Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp1539668pxa; Fri, 28 Aug 2020 15:58:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiHTHD3NshDd2erc6Rf49RD7M95RY5AKISogu2wEFBZyRxfX/dAlfyZwU7LrfLWzZVrxw5 X-Received: by 2002:a17:906:a293:: with SMTP id i19mr1023291ejz.523.1598655512459; Fri, 28 Aug 2020 15:58:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598655512; cv=none; d=google.com; s=arc-20160816; b=jxFek97B5HWsGaaCwrZtJT1/+Dg/TmfgvwkBQ9TY1KkegNSQJB0txXf0k16W+XRFWb UlcuAKcbW/z0iSqB6Kf1r74SccBtIzF/Tl2C/j+Kgk6BwBsIEPeQk1KBMvt4+EW5BwaY kcOVNg+2OoUaq9gRwU43ttzDuqixpvhLCUUjEUBds1TYDId9oXs1XhsExrESffNnlZqZ JWzkPBZIlCZJyn38iwueSCBauD4fH64pYi8womQozRFp53rlVrFzgeOp39WtUG/uAien FPr/tu4WQJOnqcuGLX5RGk/8Qs09vEC971YjRm7lQalXaWiFNsC18fNSKAnEiocYf9WW cjZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=zRZIUa8hohKCbfpbsUmZUkG7vP4NigVJLn+gYuOdMas=; b=Jtk9sSwU7T8q2XC+zbTmAMSibidn7xtm+H01mlpkulextQe4Pb279p5FZuV5TpSYbu PNfKUEi6nuqSZsd3XOYHqysdTB6aTUbxZXs3Ctb/DDZ9NBGyJSlMDnJU7nc0XxNPg9/N DeIM7VInbgFf4ZvoNfzV1wAh4UqgZlR9LFJxDIf0u5y0Zn3dGcb+8Hisegdh38cWq8LA 0x4Up3enbsHJiwTLbtpLISRDcyMNjsYdN4q0udRAReRkm5Ef7Vb88rW77gN1ni8/t5ID WKQQfC/mLl47JbdvnoRqPVduMgSe+GCiKI4TSXUoHb3w4ToM9/mly87oOdCm/BdRjj6V Va2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n23si665904eja.442.2020.08.28.15.58.09; Fri, 28 Aug 2020 15:58:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726873AbgH1Wzl (ORCPT + 99 others); Fri, 28 Aug 2020 18:55:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:33870 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726536AbgH1Wzl (ORCPT ); Fri, 28 Aug 2020 18:55:41 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8511E206EB; Fri, 28 Aug 2020 22:55:39 +0000 (UTC) Date: Fri, 28 Aug 2020 18:55:38 -0400 From: Steven Rostedt To: Wen Gong Cc: linux-kernel@vger.kernel.org, Ingo Molnar , Andrew Morton , Alexei Starovoitov , linux-kernel-owner@vger.kernel.org, ath10k@lists.infradead.org, ath11k@lists.infradead.org, abhishekpandit@google.com, briannorris@google.com, drinkcat@google.com, tientzu@google.com Subject: Re: [for-next][PATCH 2/2] tracing: Use temp buffer when filtering events Message-ID: <20200828185538.1761f93d@oasis.local.home> In-Reply-To: <20200828185450.101ebd09@oasis.local.home> References: <20160504135202.422290539@goodmis.org> <20160504135241.308454993@goodmis.org> <20200828184955.6de9b54e@oasis.local.home> <20200828185450.101ebd09@oasis.local.home> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 28 Aug 2020 18:54:50 -0400 Steven Rostedt wrote: > On Fri, 28 Aug 2020 18:49:55 -0400 > Steven Rostedt wrote: > > > On Fri, 28 Aug 2020 15:53:06 +0800 > > Wen Gong wrote: > > > > > this patch commit id is : 0fc1b09ff1ff404ddf753f5ffa5cd0adc8fdcdc9 which > > > has upstream. > > > > > > how much size is the per cpu buffer? > > > seems it is initilized in trace_buffered_event_enable, > > > it is only 1 page size as below: > > > void trace_buffered_event_enable(void) > > > { > > > ... > > > for_each_tracing_cpu(cpu) { > > > page = alloc_pages_node(cpu_to_node(cpu), > > > GFP_KERNEL | __GFP_NORETRY, 0); > > > If the size of buffer to trace is more than 1 page, such as 46680, then > > > it trigger kernel crash/panic in my case while run trace-cmd. > > > After debugging, the trace_file->flags in > > > trace_event_buffer_lock_reserve is 0x40b while run trace-cmd, and it is > > > 0x403 while collecting ftrace log. > > > > > > Is it have any operation to disable this patch dynamically? > > > > It shouldn't be disabled, this is a bug that needs to be fixed. > > > > Also, if an event is more than a page, it wont be saved in the ftrace > > ring buffer, as events are limited by page size minus the headers. > > > > Untested (not even compiled, as I'm now on PTO) but does this patch > work for you? > > -- Steve > > diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c > index f40d850ebabc..3a9b4422e7fc 100644 > --- a/kernel/trace/trace.c > +++ b/kernel/trace/trace.c > @@ -2598,7 +2598,7 @@ trace_event_buffer_lock_reserve(struct trace_buffer **current_rb, > (entry = this_cpu_read(trace_buffered_event))) { > /* Try to use the per cpu buffer first */ > val = this_cpu_inc_return(trace_buffered_event_cnt); > - if (val == 1) { > + if (val == 1 || (len > (PAGE_SIZE - 8))) { That was suppose to be: if (val == 1 && (len < (PAGE_SIZE - 8))) { -- Steve > trace_event_setup(entry, type, flags, pc); > entry->array[0] = len; > return entry;