From patchwork Tue Apr 9 21:02:54 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Rostedt X-Patchwork-Id: 13623252 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4EA84C67861 for ; Tue, 9 Apr 2024 21:11:20 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 93C776B007B; Tue, 9 Apr 2024 17:11:19 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 8EC896B0082; Tue, 9 Apr 2024 17:11:19 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7DAFE6B0083; Tue, 9 Apr 2024 17:11:19 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 5B7526B007B for ; Tue, 9 Apr 2024 17:11:19 -0400 (EDT) Received: from smtpin02.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id E2ADC140336 for ; Tue, 9 Apr 2024 21:11:18 +0000 (UTC) X-FDA: 81991239036.02.AEE5CD2 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf21.hostedemail.com (Postfix) with ESMTP id 5B0271C0018 for ; Tue, 9 Apr 2024 21:11:17 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf21.hostedemail.com: domain of "SRS0=qg+T=LO=goodmis.org=rostedt@kernel.org" designates 139.178.84.217 as permitted sender) smtp.mailfrom="SRS0=qg+T=LO=goodmis.org=rostedt@kernel.org" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1712697077; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:references; bh=kchm3C3FmMoCk9wS32795S9t0RM6g25b2EKr+MjrtU4=; b=IuKuYlCw1nW2XZQ/Fa0Bm0QKmgO80sH6aWc2y/MaumQQaEWxNz9zdMcTuePoaC03AYgJ9k X8U0WvXdEdqlMPKnuypVjIx/uAAmME47JRpC1im3wcJhT7i+Y1eayuRDQKBs5tx3q8tRvV wF3TLEg0Ko0Uhk4Piy9gWRiQOXvkNWM= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=none; dmarc=none; spf=pass (imf21.hostedemail.com: domain of "SRS0=qg+T=LO=goodmis.org=rostedt@kernel.org" designates 139.178.84.217 as permitted sender) smtp.mailfrom="SRS0=qg+T=LO=goodmis.org=rostedt@kernel.org" ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1712697077; a=rsa-sha256; cv=none; b=G2A1/uJBoho2Q4HoaQUPL5eioScGzmmU/MZDhWZPMuqgTI+l415aqevVZmcztF4ooMx2Pf uSUCvZFDL8/YJbYzwAVbELfB4ApFd90qBmJvH7bn1VhkbdqomwwSrfI34baN/rd9NJMfHu 5rUVbOFT9KxNfDgovR5jh39QAF+1oYQ= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id E3A6F61A1D; Tue, 9 Apr 2024 21:11:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 83FA0C433C7; Tue, 9 Apr 2024 21:11:15 +0000 (UTC) Received: from rostedt by gandalf with local (Exim 4.97) (envelope-from ) id 1ruImt-00000000d1d-0Dhi; Tue, 09 Apr 2024 17:13:51 -0400 Message-ID: <20240409210254.660888920@goodmis.org> User-Agent: quilt/0.67 Date: Tue, 09 Apr 2024 17:02:54 -0400 From: Steven Rostedt To: linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , "Liam R. Howlett" , Vlastimil Babka , Lorenzo Stoakes , linux-mm@kvack.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Peter Zijlstra , Kees Cook , Tony Luck , "Guilherme G. Piccoli" , linux-hardening@vger.kernel.org, Guenter Roeck , Ross Zwisler , wklin@google.com, Vineeth Remanan Pillai , Joel Fernandes , Suleiman Souhlal , Linus Torvalds , Catalin Marinas , Will Deacon Subject: [POC][RFC][PATCH 0/2] pstore/mm/x86: Add wildcard memmap to map pstore consistently X-Rspam-User: X-Stat-Signature: 6u6jxgdyetw61f418b91sbfphyr3gm18 X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 5B0271C0018 X-HE-Tag: 1712697077-877846 X-HE-Meta: U2FsdGVkX19MyR+VgIXysr0jflH31hRENUqa54Jb84KnhlP1TX7uN12NMWXbhqOZCfVKJD7XcKeRZ6eWR6q2bmwmo9URtKPmTDRg/tHjOdT85c0PpnLdlAaKhBQwpOEwK5sUvVS5Y59SnLhMV+1rJ8pEBsnPCYizGf/X/2eH5P1tuIKZz1ZNxD8AvT+Q7gk4l4EnMZTHtGI9HE8yP+DPrnqP/w+7Z8KhZy6iGtsuUNHSu2OPpHZzVUxXPcgKbBkz+5MUSMVl5+uaUDQK4Np6ejX5b+mIl1kdhuoTrHbDWnE8kAQ2ghEtxAB0nCi6jQlzYwlgbpAojSMM2TKLvlI+ZJS6+OInSjHvK4QbHirDaYDHnazw6scBktTELxJRKvpq6TAgByncG4BzDVlPJNWLJHkakrJWNkHK0gVInIkF8TLOwavsIv7lowr7GDvkefksI8IURylKoRJgNjn2EoG80gBXu61Pp5yBCLeage+5f8EDiTXhq1iCMvR0KXZ/gTqBbJYFHs0UwJIMD33aP/C6hCeiUg1ttMdty39fGRF0rn71KAmsfAlPqQ6CcnUDogApmiB/UuwajIZvfR0B+nljzoUmmcPton7+GvDLEgSfqoHnGsqJVt4wfhPXGT3GpTrXqOF+X2EECFv6Jr5p4diK5NTI3FJWnjTj7XZ4ePPCnkv4919utnjYZuukjXK8LZr06vJztOnQJmdaZfaKYWfM53JJCTT4WIhRHpu0KE8uNLfavIeczU12iDim2Ahgh2CBVdxBQU30dCHQjh5VkOeBc0gjaa3TtYzS/e26Wa5PA21OitBLLPqPvRddg2DSSyFLeCSqP5pFssLC11I8cQcMJ70AJKdFQ3YqwzIs6C6HXEjqzasfDY7M72IaKLxIIYd8LHNRlhvjV1WY/hH66yjQL5qw2h7CpLfCnpIu0x1ypNa+3Rh91GTo95+vp4ZT9GozlNnP8y3KZ5LRaeMeNCk UyjfaPNg NQW6czSloUA5tC9lZ769etslbNczOnfZ2ftZiGN6szkw/2vCjDx3x4wNsrs2eyZAfjPVhCcsE8WMLJrGiQvuCupWxHomJIVTRoQrWTSIEI1Ncc5DNvbs1qqW6PUpBLc926qxSSLi7yeF3uJTNTQO8ZS7zBxFzus0Masjd/qLY4LTsskhWfxXldZA55rn9vobXe68/XuTAbnmt8Y/2nU+Yg0T6m2cepDjsFWijxkGkOQKNghGFSoDpJkKGoQ== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Add wildcard option of reserving physical memory on kernel command line Background: In ChromeOS, we have 1 MB of pstore ramoops reserved so that we can extract dmesg output and some other information when a crash happens in the field. (This is only done when the user selects "Allow Google to collect data for improving the system"). But there are cases when there's a bug that requires more data to be retrieved to figure out what is happening. We would like to increase the pstore size, either temporarily, or maybe even permanently. The pstore on these devices are at a fixed location in RAM (as the RAM is not cleared on soft reboots nor crashes). The location is chosen by the BIOS (coreboot) and passed to the kernel via ACPI tables on x86. There's a driver that queries for this to initialize the pstore for ChromeOS: See drivers/platform/chrome/chromeos_pstore.c Problem: The problem is that, even though there's a process to change the kernel on these systems, and is done regularly to install updates, the firmware is updated much less frequently. Choosing the place in RAM also takes special care, and may be in a different address for different boards. Updating the size via firmware is a large effort and not something that many are willing to do for a temporary pstore size change. Requirement: Need a way to reserve memory that will be at a consistent location for every boot, if the kernel and system are the same. Does not need to work if rebooting to a different kernel, or if the system can change the memory layout between boots. The reserved memory can not be an hard coded address, as the same kernel / command line needs to run on several different machines. The picked memory reservation just needs to be the same for a given machine, but may be different for different machines. Solution: The solution I have come up with is to introduce a new "memmap=" kernel command line (for x86 and I would like something similar for ARM that uses device tree). As "memmap=" kernel command line parameter takes on several flavors already, I would like to introduce a new one. The "memmap=" kernel parameter is of the format of: memmap=nn[Xss] Where nn is the size, 'X' defines the flavor, and 'ss' usually a parameter to that flavor. The '$' flavor is to reserve physical memory where you could have: memmap=12M$0xb000000 Where 12 megs of memory will be reserved at the address 0xb0000000. This memory will not be part of the memory used by the kernel's memory management system. (e.g. alloc_pages() and kmalloc() will not return memory in that location). I would like to introduce a "wildcard" flavor that is of the format: memmap=nn*align:label Where nn is the size of memory to reserve, the align is the alignment of that memory, and label is the way for other sub-systems to find that memory. This way the kernel command line could have: memmap=12M*4096:oops ramoops.mem_name=oops At boot up, the kernel will search for 12 megabytes in usable memory regions with an alignment of 4096. It will start at the highest regions and work its way down (for those old devices that want access to lower address DMA). When it finds a region, it will save it off in a small table and mark it with the "oops" label. Then the pstore ramoops sub-system could ask for that memory and location, and it will map itself there. This prototype allows for 8 different mappings (which may be overkill, 4 is probably plenty) with 16 byte size to store the label. The table lookup is only available until boot finishes, which means it is only available for builtin code and not for modules. I have tested this and it works for us to solve the above problem. We can update the kernel and command line and increase the size of pstore without needing to update the firmware, or knowing every memory layout of each board. I only tested this locally, it has not been tested in the field. Before doing anything, I am looking for feedback. Maybe I missed something. Perhaps there's a better way. Anyway, this is both a Proof of Concept as well as a Request for Comments. Thanks! Steven Rostedt (Google) (2): mm/x86: Add wildcard '*' option as memmap=nn*align:name pstore/ramoops: Add ramoops.mem_name= command line option ---- arch/x86/kernel/e820.c | 91 ++++++++++++++++++++++++++++++++++++++++++++++++++ fs/pstore/ram.c | 18 ++++++++++ include/linux/mm.h | 2 ++ mm/memory.c | 7 ++++ 4 files changed, 118 insertions(+)