Received: by 2002:ab2:6f44:0:b0:1fd:c486:4f03 with SMTP id l4csp49537lqq; Wed, 12 Jun 2024 16:22:52 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX5ZmkIJ7WhcZ9ZR8idBgLBKiaQG/rHC3UEHYLQIUMeKAjbNz6Xdy01dwcPGXWegIt6E0p3waqUJU5l6CMmbYlc+EMmt4q4TIM/+F8yig== X-Google-Smtp-Source: AGHT+IGdnLtfv2klookn+Y3kjvYgfqI5vAfVCKMKvgV8ZXvCHAnBa3xPRm8Z/TI+06tQF+olGlQ5 X-Received: by 2002:a17:90b:3112:b0:2c2:cc03:a4ad with SMTP id 98e67ed59e1d1-2c4bda1b27bmr1448305a91.21.1718234572026; Wed, 12 Jun 2024 16:22:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718234572; cv=pass; d=google.com; s=arc-20160816; b=WPelkQEImk0rgo0kNwO/ItYJO3dLrS4rnalvRg5lqqz80HrOjDrhidMqYkI8Mu1qh+ eg4D3W55TCdtgAF4Z2IAUxRU0w0404Bh398qAvuUa+LXrFaGivjr4zqKkykSrBU1zwwe SMAPow6emkjoX81wLYznfey7IB3SY/wnG7Dls/BF4InQjkTmyaom6CUL/udW8b3wjDr4 mjOqyDDQSkaKKugzzMm3sRhwMyqZVF36akiZaFNk9ggvHndyeoeYuWXslnRtySdDa+Nq gKERTd9Z/WMC3M2aV3cwICkWvh5TZk8CJ7sthn7+PM/XKqxQBnsTf14HSAwVH/AxJotu gyOw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:subject:cc:to:from:date:user-agent:message-id; bh=ThqnLmRpsQGN4xu6Y6odrqca3Sbrpfi9MpT8PdxlZgU=; fh=APLEwzDCuZjAyYd8ZCw4YQ4qXWbcLRWeojtUCuRmRf0=; b=MGDHPSePqtBGEaNbzHOPmk4uiKdaHa3PSdqxRmW4PjytkuOGSKW4yX2s/hc+RFWeq2 H24ZvzrbrU0S3Itc10jPK3gF6YPFe9pmIDYX22mJmvhqU7vzNE1qXnRY8iCSbsUkC8v2 mbKGHLM+PwWdprW/l003MrDQOyFO1DcqcQcOh65fK30aUfNmVeANG1h6elfgAUILgdD7 /OqqwmRlAQcVqaLvO+aDU2j60awqmd6dHSjesaCZ9Cv6dw20LkNPXsjMFDrjQfVFU0IY El26O8o/IBWlpEi1uUFAzvvtJ9CuIWzrMkbmiqv2ZfemZXduG/eZNph7h7v6PhXY2GDY BjmQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-212367-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-212367-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2c4c4625cdesi204168a91.55.2024.06.12.16.22.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Jun 2024 16:22:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-212367-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-212367-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-212367-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 13900B22DC9 for ; Wed, 12 Jun 2024 23:21:28 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4DEA6130E27; Wed, 12 Jun 2024 23:20:10 +0000 (UTC) Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 75EC312D757; Wed, 12 Jun 2024 23:20:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718234407; cv=none; b=lfpJy6dRzGPa/djJBMaHiKr9RdRzuC6Gm4eMnT8hqDNV9ELDgcx8KeL4i14gE6NHYSfjEumjLXdjSsJbehJoHqYF8cu6pyH8X/NIX1eYrrkLcwyiwDyxcUs75icOrGjXJ61NdNeMADVMGlldzxHK7UJ4LAa6Ql22ffwq1XcLd8c= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718234407; c=relaxed/simple; bh=GVvcmn3027Fc6rCsvulA82p+nR13kJETnki+fNMXM9U=; h=Message-ID:Date:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=k0CDXv3W8u6+vEcznP8DRvh+36XQdlGRDGFWOf8am/tnnz17vUfb+YzGnK4MIkXuOC9+8QetFYi+pqrV9YtzXzeKNFKHNSgLlVEPTvg/YKqW0q4SkKz4dwgT93bYUxdwJZxu8wvRX4/TyB3re8yIG+7LIOoM5B5giJZRK7cYcO4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4EEFEC4DDEF; Wed, 12 Jun 2024 23:20:07 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.97) (envelope-from ) id 1sHXGU-00000001ddv-1zmX; Wed, 12 Jun 2024 19:20:26 -0400 Message-ID: <20240612232026.329660169@goodmis.org> User-Agent: quilt/0.68 Date: Wed, 12 Jun 2024 19:19:42 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , Vincent Donnefort , Joel Fernandes , Daniel Bristot de Oliveira , Ingo Molnar , Peter Zijlstra , suleiman@google.com, Thomas Gleixner , Vineeth Pillai , Youssef Esmat , Beau Belgrave , Alexander Graf , Baoquan He , Borislav Petkov , "Paul E. McKenney" , David Howells , Mike Rapoport , Dave Hansen , Tony Luck , Guenter Roeck , Ross Zwisler , Kees Cook , linux-mm@kvack.org Subject: [PATCH v6 08/13] tracing: Add option to use memmapped memory for trace boot instance References: <20240612231934.608252486@goodmis.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 From: "Steven Rostedt (Google)" Add an option to the trace_instance kernel command line parameter that allows it to use the reserved memory from memmap boot parameter. memmap=12M$0x284500000 trace_instance=boot_mapped@0x284500000:12M The above will reserves 12 megs at the physical address 0x284500000. The second parameter will create a "boot_mapped" instance and use the memory reserved as the memory for the ring buffer. That will create an instance called "boot_mapped": /sys/kernel/tracing/instances/boot_mapped Note, because the ring buffer is using a defined memory ranged, it will act just like a memory mapped ring buffer. It will not have a snapshot buffer, as it can't swap out the buffer. The snapshot files as well as any tracers that uses a snapshot will not be present in the boot_mapped instance. Cc: linux-mm@kvack.org Signed-off-by: Steven Rostedt (Google) --- .../admin-guide/kernel-parameters.txt | 9 +++ kernel/trace/trace.c | 75 +++++++++++++++++-- 2 files changed, 78 insertions(+), 6 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index b600df82669d..ff26b6094e79 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -6754,6 +6754,15 @@ the same thing would happen if it was left off). The irq_handler_entry event, and all events under the "initcall" system. + If memory has been reserved (see memmap for x86), the instance + can use that memory: + + memmap=12M$0x284500000 trace_instance=boot_map@0x284500000:12M + + The above will create a "boot_map" instance that uses the physical + memory at 0x284500000 that is 12Megs. The per CPU buffers of that + instance will be split up accordingly. + trace_options=[option-list] [FTRACE] Enable or disable tracer options at boot. The option-list is a comma delimited list of options diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 622fe670949d..dfde26aa3211 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -9504,6 +9504,31 @@ static int instance_mkdir(const char *name) return ret; } +static u64 map_pages(u64 start, u64 size) +{ + struct page **pages; + phys_addr_t page_start; + unsigned int page_count; + unsigned int i; + void *vaddr; + + page_count = DIV_ROUND_UP(size, PAGE_SIZE); + + page_start = start; + pages = kmalloc_array(page_count, sizeof(struct page *), GFP_KERNEL); + if (!pages) + return 0; + + for (i = 0; i < page_count; i++) { + phys_addr_t addr = page_start + i * PAGE_SIZE; + pages[i] = pfn_to_page(addr >> PAGE_SHIFT); + } + vaddr = vmap(pages, page_count, VM_MAP, PAGE_KERNEL); + kfree(pages); + + return (u64)(unsigned long)vaddr; +} + /** * trace_array_get_by_name - Create/Lookup a trace array, given its name. * @name: The name of the trace array to be looked up/created. @@ -10350,6 +10375,7 @@ __init static void enable_instances(void) { struct trace_array *tr; char *curr_str; + char *name; char *str; char *tok; @@ -10358,19 +10384,56 @@ __init static void enable_instances(void) str = boot_instance_info; while ((curr_str = strsep(&str, "\t"))) { + unsigned long start = 0; + unsigned long size = 0; + unsigned long addr = 0; tok = strsep(&curr_str, ","); + name = strsep(&tok, "@"); + if (tok) { + start = memparse(tok, &tok); + if (!start) { + pr_warn("Tracing: Invalid boot instance address for %s\n", + name); + continue; + } + } - if (IS_ENABLED(CONFIG_TRACER_MAX_TRACE)) - do_allocate_snapshot(tok); + if (start) { + if (*tok != ':') { + pr_warn("Tracing: No size specified for instance %s\n", name); + continue; + } + tok++; + size = memparse(tok, &tok); + if (!size) { + pr_warn("Tracing: Invalid boot instance size for %s\n", + name); + continue; + } + addr = map_pages(start, size); + if (addr) { + pr_info("Tracing: mapped boot instance %s at physical memory 0x%lx of size 0x%lx\n", + name, start, size); + } else { + pr_warn("Tracing: Failed to map boot instance %s\n", name); + continue; + } + } else { + /* Only non mapped buffers have snapshot buffers */ + if (IS_ENABLED(CONFIG_TRACER_MAX_TRACE)) + do_allocate_snapshot(name); + } - tr = trace_array_get_by_name(tok, NULL); + tr = trace_array_create_systems(name, NULL, addr, size); if (!tr) { - pr_warn("Failed to create instance buffer %s\n", curr_str); + pr_warn("Tracing: Failed to create instance buffer %s\n", curr_str); continue; } - /* Allow user space to delete it */ - trace_array_put(tr); + + /* Only allow non mapped buffers to be deleted */ + if (!start) + trace_array_put(tr); while ((tok = strsep(&curr_str, ","))) { early_enable_events(tr, tok, true); -- 2.43.0