lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100201072752.GB12039@elte.hu>
Date:	Mon, 1 Feb 2010 08:27:52 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Frederic Weisbecker <fweisbec@...il.com>
Cc:	Hitoshi Mitake <mitake@....info.waseda.ac.jp>,
	linux-kernel@...r.kernel.org,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Arnaldo Carvalho de Melo <acme@...hat.com>,
	Tom Zanussi <tzanussi@...il.com>,
	Jens Axboe <jens.axboe@...cle.com>,
	Paul Mackerras <paulus@...ba.org>,
	Anton Blanchard <anton@...ba.org>,
	Mike Galbraith <efault@....de>,
	Steven Rostedt <rostedt@...dmis.org>
Subject: Re: [PATCH 00/12 v2] perf lock: New subcommand "perf lock", for
 analyzing lock statistics


* Frederic Weisbecker <fweisbec@...il.com> wrote:

> On Sun, Jan 31, 2010 at 09:29:53AM +0100, Ingo Molnar wrote:
> > 
> > FYI, i've applied a file/line-less version of 'perf lock' to perf/core today.
> > 
> > The basic workflow is the usual:
> > 
> >   perf lock record sleep 1     # or some other command
> >   perf lock report             # or 'perf lock trace'
> > 
> > [ I think we can do all the things that file/line can do with a less intrusive 
> >   (and more standard) call-site-IP based approach. For now we can key off the 
> >   names of the locks, that's coarser but also informative and allows us to 
> >   progress.
> > 
> >   I've renamed 'perf lock prof' to 'perf lock report' - which is more in line 
> >   with other perf tools. ]
> > 
> > The tool clearly needs more work at the moment: i have tried perf lock on a 16 
> > cpus box, and it was very slow, while it didnt really record all that many 
> > events to justify the slowdown. A simple:
> > 
> >   perf lock record sleep 1
> > 
> > makes the system very slow and requires a Ctrl-C to stop:
> > 
> >  # time perf lock record sleep 1
> >  ^C[ perf record: Woken up 0 times to write data ]
> >  [ perf record: Captured and wrote 5.204 MB perf.data (~227374 samples) ]
> > 
> >   real	0m11.941s
> >   user	0m0.020s
> >   sys	0m11.661s
> > 
> > (The kernel config i used witht that is attached.)
> > 
> > My suspicion is that the overhead of CONFIG_LOCK_STAT based tracing is way too 
> > high at the moment, and needs to be reduced. I have removed the '-R' option 
> > from perf lock record (which it got from perf sched where it makes sense but 
> > here it's not really needed and -R further increases overhead), but that has 
> > not solved the slowdown.
> 
> 
> 
> Hmm, -R is mandatory if you want the raw sample events, otherwise the
> event is just a counter.
> 
> May be you mean -M ? Sure -M is going to be a noticeable overhead
> in 16 cores.

Yeah, i meant and tested -M.

> Anyway, I'm looking closely into improving the lock events to
> reduce all this overhead. I'll create a lock_init event so
> that we can gather the heavy informations there (especially
> the name of the lock).
> 
> Also, using TRACE_EVENT_FN lets us register a callback when
> a tracepoint gets registered, I'm going to try to synthetize
> the missing lock_init() events here.

Ok, thanks for looking into this!

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ