lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 29 Sep 2008 11:25:46 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Vegard Nossum <vegard.nossum@...il.com>
Cc:	Pekka Enberg <penberg@...helsinki.fi>, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] kmemcheck fixlets (for -tip)


* Vegard Nossum <vegard.nossum@...il.com> wrote:

> On Mon, Sep 29, 2008 at 10:55 AM, Ingo Molnar <mingo@...e.hu> wrote:
> > FYI, i've reactivated kmemcheck on one of the -tip auto-test boxes
> > earlier today and it's looking good so far - for example a 32-bit
> > allyesconfig-ish config booted in just fine with kmemcheck enabled.
> > Also, the box is very usable interactively - while previous one could
> > always tell whether there's kmemcheck active.
> 
> Oops. Probably kmemcheck was not enabled (for all the right caches).
> Here's what may go wrong:
> 
> 1. kmemcheck is in one-shot mode. Only one error is reported; after
> that, box will start returning to normal speed.

i'd have noticed that error.

> 2. SLUB debugging was enabled. kmemcheck will not track "debugged"
> caches, so I suggest turning SLUB off in kernel config, or by booting
> with "slub_debug=-". But I think that SLUB debug can be turned off in
> kernel config as well, which means that your randconfig testing will
> hit both cases eventually.

ok, slub debugging was indeed on. I'll re-test with that disabled.

> > [ only one CPU is active, but we knew that. We've still got this
> >  test-commit:
> >
> >     21d01a4: x86: add functions for duplicating page tables
> >
> >  it's not in tip/master but we still have it around. ]
> >
> > btw., is there any easy way to tell from within a script what the
> > current status of kmemcheck is? In particular, whether it's running.
> > Normally i have this in the syslog:
> >
> >  [    0.448022] kmemcheck: "Bugs, beware!"
> >  [    0.452002] kmemcheck: Limiting number of CPUs to 1.
> >
> > but this time the log was too large so this bit was snipped out and i
> > was unsure about it - needed a second bootup with a larger buffer to
> > make sure. With lockdep we've got the 'debug_locks' /proc/lockdep_stats.
> >
> 
> You can read /proc/sys/kernel/kmemcheck. We also set a per-cache flag 
> in slabs, so I think you can get some information from SLUB sysfs. But 
> I agree -- it is not always easy to tell what kmemcheck is actually 
> doing. Maybe some counters and stats would be appropriate.

ah, missed that flag.

> > also, all kmemcheck warnings follow the usual WARN_ON() format, so 
> > that automated tests can pick it up, correct? -tip testing does so 
> > many bootups that there's no chance to notice non-system-crashing 
> > bugs and printouts but via automated means.
> 
> Uhm, not correct. We need a few more infos (like read size, shadow, 
> etc.), also the stacktraces are saved, so the default stacktrace of 
> WARN is useless. But we can certainly try to emulate it. What text 
> should I insert in order for your scripts to pick it up?

a kernel log line beginning with:

 INFO:
 WARNING:
 BUG:

would be noticed. (That pattern has to be at the beginning of the line. 
Otherwise we'd match on things like 'DEBUG: ' - such printouts exist)

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ