lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 1 Feb 2010 18:48:34 +0100
From:	Frederic Weisbecker <fweisbec@...il.com>
To:	Peter Zijlstra <peterz@...radead.org>
Cc:	Hitoshi Mitake <mitake@....info.waseda.ac.jp>,
	Ingo Molnar <mingo@...e.hu>, Paul Mackerras <paulus@...ba.org>,
	Arnaldo Carvalho de Melo <acme@...hat.com>,
	Thomas Gleixner <tglx@...utronix.de>,
	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: Lock dependency based tree report in perf lock

On Mon, Feb 01, 2010 at 09:25:04AM +0100, Peter Zijlstra wrote:
> On Sat, 2010-01-30 at 19:57 +0100, Frederic Weisbecker wrote:
> > On Sat, Jan 30, 2010 at 09:46:28AM +0100, Peter Zijlstra wrote:
> > > On Sat, 2010-01-30 at 00:17 +0100, Frederic Weisbecker wrote:
> > > > 
> > > > 
> > > > Anyway, that's just an idea, not trivial I must admit.
> > > 
> > > lockdep actually collects all this information, so writing it out isn't
> > > too hard.
> > 
> > 
> > 
> > Lockdep collects the theorical dependencies but not the practical
> > scenarios.
> > 
> > Say B and C depend on A, you'll get:
> > 
> >    A
> >   / \
> >  B   C
> > 
> > But nothing can tell you that if A is taken, B and C will always
> > be taken. You may have different scenarios based on this dependency,
> > which is not something that lockdep logs, right?
> 
> Right. But we keep track of the full held lock stack, which is what was
> requested.



Ah, I see what you mean. Yeah we have that, but it is a runtime check
feature, and the representation is linear. We should not add further
tracepoint based on this to get the possible scenarios of locking,
we should rather deduce them from the current tracepoints we have.

Would be a bad idea to add even more overhead.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ