[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1264643539.5068.62.camel@localhost.localdomain>
Date: Wed, 27 Jan 2010 17:52:19 -0800
From: Jim Keniston <jkenisto@...ibm.com>
To: Ingo Molnar <mingo@...e.hu>
Cc: Peter Zijlstra <peterz@...radead.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Tom Tromey <tromey@...hat.com>,
Kyle Moffett <kyle@...fetthome.net>,
"Frank Ch. Eigler" <fche@...hat.com>,
Oleg Nesterov <oleg@...hat.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Stephen Rothwell <sfr@...b.auug.org.au>,
Fr??d??ric Weisbecker <fweisbec@...il.com>,
LKML <linux-kernel@...r.kernel.org>,
Steven Rostedt <rostedt@...dmis.org>,
Arnaldo Carvalho de Melo <acme@...hat.com>,
linux-next@...r.kernel.org, "H. Peter Anvin" <hpa@...or.com>,
utrace-devel@...hat.com, Thomas Gleixner <tglx@...utronix.de>
Subject: Re: linux-next: add utrace tree
On Wed, 2010-01-27 at 09:54 +0100, Ingo Molnar wrote:
...
> I think the best solution for user probes (by far) is to use a simplified
> in-kernel instruction emulator for the few common probes instruction. (Kprobes
> already partially decodes x86 instructions to make it safe to apply
> accelerated probes and there's other decoding logic in the kernel too.)
>
> The design and practical advantages are numerous:
>
> - People want to probe their function prologues most of the time ...
> a single INT3 there will in most cases just hit the initial stack
> allocation and that's it.
Yes, emulating "push %ebp" would buy us a lot of coverage for a lot of
apps on x86 (but see below**). Even there, though, we'd have to address
the page fault we'd occasionally get when extending the stack vma.
> We could get quite good coverage (and very fast
> emulation) for the common case in not too much code - and much of that code
> we already have available. No re-trapping,
As previously discussed, boosting would also get rid of the single-step
trap for most instructions.
> no extra instruction patching
x86_64 rip-relative instructions are the only ones we alter.
> and complex maintenance of trampolines.
>
> - It's as transparent as it gets - no user-space trampoline or other visible
> state that modifies behavior or can be stomped upon by user-space bugs.
The XOL vma isn't writable from user space, so I can't think of how it
could be clobbered merely by a stray memory reference. Yes, it's a vma
that the unprobed app would never have; and yes, a malicious app or
kernel module could remove it or alter the protection and scribble on
it. We don't try to defend the app against such malicious attacks, but
we do our best to ensure that the kernel side handles such attacks
gracefully.
>
> - Lightweight and simple probe insertion: no weird setup sequence needing the
> stopping of all tasks to install the trampoline. We just add the INT3 and
> off you go.
FWIW, we don't stop all threads to set up or extend the XOL vma, which
is typically a one-time event. We just grab a mutex, in case multiple
threads hit previously-unhit probepoints simultaneously, and
simultaneously decide that the XOL area needs to be created or extended.
>
> - Emulation is evidently thread-safe, SMP-safe, etc. as it only acts on
> task local state.
The posted uprobes implementation is, so far as we can tell through code
inspection and testing, also thread-safe and SMP-safe.
>
> - The points we can probe are never truly limited as it's all freely
> upscalable: if you cannot probe an instruction you want to probe today,
> extend the emulator.
I don't see how ripping out existing support for almost* the entire
instruction set, and then putting it back instruction by instruction,
patch by patch, is a win.
Even if we add emulation, it seems sensible to keep the XOL approach as
a backup to handle instructions that aren't yet emulated (and
architectures that don't yet have emulators). That way, if you don't
probe any unemulated instructions, the XOL vma is never created.
> Deny the rest. _All_ versions of uprobes code i've
> seen so far already restricts the probe-compatible instruction set:
*Yes, we currently decline to probe some instructions that look
troublesome and we haven't taken the time to test. These include things
like privileged instructions, int*, in*/out*, and instructions that fuss
with the segment registers. We've never actually seen such instructions
in user apps.
> RIP-relative instructions are excluded on 64-bit for example.
No. As discussed in previous posts, we handle rip-relative
instructions.
>
> - Emulation has the _least_ semantical side effects as we really execute
> 'that' instruction -
It seems to me that emulation is the only approach that DOESN'T execute
the probed instruction.
> not some other instruction put elsewhere into a
> special vma or into the process/thread stack, or some special in-kernel
> trampoline, etc.
>
> - Emulation can be very fast for the common case as well. Nobody will probe
> weird, complex instructions. They will use 'perf probe' to insert probes
> into their functions 90% of the time ...
>
> - FPU and complex ops and pagefault emulation is not really what i'd expect
> to be necessary for simple probing - but it _can_ be added by people who
> care about it, if they so wish.
**In practice, we've had to probe all sorts of instructions, including
FP instructions -- especially where you want to exploit the debug info
to get the names, types, and locations of variables and args. For some
compilers and architectures, the debug info isn't reliable until the end
of the function prologue, at which point you could find any old
instruction. Ditto if you want to probe statements within a function.
>
> Such a scheme would be _far_ more preferable form a maintenance POV as well,
> as the initial code will be small, and we can extend it gradually. All the
> other proposals are complex 'all or nothing' schemes with no flexibility for
> complexity at all.
>
> Thanks,
>
> Ingo
Thanks.
Jim
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists