[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220728235241.2249-1-beaub@linux.microsoft.com>
Date: Thu, 28 Jul 2022 16:52:34 -0700
From: Beau Belgrave <beaub@...ux.microsoft.com>
To: rostedt@...dmis.org, mhiramat@...nel.org,
mathieu.desnoyers@...icios.com
Cc: linux-trace-devel@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [RFC PATCH v2 0/7] tracing: Add tracing namespace API for user
This series is based on the ftrace/core branch.
You will need the following series to apply this series:
Link: https://lore.kernel.org/all/20220728233309.1896-1-beaub@linux.microsoft.com/
User facing tracing systems, such as user_events and LTTng, sometimes
require multiple events with the same name, but from different
containers. This can cause event name conflicts and leak out details
of events not owned by the container.
To create a tracing namespace, run mkdir under the new tracefs directory
named "namespaces" (/sys/kernel/tracing/namespaces typically). This
directory largely works the same as "instances" where the new directory
will have files populated within it via the tracing system
automatically. The tracing systems will put their files under the "root"
directory, which is meant to be the directory that you can bind mount
out to containers. The "options" file is meant to allow operators to
configure the namespaces via the registered systems.
The tracing namespace allows those user facing systems to register with
the tracing namespace. When an operator creates a namespace directory
under /sys/kernel/tracing/namespaces the registered systems will have
their create operation run for that namespace. The systems can then create
files in the new directory used for tracing via user programs. These
files will then isolate events between each namespace the operator
creates.
Typically the system name of the event will have the tracing namespace
name appended onto the system name. For example, if a namespace
directory was created named "mygroup", then the system name would be
"<system_name>.mygroup". Since the system names are different for each
namespace, per-namespace recording/playback can be done by specifying the
per-namespace system name and the event name. However, this decision is
up to the registered tracing system for each namespace.
The operator can then bind mount each namespace directory into
containers. This provides isolation between events and containers, if
required. It's also possible for several containers to share an
isolation via bind mounts instead of having an isolation per-container.
With these files being isolated, different permissions can be added for
these files than normal tracefs files. This helps scenarios where
non-admin processes would like to trace, but currently cannot.
To create a namespace called isolated and limited to 256 events run:
mkdir /sys/kernel/tracing/namespaces/isolated
cd /sys/kernel/tracing/namespaces/isolated
echo user_events_limit=256 > options
To bind mount the isolated root to /isolated for use by others run:
mkdir /isolated
mount --bind /sys/kernel/tracing/namespaces/isolated/root /isolated
Reading /isolated/user_events_status then outputs the following:
Active: 0
Busy: 0
Max: 32768
Limit: 256
The normal user_event ABI methods work just as before, however, the
events are now registered under a different system name and have
their own status file/bitmap.
There's been some previous discussion about this both in the tracefs
meetings as well as on the mailing lists:
Link: https://lore.kernel.org/all/20220312010140.1880-1-beaub@linux.microsoft.com/
Link: https://lore.kernel.org/all/20220425184631.2068-1-beaub@linux.microsoft.com/
V2 Changes:
Fixed typos and missing carriage return.
Rebased to v3 user_events patch on ftrace/core.
Beau Belgrave (7):
tracing/user_events: Remove BROKEN and restore user_events.h location
tracing: Add namespace instance directory to tracefs
tracing: Add tracing namespace API for systems to register with
tracing/user_events: Move pages/locks into groups to prepare for
namespaces
tracing/user_events: Register with trace namespace API
tracing/user_events: Enable setting event limit within namespace
tracing/user_events: Add self-test for namespace integration
fs/tracefs/inode.c | 119 +++-
include/linux/tracefs.h | 5 +
include/{ => uapi}/linux/user_events.h | 0
kernel/trace/Kconfig | 12 +-
kernel/trace/Makefile | 1 +
kernel/trace/trace.c | 39 ++
kernel/trace/trace_events_user.c | 592 +++++++++++++++---
kernel/trace/trace_namespace.c | 568 +++++++++++++++++
kernel/trace/trace_namespace.h | 57 ++
.../selftests/user_events/ftrace_test.c | 150 +++++
10 files changed, 1457 insertions(+), 86 deletions(-)
rename include/{ => uapi}/linux/user_events.h (100%)
create mode 100644 kernel/trace/trace_namespace.c
create mode 100644 kernel/trace/trace_namespace.h
base-commit: 26b2da5fc0b41a9a6a5e30b858da28572a6f4cbc
prerequisite-patch-id: bb3e38a639be23a2df781547e4c87bc5bb1a05d0
prerequisite-patch-id: e7c8f170457cbb6d467ddec6f9282e2cdd81bb32
prerequisite-patch-id: ffbe40150b26469168a3f4abe97849d8708785d5
prerequisite-patch-id: a5c2a495793f9db8103c13a4f1e5380ea0f78902
prerequisite-patch-id: a9e7b35a0d03b12cec5be60a53fa0ff5cdaf8d63
prerequisite-patch-id: 5df583c86e6de3fc504b478e52e91068c85fa2b9
--
2.25.1
Powered by blists - more mailing lists