lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 19 Dec 2011 18:40:58 -0500
From:	Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
To:	Arun Sharma <asharma@...com>
Cc:	linux-kernel@...r.kernel.org,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Steven Rostedt <rostedt@...dmis.org>,
	Arnaldo Carvalho de Melo <acme@...radead.org>,
	Andrew Vagin <avagin@...nvz.org>,
	Frederic Weisbecker <fweisbec@...il.com>,
	Ingo Molnar <mingo@...e.hu>
Subject: Re: [PATCH 1/2] tracing, sched: move the sched_switch tracepoint

* Arun Sharma (asharma@...com) wrote:
> Move the tracepoint from prepare_task_switch() to
> finish_task_switch().
> 
> Without this, the event gets attributed to prev rather
> than next.

I would have thought that the semantic of "being scheduled"
(sched_switch) would belong to the context of the thread being scheduled
out ?

> For sleep profiling purposes, we want to collect
> the stacktrace of "next". This also makes the event usable in
> per-process mode, without root privileges.
>
> I can't think of this breaking the semantics of the existing
> uses of this tracepoint.

See comments inlined below,

> If there are any concerns, we should
> be able to define a new tracepoint usable for sleep profiling.

If it can be achieved by adding analysis to user-level tools, without
extracting more data, I think a less intrusive option should be
preferred. But for your per-process use-case, you might need a second
trace point.

> 
> Signed-off-by: Arun Sharma <asharma@...com>
> Cc: Peter Zijlstra <a.p.zijlstra@...llo.nl>
> Cc: Steven Rostedt <rostedt@...dmis.org>
> Cc: Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
> Cc: Arnaldo Carvalho de Melo <acme@...radead.org>
> Cc: Andrew Vagin <avagin@...nvz.org>
> Cc: Frederic Weisbecker <fweisbec@...il.com>
> Cc: Ingo Molnar <mingo@...e.hu>
> Cc: linux-kernel@...r.kernel.org
> ---
>  kernel/sched.c |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
> 
> diff --git a/kernel/sched.c b/kernel/sched.c
> index d6b149c..b06b3c6 100644
> --- a/kernel/sched.c
> +++ b/kernel/sched.c
> @@ -3157,7 +3157,6 @@ prepare_task_switch(struct rq *rq, struct task_struct *prev,
>  	fire_sched_out_preempt_notifiers(prev, next);
>  	prepare_lock_switch(rq, next);
>  	prepare_arch_switch(next);
> -	trace_sched_switch(prev, next);
>  }
>  
>  /**
> @@ -3205,6 +3204,7 @@ static void finish_task_switch(struct rq *rq, struct task_struct *prev)
>  #endif /* __ARCH_WANT_INTERRUPTS_ON_CTXSW */
>  	finish_lock_switch(rq, prev);
>  
> +	trace_sched_switch(prev, current, rq->clock);

Hrm, this is moving the event outside of the lock_switch, which has
reenabled interrupts and released the lock. This would therefore
introduce new "interesting" sequences of events where an IRQ could
appear to nest over the wrong PID. Also, I'm not certain it is still
safe to access "prev->" at this point. So the patch definitely needs to
be reviewed as to what event order it will change and to make sure it
does not introduce races.

I'd also be tempted to keep the trace_sched_switch in
prepare_task_switch, and create a new event for finish_task_switch.

Best regards,

Mathieu

>  	fire_sched_in_preempt_notifiers(current);
>  	if (mm)
>  		mmdrop(mm);
> -- 
> 1.7.4
> 

-- 
Mathieu Desnoyers
Operating System Efficiency R&D Consultant
EfficiOS Inc.
http://www.efficios.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ