From: Li Zefan <lizefan@huawei.com>
To: Catalin Marinas <catalin.marinas@arm.com>
Cc: ksummit-discuss@lists.linuxfoundation.org
Subject: Re: [Ksummit-discuss] [CORE TOPIC] Run-time kernel checking
Date: Mon, 12 May 2014 17:33:37 +0800 [thread overview]
Message-ID: <53709571.9020204@huawei.com> (raw)
In-Reply-To: <C03F79D0-8FF8-43B9-B77A-3648640380E2@arm.com>
On 2014/5/10 18:04, Catalin Marinas wrote:
> There is already a topic proposed on static checking (sparse, coverity)
> but I would like to propose a complementary one: run-time checking.
>
> Linux has several run-time checking tools to spot potential problems
> before actually causing a kernel crash: lockdep, spinlock debugging, RCU
> debugging, memory poisoning, kmemcheck, kmemleak etc. Some of these are
> simpler (e.g. poisoning), others are more complex and have significant
> run-time overhead.
>
> What I would like to get out of such discussion:
>
> 1. Which tools do people use on a regular basis? How useful are they?
> 2. Use-cases and feedback on how they can be improved (e.g. better
> reporting, more information, lower overhead)
> 3. What else do we miss? Can we borrow ideas from other tools? How
> feasible would it be (e.g. helgrind-like tool in the kernel)?
>
> People for this topic: at least the maintainers of the existing run-time
> checkers (and I’m sure I missed many others):
>
> Peter Zijlstra (lockdep)
> Ingo Molnar (lockdep)
> Paul E. McKenney (RCU)
> Dipankar Sarma (RCU)
> Vegard Nossum (kmemcheck)
> Pekka Enberg (kmemcheck)
> Catalin Marinas (kmemleak)
>
> However, rather than a discussion between the above maintainers, the aim
> is to get feedback from users of these tools and ideas for new tools
> (hence the core topic tag).
>
I'm interested in this topic.
I saw some modified run-time checking tools in Huawei. For example a simplified
lockdep feature, they said they did some benchmarks and decided they can bear
the overhead in product environment.
Another one is supporting re-enablement of kmemleak, which you already saw the
patch and expressed your NACK.
https://lkml.org/lkml/2014/1/17/102
We also wanted kmemcheck smp support, because in that product the system can't
work in UP.
next prev parent reply other threads:[~2014-05-12 9:34 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-05-10 10:04 [Ksummit-discuss] [CORE TOPIC] Run-time kernel checking Catalin Marinas
2014-05-12 9:33 ` Li Zefan [this message]
2014-05-15 13:23 ` Catalin Marinas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=53709571.9020204@huawei.com \
--to=lizefan@huawei.com \
--cc=catalin.marinas@arm.com \
--cc=ksummit-discuss@lists.linuxfoundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.