Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp583579imu; Thu, 22 Nov 2018 02:12:57 -0800 (PST) X-Google-Smtp-Source: AFSGD/XhCx1XkCymOhEsSHangtcnOCNMuE8H4NXmJsvOzhV3+zh45nk8Kd8ZJZPur8yba+HtpdS2 X-Received: by 2002:a63:1c09:: with SMTP id c9mr9381294pgc.200.1542881577559; Thu, 22 Nov 2018 02:12:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542881577; cv=none; d=google.com; s=arc-20160816; b=F9oHGJV2iKjZPIe8gleZ8EiM6IwV6F4wzKAAxueDqsiOqUM02GCeBZlQXtiY+xc+As hTYxJqP/xunc4tv0Vj+F5zk6n73OhArQT1LUpHnZ/9z65qWaLsxJ3Au5L88BS7kdFcwR VusND52IxtO7uXcBijVPvLkTqdOD5MwCL4tfvgCjt8Ujuf/UW1CvGYHAOIErMNYsY/46 6+DLJVShnyYhToNXRJ6fR06pQmptwNaOoRL1AeeiDKl9TIPNg842bJ14FnDLgGJKGIVh eoDwEuJTvI6pMXiRrSalHhvtYK4/vTo9kJ1LuTsk/HrXZr3lXGK2BmywVvMXWVbrGUHJ PFhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=wNUq75o5o6zHHPdUhKWdu9H60S7hdZrUOMIOdcwo1q4=; b=drbOmZ/HwnHz+FnJ1QCE5iD1ryIlgqRJw9rz34oZ/fTemA6gE0xKuYIyCSdS5f2Vq8 3ppk5j6pgjlVL47Msd4cf/UkGZCzzqu/KV0iR+0LWdFiePuoF0//dyFBPEzbfKYVUY0P 0iK81mzo7Zvvw5Mq0Oay9iwmgh/51YlytH1Cx655USVQw6CinUXGsVndblYqm00x/l8l UX1/UzQgHIUvUzKn85igRfiAMfMHkO8OmpsVIHizoxXbDKIv8IDmH+JfwQqPI6pEltpB /x3NKhwO+FPjP4gFr8J6LoMhMxjG/yH+3o89V/nVhnDO7TaU668jwD9Wx8Pkik1OawWm yRwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="Lyn/e36M"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a68si11659450pla.267.2018.11.22.02.12.42; Thu, 22 Nov 2018 02:12:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="Lyn/e36M"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388168AbeKVJ6Y (ORCPT + 99 others); Thu, 22 Nov 2018 04:58:24 -0500 Received: from mail-vs1-f67.google.com ([209.85.217.67]:33750 "EHLO mail-vs1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731684AbeKVJ6Y (ORCPT ); Thu, 22 Nov 2018 04:58:24 -0500 Received: by mail-vs1-f67.google.com with SMTP id p74so4313785vsc.0 for ; Wed, 21 Nov 2018 15:21:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wNUq75o5o6zHHPdUhKWdu9H60S7hdZrUOMIOdcwo1q4=; b=Lyn/e36MpU84kl+WZZNvYqe2RoVsh70oyd0yFsJHCD/KYVZk4CNlr/0umKKTJtM2fk Yum5w7aVBUqc1dAo8tot66cX0fW1sOQTPocjTEInyIT4MRTFjfR5VnPtguNCxfQlebbK g64a7JR6CO958AD8xJdOQ9wKGfMGACXeXJ3XRCU0RkdzIEQy/12UFTnmKN3LPDjczLZB LDkggmpFIV2sFoKMQ6ZQendfgLC/xDTGztgfqVetuYuCP/hVoPiKDxWe88SoN9qAX3+V bDltj4kkZlllFcJzgKFdhqLo7ZokzT4+S+uG6k7063HpqZl5g2/GOkIOIs+hornSdroD I14Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wNUq75o5o6zHHPdUhKWdu9H60S7hdZrUOMIOdcwo1q4=; b=FmDLA5ws5Ad0dINR2uu9JjeZBhkQIi8QtVfnwQVTLa4qNBt2N02aD/rftmSLJEOcdF +uWkLuJTjF80i8b7LWt1sdA0s/LbJ6Y4ekPzPpNqFlvIvD6YAZPnqR4zUv9ccMm7I6Gl SpoME7qNxvILUqgZbsvHNmLYRO+Mbe0pQj0WFUrutoKVOrLG4EvyBJr8eDQ2XMgbhDpX wB1iJ65ItFAmlsHlEK4oh036gvdKX0GPq9qli9GdLw/TCVzy5WBm13ziIlCrsuumA0Be gx66+88er2Qre6Ft096VWwsDa2JE5UY3TzRYsysPZ9z/0PclDmWaZgI/EZXPS2LWGFaw WF3Q== X-Gm-Message-State: AGRZ1gLaxQTN/0P70qWZpp97TtPnq5SfKQv9dzjJyNQyEzY6GVRTjQfe SBcgBnKWHd76Hq40CIYapERfUTQ99e1DncDyLhr2/A== X-Received: by 2002:a67:105:: with SMTP id 5mr3623076vsb.183.1542842512322; Wed, 21 Nov 2018 15:21:52 -0800 (PST) MIME-Version: 1.0 References: <20181121201452.77173-1-dancol@google.com> <20181121205428.165205-1-dancol@google.com> <20181121141220.0e533c1dcb4792480efbf3ff@linux-foundation.org> <20181121145043.fa029f4f91afddc2a10bb81e@linux-foundation.org> In-Reply-To: <20181121145043.fa029f4f91afddc2a10bb81e@linux-foundation.org> From: Daniel Colascione Date: Wed, 21 Nov 2018 15:21:40 -0800 Message-ID: Subject: Re: [PATCH v2] Add /proc/pid_gen To: Andrew Morton Cc: linux-kernel , Linux API , Tim Murray , Primiano Tucci , Joel Fernandes , Jonathan Corbet , Mike Rapoport , Vlastimil Babka , Roman Gushchin , Prashant Dhamdhere , "Dennis Zhou (Facebook)" , "Eric W. Biederman" , rostedt@goodmis.org, tglx@linutronix.de, mingo@kernel.org, linux@dominikbrodowski.net, jpoimboe@redhat.com, Ard Biesheuvel , Michal Hocko , Stephen Rothwell , ktsanaktsidis@zendesk.com, David Howells , "open list:DOCUMENTATION" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 21, 2018 at 2:50 PM Andrew Morton wrote: > > On Wed, 21 Nov 2018 14:40:28 -0800 Daniel Colascione wrote: > > > On Wed, Nov 21, 2018 at 2:12 PM Andrew Morton wrote: > > > > > > On Wed, 21 Nov 2018 12:54:20 -0800 Daniel Colascione wrote: > > > > > > > Trace analysis code needs a coherent picture of the set of processes > > > > and threads running on a system. While it's possible to enumerate all > > > > tasks via /proc, this enumeration is not atomic. If PID numbering > > > > rolls over during snapshot collection, the resulting snapshot of the > > > > process and thread state of the system may be incoherent, confusing > > > > trace analysis tools. The fundamental problem is that if a PID is > > > > reused during a userspace scan of /proc, it's impossible to tell, in > > > > post-processing, whether a fact that the userspace /proc scanner > > > > reports regarding a given PID refers to the old or new task named by > > > > that PID, as the scan of that PID may or may not have occurred before > > > > the PID reuse, and there's no way to "stamp" a fact read from the > > > > kernel with a trace timestamp. > > > > > > > > This change adds a per-pid-namespace 64-bit generation number, > > > > incremented on PID rollover, and exposes it via a new proc file > > > > /proc/pid_gen. By examining this file before and after /proc > > > > enumeration, user code can detect the potential reuse of a PID and > > > > restart the task enumeration process, repeating until it gets a > > > > coherent snapshot. > > > > > > > > PID rollover ought to be rare, so in practice, scan repetitions will > > > > be rare. > > > > > > In general, tracing is a rather specialized thing. Why is this very > > > occasional confusion a sufficiently serious problem to warrant addition > > > of this code? > > > > I wouldn't call tracing a specialized thing: it's important enough to > > justify its own summit and a whole ecosystem of trace collection and > > analysis tools. We use it in every day in Android. It's tremendously > > helpful for understanding system behavior, especially in cases where > > multiple components interact in ways that we can't readily predict or > > replicate. Reliability and precision in this area are essential: > > retrospective analysis of difficult-to-reproduce problems involves > > puzzling over trace files and testing hypothesis, and when the trace > > system itself is occasionally unreliable, the set of hypothesis to > > consider grows. I've tried to keep the amount of kernel infrastructure > > needed to support this precision and reliability to a minimum, pushing > > most of the complexity to userspace. But we do need, from the kernel, > > reliable process disambiguation. > > > > Besides: things like checkpoint and restart are also non-core > > features, but the kernel has plenty of infrastructure to support them. > > We're talking about a very lightweight feature in this thread. > > I'm still not understanding the seriousness of the problem. Presumably > you've hit problems in real-life which were serious and frequent enough > to justify getting down and writing the code. Please share some sob stories > with us! The problem here is the possibility of confusion, even if it's rare. Does the naive approach of just walking /proc and ignoring the possibility of PID reuse races work most of the time? Sure. But "most of the time" isn't good enough. It's not that there are tons of sob stories: it's that without completely robust reporting, we can't rule out of the possibility that weirdness we observe in a given trace is actually just an artifact from a kinda-sort-working best-effort trace collection system instead of a real anomaly in behavior. Tracing, essentially, gives us deltas for system state, and without an accurate baseline, collected via some kind of scan on trace startup, it's impossible to use these deltas to robustly reconstruct total system state at a given time. And this matters, because errors in reconstruction (e.g., assigning a thread to the wrong process because the IDs happen to be reused) can affect processing of the whole trace. If it's 3am and I'm analyzing the lone trace from a dogfooder demonstrating a particularly nasty problem, I don't want to find out that the trace I'm analyzing ended up being useless because the kernel's trace system is merely best effort. It's very cheap to be 100% reliable here, so let's be reliable and rule out sources of error. > > > Which userspace tools will be using pid_gen? Are the developers of > > > those tools signed up to use pid_gen? > > > > I'll be changing Android tracing tools to capture process snapshots > > using pid_gen, using the algorithm in the commit message. > > Which other tools could use this and what was the feedback from their > developers? I'm going to have Android's systrace and Perfetto use this approach. Exactly how many tools signed up to use this feature do you need? > Those people are the intended audience and the > best-positioned reviewers so let's hear from them? I'm writing plenty of trace analysis tools myself, so I'm part of this intended audience. Other tracing tool authors have told me about out-of-tree hacks for process atomic snapshots via ftrace events. This approach avoids the necessity of these more-invasive hacks.