ksummit.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Catalin Marinas <catalin.marinas@arm.com>
To: ksummit-discuss@lists.linuxfoundation.org
Subject: [Ksummit-discuss] [CORE TOPIC] Run-time kernel checking
Date: Sat, 10 May 2014 11:04:25 +0100	[thread overview]
Message-ID: <C03F79D0-8FF8-43B9-B77A-3648640380E2@arm.com> (raw)

There is already a topic proposed on static checking (sparse, coverity)
but I would like to propose a complementary one: run-time checking.

Linux has several run-time checking tools to spot potential problems
before actually causing a kernel crash: lockdep, spinlock debugging, RCU
debugging, memory poisoning, kmemcheck, kmemleak etc. Some of these are
simpler (e.g. poisoning), others are more complex and have significant
run-time overhead.

What I would like to get out of such discussion:

1. Which tools do people use on a regular basis? How useful are they?
2. Use-cases and feedback on how they can be improved (e.g. better
   reporting, more information, lower overhead)
3. What else do we miss? Can we borrow ideas from other tools? How
   feasible would it be (e.g. helgrind-like tool in the kernel)?

People for this topic: at least the maintainers of the existing run-time
checkers (and I’m sure I missed many others):

Peter Zijlstra (lockdep)
Ingo Molnar (lockdep)
Paul E. McKenney (RCU)
Dipankar Sarma (RCU)
Vegard Nossum (kmemcheck)
Pekka Enberg (kmemcheck)
Catalin Marinas (kmemleak)

However, rather than a discussion between the above maintainers, the aim
is to get feedback from users of these tools and ideas for new tools
(hence the core topic tag).

Thanks,

Catalin

             reply	other threads:[~2014-05-10 10:04 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-05-10 10:04 Catalin Marinas [this message]
2014-05-12  9:33 ` Li Zefan
2014-05-15 13:23   ` Catalin Marinas

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=C03F79D0-8FF8-43B9-B77A-3648640380E2@arm.com \
    --to=catalin.marinas@arm.com \
    --cc=ksummit-discuss@lists.linuxfoundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox