Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp163103lqp; Tue, 11 Jun 2024 19:18:38 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUpTFeVxWRtsMQuAXsH4SukkJPGBXryUqoj9N9yi6Tn56X5lDkYU8hApJoEkPMDanGYtmJgWJ4WDXmTq7Hq4KUZcKA+1wkefMR31+Innw== X-Google-Smtp-Source: AGHT+IGZezpwXhYdsLp+cHDwVkkfnxvpByz9Vd8leHDsGfcRJyzsaw1E2fNfJQQ/hSQK2fGZDWEI X-Received: by 2002:a05:620a:2914:b0:795:5b40:25ff with SMTP id af79cd13be357-797f60a777amr60009485a.31.1718158718144; Tue, 11 Jun 2024 19:18:38 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718158718; cv=pass; d=google.com; s=arc-20160816; b=ZATSn2luN5VB6QSBnML9nm9GiznPDMhvReyVS9FRC3AzowhWYypG5xp4cY67k0C6+Q pmVgr9xZ7lthMIMs3TqFELLhXt++wWEH6Aem3H/7qsH5dg7qILEfccSY4gGhkJUYMLrJ nEsEyrBndqR2Qkd+8x1ebP5clqb1i7yjajTE+0Yzh+0KSVQMBCg0+2mNDmp2yFoPUmG6 jm1J4fol4fWklctNUvf0qtVOgMmV8UTEJ2HMW5UKh4jNgHllfXaxL3I202Jv5Mo8BBk/ 5F1Ss32KEFVVoNw0HK7fDfsximN0WOYBpfdTd7HsNqmanZH+8cwNDtcm+5rCmuTDJnQO a/rg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:subject:cc:to:from:date:user-agent:message-id; bh=ThqnLmRpsQGN4xu6Y6odrqca3Sbrpfi9MpT8PdxlZgU=; fh=APLEwzDCuZjAyYd8ZCw4YQ4qXWbcLRWeojtUCuRmRf0=; b=dxG0tOh72mMD27LhKDxVpW2QfyLOYf1hUpzqYA/zOmZs1EGUWpYoJUam1skO7K+BHj 3QRKOuOZvD7+54jD0kZ3453kK/IhNFoJ1YSHyi8rasv0DqdKZMZiR8WhhJk3QSqOt0kU qDNGQBRYvwmVVRnCAnX6vKEaSStDlkvHbJNYfYm3BHBzDZfSXhq8aR4co1i9CKK4UgAw xh2aVfQS9wPz/4SckUQNT1X0tYYdz3wYP7UGIILhHStuBH+YT6icE+5cyNtDcpkMOIv/ 1GmjTRxHEcOGjVonRkDKYWjFGnpBn6tEccGDaEXwUL1dfcnMF3nYFO46kiGNarD2s848 Od+g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-210807-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210807-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id af79cd13be357-7955b8759e9si797647685a.9.2024.06.11.19.18.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jun 2024 19:18:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-210807-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-210807-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-210807-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 42DD21C2276C for ; Wed, 12 Jun 2024 02:18:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 86DD33A1CC; Wed, 12 Jun 2024 02:17:09 +0000 (UTC) Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 81AF1134BC; Wed, 12 Jun 2024 02:17:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718158626; cv=none; b=e6dexEHMc1KJixuyNddVQUTZ50sQXRPsIk6n092/gB1qDAheXltlRfrjDIDpb5CircKQh+Hp0hfcoKe4Ga4ji4ffxCfCUbLGM20NcQdIikBtstbyMh8ZdHy6iTLpMxDR6ZI0K0k0L+TzjzY3O+4RlMOfXkshVSpDfBY5vW/nMZM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718158626; c=relaxed/simple; bh=GVvcmn3027Fc6rCsvulA82p+nR13kJETnki+fNMXM9U=; h=Message-ID:Date:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=lIBX07a0HumFSYOwtjeKWotUQCcmf/plrrRSATxQprUscpELTc62cWx6Q8GmAW48xtZqG2hqXfckHeHu1froFEcDhxPpawtBADdF9YbKERI/xlnUygrBjeV3fRlC9ZSn/Mm0NaMdKLvKyjRAHeXW+MXiFbzDgY87/oYzWaGcF+I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5ABB5C4AF61; Wed, 12 Jun 2024 02:17:06 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.97) (envelope-from ) id 1sHDYB-00000001XMf-29YO; Tue, 11 Jun 2024 22:17:23 -0400 Message-ID: <20240612021723.374491025@goodmis.org> User-Agent: quilt/0.68 Date: Tue, 11 Jun 2024 22:16:50 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , Vincent Donnefort , Joel Fernandes , Daniel Bristot de Oliveira , Ingo Molnar , Peter Zijlstra , suleiman@google.com, Thomas Gleixner , Vineeth Pillai , Youssef Esmat , Beau Belgrave , Alexander Graf , Baoquan He , Borislav Petkov , "Paul E. McKenney" , David Howells , Mike Rapoport , Dave Hansen , Tony Luck , Guenter Roeck , Ross Zwisler , Kees Cook , linux-mm@kvack.org Subject: [PATCH v5 08/13] tracing: Add option to use memmapped memory for trace boot instance References: <20240612021642.941740855@goodmis.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 From: "Steven Rostedt (Google)" Add an option to the trace_instance kernel command line parameter that allows it to use the reserved memory from memmap boot parameter. memmap=12M$0x284500000 trace_instance=boot_mapped@0x284500000:12M The above will reserves 12 megs at the physical address 0x284500000. The second parameter will create a "boot_mapped" instance and use the memory reserved as the memory for the ring buffer. That will create an instance called "boot_mapped": /sys/kernel/tracing/instances/boot_mapped Note, because the ring buffer is using a defined memory ranged, it will act just like a memory mapped ring buffer. It will not have a snapshot buffer, as it can't swap out the buffer. The snapshot files as well as any tracers that uses a snapshot will not be present in the boot_mapped instance. Cc: linux-mm@kvack.org Signed-off-by: Steven Rostedt (Google) --- .../admin-guide/kernel-parameters.txt | 9 +++ kernel/trace/trace.c | 75 +++++++++++++++++-- 2 files changed, 78 insertions(+), 6 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index b600df82669d..ff26b6094e79 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -6754,6 +6754,15 @@ the same thing would happen if it was left off). The irq_handler_entry event, and all events under the "initcall" system. + If memory has been reserved (see memmap for x86), the instance + can use that memory: + + memmap=12M$0x284500000 trace_instance=boot_map@0x284500000:12M + + The above will create a "boot_map" instance that uses the physical + memory at 0x284500000 that is 12Megs. The per CPU buffers of that + instance will be split up accordingly. + trace_options=[option-list] [FTRACE] Enable or disable tracer options at boot. The option-list is a comma delimited list of options diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 622fe670949d..dfde26aa3211 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -9504,6 +9504,31 @@ static int instance_mkdir(const char *name) return ret; } +static u64 map_pages(u64 start, u64 size) +{ + struct page **pages; + phys_addr_t page_start; + unsigned int page_count; + unsigned int i; + void *vaddr; + + page_count = DIV_ROUND_UP(size, PAGE_SIZE); + + page_start = start; + pages = kmalloc_array(page_count, sizeof(struct page *), GFP_KERNEL); + if (!pages) + return 0; + + for (i = 0; i < page_count; i++) { + phys_addr_t addr = page_start + i * PAGE_SIZE; + pages[i] = pfn_to_page(addr >> PAGE_SHIFT); + } + vaddr = vmap(pages, page_count, VM_MAP, PAGE_KERNEL); + kfree(pages); + + return (u64)(unsigned long)vaddr; +} + /** * trace_array_get_by_name - Create/Lookup a trace array, given its name. * @name: The name of the trace array to be looked up/created. @@ -10350,6 +10375,7 @@ __init static void enable_instances(void) { struct trace_array *tr; char *curr_str; + char *name; char *str; char *tok; @@ -10358,19 +10384,56 @@ __init static void enable_instances(void) str = boot_instance_info; while ((curr_str = strsep(&str, "\t"))) { + unsigned long start = 0; + unsigned long size = 0; + unsigned long addr = 0; tok = strsep(&curr_str, ","); + name = strsep(&tok, "@"); + if (tok) { + start = memparse(tok, &tok); + if (!start) { + pr_warn("Tracing: Invalid boot instance address for %s\n", + name); + continue; + } + } - if (IS_ENABLED(CONFIG_TRACER_MAX_TRACE)) - do_allocate_snapshot(tok); + if (start) { + if (*tok != ':') { + pr_warn("Tracing: No size specified for instance %s\n", name); + continue; + } + tok++; + size = memparse(tok, &tok); + if (!size) { + pr_warn("Tracing: Invalid boot instance size for %s\n", + name); + continue; + } + addr = map_pages(start, size); + if (addr) { + pr_info("Tracing: mapped boot instance %s at physical memory 0x%lx of size 0x%lx\n", + name, start, size); + } else { + pr_warn("Tracing: Failed to map boot instance %s\n", name); + continue; + } + } else { + /* Only non mapped buffers have snapshot buffers */ + if (IS_ENABLED(CONFIG_TRACER_MAX_TRACE)) + do_allocate_snapshot(name); + } - tr = trace_array_get_by_name(tok, NULL); + tr = trace_array_create_systems(name, NULL, addr, size); if (!tr) { - pr_warn("Failed to create instance buffer %s\n", curr_str); + pr_warn("Tracing: Failed to create instance buffer %s\n", curr_str); continue; } - /* Allow user space to delete it */ - trace_array_put(tr); + + /* Only allow non mapped buffers to be deleted */ + if (!start) + trace_array_put(tr); while ((tok = strsep(&curr_str, ","))) { early_enable_events(tr, tok, true); -- 2.43.0