From: Catalin Marinas <catalin.marinas@arm.com>
To: ksummit-discuss@lists.linuxfoundation.org
Subject: [Ksummit-discuss] [CORE TOPIC] Run-time kernel checking
Date: Sat, 10 May 2014 11:04:25 +0100 [thread overview]
Message-ID: <C03F79D0-8FF8-43B9-B77A-3648640380E2@arm.com> (raw)
There is already a topic proposed on static checking (sparse, coverity)
but I would like to propose a complementary one: run-time checking.
Linux has several run-time checking tools to spot potential problems
before actually causing a kernel crash: lockdep, spinlock debugging, RCU
debugging, memory poisoning, kmemcheck, kmemleak etc. Some of these are
simpler (e.g. poisoning), others are more complex and have significant
run-time overhead.
What I would like to get out of such discussion:
1. Which tools do people use on a regular basis? How useful are they?
2. Use-cases and feedback on how they can be improved (e.g. better
reporting, more information, lower overhead)
3. What else do we miss? Can we borrow ideas from other tools? How
feasible would it be (e.g. helgrind-like tool in the kernel)?
People for this topic: at least the maintainers of the existing run-time
checkers (and I’m sure I missed many others):
Peter Zijlstra (lockdep)
Ingo Molnar (lockdep)
Paul E. McKenney (RCU)
Dipankar Sarma (RCU)
Vegard Nossum (kmemcheck)
Pekka Enberg (kmemcheck)
Catalin Marinas (kmemleak)
However, rather than a discussion between the above maintainers, the aim
is to get feedback from users of these tools and ideas for new tools
(hence the core topic tag).
Thanks,
Catalin
next reply other threads:[~2014-05-10 10:04 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-05-10 10:04 Catalin Marinas [this message]
2014-05-12 9:33 ` Li Zefan
2014-05-15 13:23 ` Catalin Marinas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=C03F79D0-8FF8-43B9-B77A-3648640380E2@arm.com \
--to=catalin.marinas@arm.com \
--cc=ksummit-discuss@lists.linuxfoundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox