Re: [PATCH 2/6] tracing: increase size of number of possibleevents

From: Steven Rostedt
Date: Fri Apr 24 2009 - 08:29:36 EST





On Fri, 24 Apr 2009, Ingo Molnar wrote:

>
> * Li Zefan <lizf@xxxxxxxxxxxxxx> wrote:
>
> > > From: Steven Rostedt <srostedt@xxxxxxxxxx>
> > >
> > > With the new event tracing registration, we must increase the number
> > > of events that can be registered. Currently the type field is only
> > > one byte, which leaves us only 256 possible events.
> > >
> > > Since we do not save the CPU number in the tracer anymore (it is determined
> > > by the per cpu ring buffer that is used) we have an extra byte to use.
> > >
> > > This patch increases the size of type from 1 byte (256 events) to
> > > 2 bytes (65,536 events).
> > >
> >
> > You forgot to change this:
> >
> > @@ -198,7 +198,7 @@ ftrace_define_fields_##call(void) \
> > struct ftrace_event_call *event_call = &event_##call; \
> > int ret; \
> > \
> > - __common_field(int, type); \
> > + __common_field(unsigned short, type); \
> >
> > And we can apply the check in 3/6 to __common_field(). :)
> >
> > > It also adds a WARN_ON_ONCE if we exceed that limit.
> > >
> >
> > WARN_ON_ONCE() may not be sufficient IMO:
> >
> > We can reach 65536 this way (It took me 15 mins):
> >
> > while (foo_bar.id < 65536) {
> > insmod trace-events-sample.ko
> > rmmod trace-events-sample.ko
> > }
> >
> > Now next id will be 0! Then do this:
> >
> > console 1:
> > # cat /debug/tracing/trace_pipe
> >
> > console 2:
> > while (1) {
> > insmod trace-events-sample.ko
> > echo foo_bar > /debug/tracing/set_event
> > rmmod trace-events-sample.ko
> > }
> >
> > I got this immediately:
> >
> > BUG: unable to handle kernel NULL pointer dereference at 0000006f
> > IP: [<c05210f3>] bstr_printf+0x2ce/0x302
> > ...
> > Call Trace:
> > [<c0476d12>] ? trace_seq_bprintf+0x28/0x41
> > [<c0477569>] ? trace_bprint_print+0x58/0x6c
> > [<c0472ffc>] ? print_trace_line+0x2c5/0x2df
> > [<c0428a41>] ? sub_preempt_count+0x85/0xa0
> > [<c04758cf>] ? tracing_read_pipe+0x118/0x191
> > [<c04757b7>] ? tracing_read_pipe+0x0/0x191
> > [<c04b09f9>] ? vfs_read+0x8f/0x136
> > [<c04b0da3>] ? sys_read+0x40/0x65
> > [<c0402a68>] ? sysenter_do_call+0x12/0x36
> >
> > (We can even get other crashes..)
> >
> > So I think we should fail the initialization of the event, instead of
> > WARN_ON().
>
> Hm, i think this might also call for a 32-bit event ID after all,
> right? Especially if we get some more dynamic form of injecting such
> tracepoints, 64K does not sound all that far in the future anymore.
> It is stretching things, but still it would be a silly limit to
> leave in place, hm?

I would like to keep the size of the buffer down as much as possible.
There are only 22,000 functions (with full function tracing) so 65000
events should be more than enough.

The problem happens when we load and unload modules. If 65000 is not
enough, 4G wont be enough either. We would only need to run the module
load/unload a bit longer ;-)

I'll work on adding a way to reuse event keys.

-- Steve

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/