lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20091124083423.GE21991@elte.hu>
Date:	Tue, 24 Nov 2009 09:34:23 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Li Zefan <lizf@...fujitsu.com>
Cc:	Pekka Enberg <penberg@...helsinki.fi>,
	Arjan van de Ven <arjan@...radead.org>,
	Eduard - Gabriel Munteanu <eduard.munteanu@...ux360.ro>,
	Peter Zijlstra <peterz@...radead.org>,
	Frederic Weisbecker <fweisbec@...il.com>,
	LKML <linux-kernel@...r.kernel.org>,
	"linux-mm@...ck.org" <linux-mm@...ck.org>
Subject: Re: [PATCH 0/5] perf kmem: Add more functions and show more
 statistics


* Li Zefan <lizf@...fujitsu.com> wrote:

> Ingo Molnar wrote:
> > * Pekka Enberg <penberg@...helsinki.fi> wrote:
> > 
> >> Hi Li,
> >>
> >> On Tue, Nov 24, 2009 at 7:25 AM, Li Zefan <lizf@...fujitsu.com> wrote:
> >>> Pekka, do you think we can remove kmemtrace now?
> >> One more use case I forgot to mention: boot time tracing. Much of the 
> >> persistent kernel memory footprint comes from the boot process which 
> >> is why it's important to be able to trace memory allocations 
> >> immediately after kmem_cache_init() has run. Can we make "perf kmem" 
> >> do that? Eduard put most of his efforts into making that work for 
> >> kmemtrace.
> > 
> > Would be lovely if someone looked at perf from that angle (and extended 
> > it).
> > 
> > Another interesting area would be to allow a capture session without a 
> > process context running immediately. (i.e. pre-allocate all the buffers, 
> > use them, for a later 'perf save' to pick it up.)
> > 
> > The two are kind of the same thing conceptually: a boot time trace is a 
> > preallocated 'process context less' recording, to be picked up after 
> > bootup.
> > 
> > [ It also brings us 'stability/persistency of event logging' - i.e. a 
> >   capture session could be started and guaranteed by the kernel to be 
> >   underway, regardless of what user-space does. ]
> > 
> > Btw., Arjan is doing a _lot_ of boot time tracing for Moblin, and he 
> > indicated it in the past that starting a perf recording session from 
> > an initrd is a pretty practical substitute as well. (I've Cc:-ed 
> > Arjan.)
> 
> It would be great if perf can be used for boot time tracing. This 
> needs pretty big work on kernel side.

What would be needed is to open per cpu events right after perf events 
initializes, and allocate memory for output buffers to them.

They would round-robin after that point, and we could use 
perf_event_open() (with a special flag) to 'attach' to them and mmap() 
them - at which point they'd turn into regular objects with a lot of 
boot time data in them.

Perhaps it should be possible to attach/detach from events in a flexible 
way, not just during bootup. (bootup tracing is just a special case of 
it.)

For example a 'flight recorder' could be started by creating the events 
and then detaching from them. Whenever some exception is flagged the 
monitoring context (whatever task that might be at that time - at 
whatever point in the future) could attach to it and save it to a file 
(or send it over any other transport of choice).

This would IMO mix the best of ftrace with the best of perf, for these 
usecases.

[ Certainly not a feature for the faint hearted :-) ]

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ