lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E1C1A0D.8000707@redhat.com>
Date:	Tue, 12 Jul 2011 12:55:25 +0300
From:	Avi Kivity <avi@...hat.com>
To:	Joerg Roedel <joro@...tes.org>
CC:	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Will Deacon <will.deacon@....com>,
	Frederic Weisbecker <fweisbec@...il.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"kvm@...r.kernel.org" <kvm@...r.kernel.org>,
	Ingo Molnar <mingo@...e.hu>,
	"acme@...stprotocols.net" <acme@...stprotocols.net>,
	Jason Wessel <jason.wessel@...driver.com>
Subject: Re: [PATCH 1/3] perf: add context field to perf_event

On 07/12/2011 12:48 PM, Joerg Roedel wrote:
> On Tue, Jul 12, 2011 at 12:44:17PM +0300, Avi Kivity wrote:
> >  On 07/12/2011 12:41 PM, Joerg Roedel wrote:
> >>  >   Using TIF_bits sounds like a much better solution for this, wakeups are
> >>  >   really rather expensive and its best to avoid extra if at all possible.
> >>
> >>  I would rather vote for Avi's solution too. Such a functionality is very
> >>  helpful for LWP-perf integration as well (because we need a way to call
> >>  do_mmap for a task != current).
> >>
> >
> >  It's not needed for that.  See use_mm() (caller must be a kernel thread).
>
> But in our case the caller would be the process that wants to count, not
> a kernel thread.
>

Have a helper kernel thread do it for you.  Or extend use_mm() to return 
the old mm (without dropping its refcount) and add a way to restore it.

Regarding LWP - I thought the intent was self-profiling by the process 
for jits and the like?  If you also use it for perf, won't it be 
unusable for that?  Also, can't the process interfere, from userspace, 
by executing the unprivileged LWP instructions?

-- 
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ