Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754527AbZCEN2r (ORCPT ); Thu, 5 Mar 2009 08:28:47 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750796AbZCEN2i (ORCPT ); Thu, 5 Mar 2009 08:28:38 -0500 Received: from mx3.mail.elte.hu ([157.181.1.138]:60268 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750728AbZCEN2h (ORCPT ); Thu, 5 Mar 2009 08:28:37 -0500 Date: Thu, 5 Mar 2009 14:28:07 +0100 From: Ingo Molnar To: "K.Prasad" Cc: Frederic Weisbecker , Andrew Morton , Linux Kernel Mailing List , Alan Stern , Roland McGrath Subject: Re: [patch 11/11] ftrace plugin for kernel symbol tracing using HW Breakpoint interfaces Message-ID: <20090305132807.GA4322@elte.hu> References: <20090305043440.189041194@linux.vnet.ibm.com> <20090305044333.GM17747@in.ibm.com> <20090305063703.GB5359@nowhere> <20090305091611.GB16026@elte.hu> <20090305131538.GA32076@in.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20090305131538.GA32076@in.ibm.com> User-Agent: Mutt/1.5.18 (2008-05-17) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2852 Lines: 85 * K.Prasad wrote: > On Thu, Mar 05, 2009 at 10:16:11AM +0100, Ingo Molnar wrote: > > > > * Frederic Weisbecker wrote: > > > > > On Thu, Mar 05, 2009 at 10:13:33AM +0530, prasad@linux.vnet.ibm.com wrote: > > > > This patch adds an ftrace plugin to detect and profile memory access over > > > > kernel variables. It uses HW Breakpoint interfaces to 'watch memory > > > > addresses. > > > > > > > > Signed-off-by: K.Prasad > > > > --- > > > > > > > > > Hi, > > > > > > Nice feature. And moreover the standardized hardware > > > breakpoints could be helpful for tracing. > > > > yeah. The feature is much more alive now. > > > > > Just some comments below. > > > > One other thing: > > > > +#ifdef CONFIG_FTRACE_SELFTEST > > +int trace_selftest_startup_ksym(struct tracer *trace, struct trace_array *tr) > > +{ > > + /* TODO: Will be implemented later */ > > + return 0; > > +} > > +#endif /* CONFIG_FTRACE_SELFTEST */ > > > > This needs to be implemented before i can pick the code up into > > tip:tracing, as otherwise we will not notice it fast enough if > > some of this stuff breaks. > > > > Basically the ftrace plugin will be the main usage vector of > > this facility, so the self-test is a must-have. > > > > Looks very nice otherwise. > > > > Ingo > > Thanks for the comments. > > Test-cases for the hardware breakpoint interfaces can be the following: > > - Basic sanity test to check if the API is intact > - Perform various types of memory accesses, like read, write (I/O and > others when implemented) on a dummy kernel variable and verify the > trigger of the exception handler. > > While the above can be a part of trace_selftest_startup_ksym(), > rigorous testing would involve: > > i) stressing the HW breakpoint infrastructure to confirm sane behaviour > when interoperated with other users of a)breakpoint register b)the > do_debug() exception. This will involve simultaneous use of kprobes, > hardware breakpoint interface and requests from user-space (say through > GDB). > ii) Verifying successful HB_NUM number of register_ requests. > iii) Verifying right priority resolution, and handling user-space > requests. > > These, in my opinion, would better fit in a full-featured > test-suite such as LTP, as opposed to startup testing in > ftrace. sure. It's just a quick self-test to make sure basic functionality is ok. > I will implement trace_selftest_startup_ksym() to contain the > first two test-cases in the next iteration of this code. Thanks. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/