lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 2 Nov 2006 07:34:36 -0500
From:	Livio Soares <livio@...g.toronto.edu>
To:	FENG ZHOU <zhfeng.osprey@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: How to optimize system time for such case?

  Hi Feng,

FENG ZHOU writes:
> Hello, all
> I am optimizing a compiler and I believe there is a bug in such
> compile. Currently, I have a test case, which is a scientific
> application, has a lot of system time. This is weird, because this
> case does not have many system calls. Meanwhile, compiled at another
> option, I found all the "system time" are gone! So, I assume there is
> some problem in the first one (though both binary produce correct
> result). I used some performance tuning tool and found the hottest
> address for CPU privilege level change event is: 0xa000000100001a70.
> This address is not in code or data segment. Now, I am kinda stuck
> here. My question is: how to find what this address is? Or find out
> what is the cause of the "system time"? Thanks in advance.
>
> PS: the platform is Itanium 2.

  This address is from inside the kernel.  On the Itanium arch, kernel starts at
0xa000000100000000

  So you  want the to  see what  function in your  kernel is at  address 0x1a70.
Looking at arch/ia64/kernel/ivt.S, it could either be an "Instruction Key Miss",
which starts  at address  0x1800, but  I'm not sure  that function  reaches your
address. Also, the "page_fault" code is  right below the ikey_miss code, so that
could be  a culprit. To make sure,  please get your kernel  binary (vmlinux) and
disassemble it with objdump. Check in which function the 0x1a70 address lies.

  If  it's a  "Instruction Key  Miss",  your compiler  is _probably_  generating
instructions  incorrectly. If  it's page-faults,  well, data  is  being accessed
differently. 

  Also, Oprofile is a tool that is worth learning how to use:
http://oprofile.sf.net/

  good luck,

		Livio


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ