lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200313115100.3gdbfxkplrbe6wvy@two.firstfloor.org>
Date:   Fri, 13 Mar 2020 04:51:02 -0700
From:   Andi Kleen <andi@...stfloor.org>
To:     Andy Lutomirski <luto@...capital.net>
Cc:     Andi Kleen <andi@...stfloor.org>, x86@...nel.org,
        linux-kernel@...r.kernel.org, Andi Kleen <ak@...ux.intel.com>
Subject: Re: [PATCH] x86: Add trace points to (nearly) all vectors

On Thu, Mar 12, 2020 at 04:39:04PM -0700, Andy Lutomirski wrote:
> 
> > On Mar 12, 2020, at 4:19 PM, Andi Kleen <andi@...stfloor.org> wrote:
> > 
> > From: Andi Kleen <ak@...ux.intel.com>
> > 
> > In some scenarios it can be useful to count or trace every kernel
> > entry.
> 
> Can you elaborate?  What problem does this solve?

So that we know how often or where kernel entries happen,
how long every kernel execution is, and also can do an accurate break
down.

> 
> > Most entry paths are covered by trace points already,
> > but some of the more obscure entry points do not have
> > trace points.
> > 
> > The most common uncovered one was KVM async page fault.
> 
> NAK.  This path is going away. 

Okay. Can you provide details? When will it go away?

Anyways KVM async is just one case, my patch covers lots of other cases
too. Even if KVM async goes away it still makes sense
for the other entry points and can be easily rebased (just drop
that hunk)

-Andi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ