_enabled”KŒline_length_limit”M'Œpep_references”NŒ pep_base_url”Œhttps://peps.python.org/”Œpep_file_url_template”Œpep-%04d”Œrfc_references”NŒ rfc_base_url”Œ&https://datatracker.ietf.org/doc/html/”Œ tab_width”KŒtrim_footnote_reference_space”‰Œsyntax_highlight”Œlong”Œ smart_quotes”ˆŒsmartquotes_locales”]”Œcharacter_level_inline_markup”‰Œdoctitle_xform”‰Œ docinfo_xform”KŒsectsubtitle_xform”‰Œ image_loading”Œlink”Œembed_stylesheet”‰Œcloak_email_addresses”ˆŒsection_self_link”‰Œenv”NubŒreporter”NŒindirect_targets”]”Œsubstitution_defs”}”Œsubstitution_names”}”Œrefnames”}”Œrefids”}”Œnameids”}”(jŽj‹j¶j³jùjöjJjGjjj†jƒuŒ nametypes”}”(jމj¶‰jù‰jJ‰j‰j†‰uh}”(j‹h£j³jrjöj¹jGjüjjMjƒjuŒ footnote_refs”}”Œ citation_refs”}”Œ autofootnotes”]”Œautofootnote_refs”]”Œsymbol_footnotes”]”Œsymbol_footnote_refs”]”Œ footnotes”]”Œ citations”]”Œautofootnote_start”KŒsymbol_footnote_start”KŒ id_counter”Œ collections”ŒCounter”“”}”…”R”Œparse_messages”]”Œtransform_messages”]”Œ transformer”NŒ include_log”]”Œ decoration”Nhžhub.