[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20071210002851.GA21871@Krystal>
Date: Sun, 9 Dec 2007 19:28:51 -0500
From: Mathieu Desnoyers <compudj@...stal.dyndns.org>
To: Ingo Molnar <mingo@...e.hu>
Cc: akpm@...ux-foundation.org, linux-kernel@...r.kernel.org,
Thomas Gleixner <tglx@...utronix.de>,
"H. Peter Anvin" <hpa@...or.com>,
Arjan van de Ven <arjan@...radead.org>
Subject: Re: [patch-early-RFC 00/10] LTTng architecture dependent
instrumentation
* Mathieu Desnoyers (mathieu.desnoyers@...ymtl.ca) wrote:
> * Ingo Molnar (mingo@...e.hu) wrote:
> >
> > hi Mathieu,
> >
> > * Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca> wrote:
> >
> > > Hi,
> > >
> > > Here is the architecture dependent instrumentation for LTTng. [...]
> >
> > A fundamental observation about markers, and i raised this point many
> > many months ago already, so it might sound repetitive, but i'm unsure
> > wether it's addressed. Documentation/markers.txt still says:
> >
> > | * Purpose of markers
> > |
> > | A marker placed in code provides a hook to call a function (probe)
> > | that you can provide at runtime. A marker can be "on" (a probe is
> > | connected to it) or "off" (no probe is attached). When a marker is
> > | "off" it has no effect, except for adding a tiny time penalty
> > | (checking a condition for a branch) and space penalty (adding a few
> > | bytes for the function call at the end of the instrumented function
> > | and adds a data structure in a separate section).
> >
> > could you please eliminate the checking of the flag, and insert a pure
> > NOP sequence by default (no extra branches), which is then patched in
> > with a function call instruction sequence, when the trace point is
> > turned on? (on architectures that have code patching infrastructure -
> > such as x86)
> >
>
> Hi Ingo,
>
[...]
> * No marker at all
>
> 240300 cycles total
> 12.02 cycles per loop
>
[...]
> * With my marker implementation (load immediate 0, branch predicted) :
>
> between 200355 and 200580 cycles total (avg 200400 cycles)
> 10.02 cycles per loop (yes, adding the marker increases performance)
>
[...]
> * With NOPs :
>
> avg around 410000 cycles total
> 20.5 cycles/loop (slowdown of 2)
>
>
[...]
> Therefore, because of the cost of stack setup, the load immediate and
> conditionnal branch seems to be _much_ faster than the NOP alternative.
>
I wanted to know what clever things the dtrace guys have done, so I just
dug into the dtrace code today, and it isn't pretty for x86.
For the kernel sdt (static dtrace), the closest match to markers, they :
1 - Use the linker to turn the calls to an undefined symbol into
"0x90 0x90 0x90 0x90 0x90" (5 nops)
(note that they still suffer from the stack setup cost even when
disabled. Therefore, performance-wise, I think the markers are already
faster)
But let's dig deeper..
2 - When what they call a "provider" is actvated, the first byte of the
"instruction" (actually, it would be the second NOP) is changed for a f0
lock prefix) :
"0x90 0xf0 0x90 0x90 0x90"
3 - When this site is hit, the 0xf0 0x90 instruction will produce an
illegal op fault. In the handler, they emulate a trap by incrementing
EIP of the size of the illegal op. They lookup the faulty EIP in a hash
table to know which site caused it and then they call the dtrace_probe
function to call the consumers from there.
So, if I have not missed anything, they will have the performance cost
of a fault and a hash table lookup on the critical path, which is kind
of dumb. Just the fault adds a few thousand cycles (assuming it will
perform like an int3 breakpoint).
Compared to this, my approach of load immediate + branch when disabled
and the added function call when enabled are _much_ more lighweight.
I guess the dtrace approach is good enough on sparc (except for stack
setup cost when disabled), where they patch the 4 bytes nop into a 4
byte function call and manage to get good performance, but the hack they
are doing on x86 seems to be just too slow.
Mathieu
--
Mathieu Desnoyers
Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists