lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 19 Sep 2006 16:28:02 -0400
From:	Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca>
To:	"Frank Ch. Eigler" <fche@...hat.com>
Cc:	linux-kernel@...r.kernel.org,
	Christoph Hellwig <hch@...radead.org>,
	Andrew Morton <akpm@...l.org>, Ingo Molnar <mingo@...hat.com>,
	Greg Kroah-Hartman <gregkh@...e.de>,
	Thomas Gleixner <tglx@...utronix.de>,
	Douglas Niehaus <niehaus@...s.ku.edu>,
	Tom Zanussi <zanussi@...ibm.com>,
	Paul Mundt <lethal@...ux-sh.org>, Jes Sorensen <jes@....com>,
	Richard J Moore <richardj_moore@...ibm.com>,
	William Cohen <wcohen@...hat.com>,
	"Martin J. Bligh" <mbligh@...igh.org>,
	Michel Dagenais <michel.dagenais@...ymtl.ca>,
	systemtap@...rces.redhat.com, ltt-dev@...fik.org
Subject: Re: [PATCH] Linux Kernel Markers 0.2 for Linux 2.6.17

* Frank Ch. Eigler (fche@...hat.com) wrote:
> Hi -
> 
> On Tue, Sep 19, 2006 at 03:36:24PM -0400, Mathieu Desnoyers wrote:
> > [...]
> > > If you don't allow yourself to presume on-the-fly function
> > > recompilation, then these markers would need to be made run-time
> > > rather than compile-time configurable.  That is, not like this:
> > > [...]
> 
> > By making them run-time configurable, I don't see any whay not to bloat the
> > kernel. How can be embed calls to printk+function+kprobe+djprobe without
> > having some kind of performance impact ?
> 
> In order to have what we appear to need, we cannot avoid having some
> impact.  (Even NOPs have impact.)
> 

I am all for giving this decision to the end-user or the distribution which will
configure the kernel. There is no "perfect" or "for all" solution that I am
aware of.

* Users debugging servers will more likely want the kprobe or jprobe option.
* Users interested in high performance tracing will want fprobe and/or jprobe.
* Users interested in embedded systems will want to avoid tools outside the
  kernel that rely on module loading : their kernel often not even support
  modules. -> fprobe

> Suppose that mbligh's clever but speculative idea has some nasty flaw,
> once someone tried to reduce it to code.  Do you see that markers
> along the lines you've posted would be unsatisfactory?  With that in
> mind, is there point adding such markers now?
> 

M. Bligh's idea is an interesting use of fprobes through modules that could make
dynamic tracing more effective for accessing local variables. It does not
change anything to the various needs of the above-mentioned class of users,
except that it may make life of high performance and server users easier. With
or without his idea, the goal of this marker mechanism is to meet all those
user's different needs.

Mathieu


OpenPGP public key:              http://krystal.dyndns.org:8080/key/compudj.gpg
Key fingerprint:     8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68 

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ