lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160907054805.GB25672@kroah.com>
Date:   Wed, 7 Sep 2016 07:48:06 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Shuah Khan <shuahkh@....samsung.com>
Cc:     rostedt@...dmis.org, mingo@...hat.com, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/3] kobject tracepoints

On Tue, Sep 06, 2016 at 02:19:17PM -0600, Shuah Khan wrote:
> On 09/06/2016 01:30 PM, Greg KH wrote:
> > On Tue, Sep 06, 2016 at 11:49:22AM -0600, Shuah Khan wrote:
> >> Add kobject trace points to track kobject operations: init, add, set_name,
> >> init_and_add, create_and_add, move, rename, get, put, cleanup, and del.
> >>
> >> Kobject trace points can aid in debugging, generating status and graphs
> >> on kobjects in the kernel and their hierarchy.
> > 
> > What type of "graphs"?  Isn't this just too noisy to ever find anything
> > "real"?
> 
> Parent and child relationship between kobjects can be useful information
> for debugging.

Sure, but those show up in sysfs already :)

> >> This patch series adds kobject tracepoints and adds calls to tracepoints
> >> from kobject init, add, set_name, init_and_add, create_and_add, move,
> >> rename, get, put, cleanup, and del operations.
> >>
> >> A suggestion to provide more visibility into kboject lifetimes came out of
> >> a discussion at my Embedded data structure lifetime talk at LinuxCon NA in
> >> Toronto. As I thought about on how to provide visibility, I decided adding
> >> traces provides a boot and run-time facility to trace kobject operations
> >> without needing compile special kernels and also without impacting run-time
> >> unless trace is enabled. Hence, this resulting patch series.
> >>
> >> Example traces:
> >>
> >> <...>-13632 [003] d... 11296.965114: kobject_get: KOBJECT: 1:0:0:0 (f
> >> fff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 19
> >>            <...>-13632 [003] d... 11296.965167: kobject_get: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 20
> >>            <...>-13632 [003] d... 11296.965218: kobject_get: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 21
> >>            <...>-13632 [003] d... 11296.965269: kobject_get: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 22
> >>           <idle>-0     [006] ..s. 11296.965378: kobject_put: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 21
> >>           <idle>-0     [006] .Ns. 11296.965542: kobject_put: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 20
> >>      ksoftirqd/6-46    [006] ..s. 11296.965633: kobject_put: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 19
> >>      ksoftirqd/6-46    [006] ..s. 11296.965703: kobject_put: KOBJECT: 1:0:0:0 (ffff88034aeb1348) state=1 parent= target1:0:0 (ffff88038c875db8) counter= 18
> >>
> >> Shuah Khan (3):
> >>   kobject: add kobject trace points
> >>   kobject: add kobject trace prototypes
> >>   kobject: Add calls to kobject trace points
> >>
> >>  include/trace/events/kobject.h | 259 +++++++++++++++++++++++++++++++++++++++++
> >>  lib/Makefile                   |   2 +-
> >>  lib/kobject.c                  |  22 ++++
> >>  lib/kobject_traces.c           |  32 +++++
> >>  4 files changed, 314 insertions(+), 1 deletion(-)
> >>  create mode 100644 include/trace/events/kobject.h
> >>  create mode 100644 lib/kobject_traces.c
> > 
> > I've strongly resisted tracepoints in the driver core, and kobjects,
> > because of the implicit "userspace API" guarantees that some people see
> > these as.  I notice that Al Viro just posted a proposal to the ksummit
> > mailing list to potentially talk about this very issue.
> 
> Yes. I saw that discussion topic coming in. I honestly didn't think that
> my patch series will result in a special KS topic :) However, I think it
> is a good idea to discuss it as general topic for what kind of kernel
> information should/should not be made visible via tracepoints.

Yes, your patchset just brought up the old topic again, it isn't
specific to these changes.

> We do support a wide range of tracepoints and events in various sub-systems
> skb.h, pagemap.h, and pagemap.h so on. Maybe it would be helpful to agree
> on some sort of guidelines for exposure.

I agree.  Until then I would like to hold off on these changes to
kobjects, or any other core bits I maintain.

> > I'm really curious as to exactly what these tracepoints can buy us,
> > other than drowning in them as devices are added and removed from the
> > system?  Isn't this just too noisy for any real use?
> 
> My main objective is for debugging lifetime related problems without
> adding debug overhead. Being able to debug unbalanced gets and puts
> for example. Yes this can get noisy for certain objects. 

You can always enable CONFIG_DEBUG_KOBJECT to see much of what you
wanted here, in the kernel log.  Not as "nice" as a tracepoint I know,
but it is there for debugging.

And almost no one should be worrying about the kobject level, that's
usually rare.  'struct device' lifetime rules are more common, but even
then, that's at the bus level so it too can be rare for developers to
care about once the bus code is up and running properly.

> > And again, I worry about people relying on them, as we have changed the
> > internals of kobjects at times over the years, I don't want to have to
> > worry about somehow keeping these tracepoints "identical" for the next
> > 40+ years.
> 
> Guess I never considered tracepoints as userspace API, anymore than debug
> messages. It is part of debug and only visible to root.

See the conversation on ksummit-discuss, they have been used as
userspace APIs in the past, and could not be changed because userspace
tools relied on them, and the field size/structures.  I don't want to
have that happen here as I saw all of the problems that occured then.

> In my mind it is mainly a debug information that would only make sense to
> kernel developers. That is why I didn't think about needing to keep the
> tracepoints identical. That said, if it is generally agreed that we shouldn't
> expose this kind of information to userspace, I will look into doing this
> in a different way.

CONFIG_DEBUG_KOBJECT?  :)

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ