From nobody Sat Feb 7 16:26:48 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EC2ED27005B for ; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; cv=none; b=MTK3MT9Fzdzzm0fE2kEmGq2ICMeL9F2WpfClfsp+WRZC649LhixACmuYNjmTSQSuLgwbyi2bcCE32fEo2IFi7oK0ihDnOWikE6BAh2nf7m+me7fYCLT718Let3hKRnlq5OAs2DFx0kJatfiQm8rs3UiqvkaWL6m8i9cdSDvk2so= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; c=relaxed/simple; bh=Oprg1SolVFZ2y8feVu/LLbyfcoVDu2BCZyGPuBU+WjA=; h=Message-ID:Date:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=dTcTmu2ZBGK/n2K1PuWBMMCmU2TL9OBJ/p1QqsdTH/owwaWR6EfZ3HRZm1Ef0m0IzBmcbq+Fe1UT+yHAiKJPQFWL5sPUFYEehIV10CODzizyJvrns2t/UXFA3Cfbt1MQaTvT7wRahtX2H+2Xo9y6LnGEwKQWXEmPSg1MWxBvVA8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 88482C4CEE8; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.98) (envelope-from ) id 1tnRWI-00000009XQY-1ouD; Wed, 26 Feb 2025 19:12:54 -0500 Message-ID: <20250227001254.283156805@goodmis.org> User-Agent: quilt/0.68 Date: Wed, 26 Feb 2025 19:12:36 -0500 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , Borislav Petkov Subject: [for-next][PATCH 1/3] tracing: Add traceoff_after_boot option References: <20250227001235.355892523@goodmis.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Steven Rostedt Sometimes tracing is used to debug issues during the boot process. Since the trace buffer has a limited amount of storage, it may be prudent to disable tracing after the boot is finished, otherwise the critical information may be overwritten. With this option, the main tracing buffer will be turned off at the end of the boot process. Cc: Masami Hiramatsu Cc: Mathieu Desnoyers Cc: Borislav Petkov Link: https://lore.kernel.org/20250208103017.48a7ec83@batman.local.home Signed-off-by: Steven Rostedt (Google) --- Documentation/admin-guide/kernel-parameters.txt | 9 +++++++++ kernel/trace/trace.c | 11 +++++++++++ 2 files changed, 20 insertions(+) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentatio= n/admin-guide/kernel-parameters.txt index fb8752b42ec8..e8ca4eabd152 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -7279,6 +7279,15 @@ See also "Event triggers" in Documentation/trace/events.rst =20 =20 + traceoff_after_boot + [FTRACE] Sometimes tracing is used to debug issues + during the boot process. Since the trace buffer has a + limited amount of storage, it may be prudent to + disable tracing after the boot is finished, otherwise + the critical information may be overwritten. With this + option, the main tracing buffer will be turned off at + the end of the boot process. + traceoff_on_warning [FTRACE] enable this option to disable tracing when a warning is hit. This turns off "tracing_on". Tracing can diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 0e6d517e74e0..61458d8c3a61 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -87,6 +87,7 @@ void __init disable_tracing_selftest(const char *reason) static struct trace_iterator *tracepoint_print_iter; int tracepoint_printk; static bool tracepoint_printk_stop_on_boot __initdata; +static bool traceoff_after_boot __initdata; static DEFINE_STATIC_KEY_FALSE(tracepoint_printk_key); =20 /* For tracers that don't implement custom flags */ @@ -330,6 +331,13 @@ static int __init set_tracepoint_printk_stop(char *str) } __setup("tp_printk_stop_on_boot", set_tracepoint_printk_stop); =20 +static int __init set_traceoff_after_boot(char *str) +{ + traceoff_after_boot =3D true; + return 1; +} +__setup("traceoff_after_boot", set_traceoff_after_boot); + unsigned long long ns2usecs(u64 nsec) { nsec +=3D 500; @@ -10704,6 +10712,9 @@ __init static int late_trace_init(void) tracepoint_printk =3D 0; } =20 + if (traceoff_after_boot) + tracing_off(); + tracing_set_default_clock(); clear_boot_tracer(); return 0; --=20 2.47.2 From nobody Sat Feb 7 16:26:48 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 11A41BE4F for ; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; cv=none; b=tkmrQFW+rbrxOvLq+xwxeLTF/6vgpqQzk1VqiABSHZHOCQ+VYaog6iEH+TZWDDvMASvvSopcYqMaMI9hJFAj7hHSiJpOMVq5X0EWnEyGa+Dsz9UfQ+nypRM1qmhSWen9WXcUc0mUkUDfbYb3Vm2c8Tgs645EOjeZLctMM5ZM0Ts= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; c=relaxed/simple; bh=ZLwh4kTeifDTY9uIjXp+TmPGZdPu1espl9jSu0PMnds=; h=Message-ID:Date:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=ZWtdbxQWsPpyGDu1DdFMPb8yy+iEP6lC4hb4vZX7LyizBGxm3m0fZSpGVIZbdzNhY1v6EDeN8kQ7AitnMMOca3Gw5IwgLBRvJLDrrDAe6G5TJy9EKC+lCpVV06XuayzkYaru/x7GfZnlu/vkIGu4Ns8ARmdzt/TR+DtOJCaWfHo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id AF7B3C4CEEB; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.98) (envelope-from ) id 1tnRWI-00000009XR3-2Wns; Wed, 26 Feb 2025 19:12:54 -0500 Message-ID: <20250227001254.455561171@goodmis.org> User-Agent: quilt/0.68 Date: Wed, 26 Feb 2025 19:12:37 -0500 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , "Mike Rapoport (Microsoft)" , linux-mm@kvack.org Subject: [for-next][PATCH 2/3] mm/memblock: Add reserved memory release function References: <20250227001235.355892523@goodmis.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: "Masami Hiramatsu (Google)" Add reserve_mem_release_by_name() to release a reserved memory region with a given name. This allows us to release reserved memory which is defined by kernel cmdline, after boot. Signed-off-by: Masami Hiramatsu (Google) Acked-by: Mike Rapoport (Microsoft) Cc: Andrew Morton Cc: Mark Rutland Cc: Mathieu Desnoyers Cc: linux-mm@kvack.org Link: https://lore.kernel.org/173989133862.230693.14094993331347437600.stgi= t@devnote2 Signed-off-by: Steven Rostedt (Google) --- include/linux/mm.h | 1 + mm/memblock.c | 66 +++++++++++++++++++++++++++++++++++++--------- 2 files changed, 55 insertions(+), 12 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 7b1068ddcbb7..1ee9e7447485 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -4123,6 +4123,7 @@ void vma_pgtable_walk_begin(struct vm_area_struct *vm= a); void vma_pgtable_walk_end(struct vm_area_struct *vma); =20 int reserve_mem_find_by_name(const char *name, phys_addr_t *start, phys_ad= dr_t *size); +int reserve_mem_release_by_name(const char *name); =20 #ifdef CONFIG_64BIT int do_mseal(unsigned long start, size_t len_in, unsigned long flags); diff --git a/mm/memblock.c b/mm/memblock.c index 95af35fd1389..8cd95f60015d 100644 --- a/mm/memblock.c +++ b/mm/memblock.c @@ -16,6 +16,7 @@ #include #include #include +#include =20 #include #include @@ -2283,6 +2284,7 @@ struct reserve_mem_table { }; static struct reserve_mem_table reserved_mem_table[RESERVE_MEM_MAX_ENTRIES= ]; static int reserved_mem_count; +static DEFINE_MUTEX(reserve_mem_lock); =20 /* Add wildcard region with a lookup name */ static void __init reserved_mem_add(phys_addr_t start, phys_addr_t size, @@ -2296,6 +2298,21 @@ static void __init reserved_mem_add(phys_addr_t star= t, phys_addr_t size, strscpy(map->name, name); } =20 +static struct reserve_mem_table *reserve_mem_find_by_name_nolock(const cha= r *name) +{ + struct reserve_mem_table *map; + int i; + + for (i =3D 0; i < reserved_mem_count; i++) { + map =3D &reserved_mem_table[i]; + if (!map->size) + continue; + if (strcmp(name, map->name) =3D=3D 0) + return map; + } + return NULL; +} + /** * reserve_mem_find_by_name - Find reserved memory region with a given name * @name: The name that is attached to a reserved memory region @@ -2309,22 +2326,47 @@ static void __init reserved_mem_add(phys_addr_t sta= rt, phys_addr_t size, int reserve_mem_find_by_name(const char *name, phys_addr_t *start, phys_ad= dr_t *size) { struct reserve_mem_table *map; - int i; =20 - for (i =3D 0; i < reserved_mem_count; i++) { - map =3D &reserved_mem_table[i]; - if (!map->size) - continue; - if (strcmp(name, map->name) =3D=3D 0) { - *start =3D map->start; - *size =3D map->size; - return 1; - } - } - return 0; + guard(mutex)(&reserve_mem_lock); + map =3D reserve_mem_find_by_name_nolock(name); + if (!map) + return 0; + + *start =3D map->start; + *size =3D map->size; + return 1; } EXPORT_SYMBOL_GPL(reserve_mem_find_by_name); =20 +/** + * reserve_mem_release_by_name - Release reserved memory region with a giv= en name + * @name: The name that is attatched to a reserved memory region + * + * Forcibly release the pages in the reserved memory region so that those = memory + * can be used as free memory. After released the reserved region size bec= omes 0. + * + * Returns: 1 if released or 0 if not found. + */ +int reserve_mem_release_by_name(const char *name) +{ + char buf[RESERVE_MEM_NAME_SIZE + 12]; + struct reserve_mem_table *map; + void *start, *end; + + guard(mutex)(&reserve_mem_lock); + map =3D reserve_mem_find_by_name_nolock(name); + if (!map) + return 0; + + start =3D phys_to_virt(map->start); + end =3D start + map->size - 1; + snprintf(buf, sizeof(buf), "reserve_mem:%s", name); + free_reserved_area(start, end, 0, buf); + map->size =3D 0; + + return 1; +} + /* * Parse reserve_mem=3Dnn:align:name */ --=20 2.47.2 From nobody Sat Feb 7 16:26:48 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 11A78C133 for ; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; cv=none; b=ZbFd4YOxWs3AMIRF+egK7bsx/IFVAzylGJYBPIBxf3akB3skCqoQp1r4/VUz5AAAaDqigytVNqWxjoOV5uSKGOSA3EBLRCaNvzrYQKqQnnlSJ8N0KXmLaUIcBwyJm+zOgpMXAPuDb4hcnuGDs8CduI60WjWzT+YnTW9zzQjAtNw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740615133; c=relaxed/simple; bh=930gZKhLgdCHbmsCso2yuEEbwWgxnmJbIbvm5UQU7Ig=; h=Message-ID:Date:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=JKD+NMk+xsUYSklGGcipE8xypWBf9ttOusKU/paloI8TI/e/LneKFIUyN3bHWNCsOuYjCB89A7VxHVC0OYl+q+fJeakhDh0I0ZveFuCQfj4cjsPwZekURwI1fZe1adL3ZpvBe5Y3b+wxnyk0Mu36/l5cPkKhuKDTNTSmbUZHTxw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id B3A9FC4CEEC; Thu, 27 Feb 2025 00:12:12 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.98) (envelope-from ) id 1tnRWI-00000009XRX-3Ef3; Wed, 26 Feb 2025 19:12:54 -0500 Message-ID: <20250227001254.624778797@goodmis.org> User-Agent: quilt/0.68 Date: Wed, 26 Feb 2025 19:12:38 -0500 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , Mike Rapoport Subject: [for-next][PATCH 3/3] tracing: Freeable reserved ring buffer References: <20250227001235.355892523@goodmis.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: "Masami Hiramatsu (Google)" Make the ring buffer on reserved memory to be freeable. This allows us to free the trace instance on the reserved memory without changing cmdline and rebooting. Even if we can not change the kernel cmdline for security reason, we can release the reserved memory for the ring buffer as free (available) memory. For example, boot kernel with reserved memory; "reserve_mem=3D20M:2M:trace trace_instance=3Dboot_mapped^traceoff@trace" ~ # free total used free shared buff/cache avail= able Mem: 1995548 50544 1927568 14964 17436 191= 1480 Swap: 0 0 0 ~ # rmdir /sys/kernel/tracing/instances/boot_mapped/ [ 23.704023] Freeing reserve_mem:trace memory: 20476K ~ # free total used free shared buff/cache avail= able Mem: 2016024 41844 1956740 14968 17440 194= 0572 Swap: 0 0 0 Cc: Mark Rutland Cc: Mathieu Desnoyers Cc: Andrew Morton Cc: Mike Rapoport Link: https://lore.kernel.org/173989134814.230693.18199312930337815629.stgi= t@devnote2 Signed-off-by: Masami Hiramatsu (Google) Signed-off-by: Steven Rostedt (Google) --- kernel/trace/trace.c | 13 ++++++++++++- kernel/trace/trace.h | 1 + 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 61458d8c3a61..b4bcb85094d9 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -9292,6 +9292,9 @@ static void free_trace_buffers(struct trace_array *tr) #ifdef CONFIG_TRACER_MAX_TRACE free_trace_buffer(&tr->max_buffer); #endif + + if (tr->range_addr_start) + vunmap((void *)tr->range_addr_start); } =20 static void init_trace_flags_index(struct trace_array *tr) @@ -9453,6 +9456,7 @@ trace_array_create_systems(const char *name, const ch= ar *systems, free_cpumask_var(tr->pipe_cpumask); free_cpumask_var(tr->tracing_cpumask); kfree_const(tr->system_names); + kfree(tr->range_name); kfree(tr->name); kfree(tr); =20 @@ -9579,6 +9583,11 @@ static int __remove_instance(struct trace_array *tr) free_trace_buffers(tr); clear_tracing_err_log(tr); =20 + if (tr->range_name) { + reserve_mem_release_by_name(tr->range_name); + kfree(tr->range_name); + } + for (i =3D 0; i < tr->nr_topts; i++) { kfree(tr->topts[i].topts); } @@ -10376,6 +10385,7 @@ __init static void enable_instances(void) bool traceoff =3D false; char *flag_delim; char *addr_delim; + char *rname __free(kfree) =3D NULL; =20 tok =3D strsep(&curr_str, ","); =20 @@ -10432,6 +10442,7 @@ __init static void enable_instances(void) pr_warn("Failed to map boot instance %s to %s\n", name, tok); continue; } + rname =3D kstrdup(tok, GFP_KERNEL); } =20 if (start) { @@ -10468,7 +10479,7 @@ __init static void enable_instances(void) */ if (start) { tr->flags |=3D TRACE_ARRAY_FL_BOOT; - tr->ref++; + tr->range_name =3D no_free_ptr(rname); } =20 while ((tok =3D strsep(&curr_str, ","))) { diff --git a/kernel/trace/trace.h b/kernel/trace/trace.h index 9c21ba45b7af..93b6279d3da4 100644 --- a/kernel/trace/trace.h +++ b/kernel/trace/trace.h @@ -348,6 +348,7 @@ struct trace_array { unsigned int mapped; unsigned long range_addr_start; unsigned long range_addr_size; + char *range_name; long text_delta; long data_delta; =20 --=20 2.47.2