[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120709184145.GA7666@gmail.com>
Date: Mon, 9 Jul 2012 20:41:45 +0200
From: Ingo Molnar <mingo@...nel.org>
To: Peter Zijlstra <a.p.zijlstra@...llo.nl>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>, hpa@...or.com,
eranian@...gle.com, linux-kernel@...r.kernel.org,
fweisbec@...il.com, akpm@...ux-foundation.org, tglx@...utronix.de,
linux-tip-commits@...r.kernel.org,
Robert Richter <robert.richter@....com>
Subject: Re: [tip:perf/core] perf/x86: Fix USER/KERNEL tagging of samples
* Peter Zijlstra <a.p.zijlstra@...llo.nl> wrote:
> On Fri, 2012-07-06 at 11:34 -0700, Linus Torvalds wrote:
>
> > But any code that does "kernel_ip(regs->ip)" is just
> > terminally confused and can never be sane.
>
> How about something like the below?
>
> I've also modified perf_instruction_pointer() to account for
> the VM86 and IA32 non-zero segment base cases. At least, I
> tried to do so, I've never had the 'pleasure' of poking at
> this segment descriptor stuff before.
>
> Ingo didn't really like doing that though, his suggestion was
> to kill all those IPs by mapping them to a special value (~0UL
> or so).
So, my main worry is that the complexity/actual_use ratio feels
rather high. Very few (if any) people will explicitly test the
profiling of segmented x86 code - and even if they sample,
chances are that it's a Windows COFF/who-knows binary that we
don't symbol-decode in user-space at the moment.
Open coded calculations like this are easy to get wrong:
> +static unsigned long get_segment_base(unsigned int segment)
> +{
> + struct desc_struct *desc;
> + int idx = segment >> 3;
> +
> + if ((segment & SEGMENT_TI_MASK) == SEGMENT_LDT) {
> + if (idx > LDT_ENTRIES)
> + return 0;
> +
> + desc = current->active_mm->context.ldt;
> + } else {
> + if (idx > GDT_ENTRIES)
> + return 0;
> +
> + desc = __this_cpu_ptr(&gdt_page.gdt[0]);
> + }
> +
> + return get_desc_base(desc + idx);
Shouldn't idx be checked against active_mm->context.ldt.size,
not LDT_ENTRIES (which is really just an upper limit)?
> +static unsigned long code_segment_base(struct pt_regs *regs)
> +{
> +#ifdef CONFIG_32BIT
> + if (user_mode(regs) && regs->cs != __USER_CS)
> + return get_segment_base(regs->cs);
> +#else
> + if (test_thread_flag(TIF_IA32)) {
> + if (user_mode(regs) && regs->cs != __USER32_CS)
> + return get_segment_base(regs->cs);
> + }
> +#endif
> + return 0;
> +}
Will this do the right thing for x32 mode?
> unsigned long perf_instruction_pointer(struct pt_regs *regs)
> {
> unsigned long ip;
>
> if (perf_guest_cbs && perf_guest_cbs->is_in_guest())
> - ip = perf_guest_cbs->get_guest_ip();
> - else
> - ip = instruction_pointer(regs);
> + return perf_guest_cbs->get_guest_ip();
> +
> + ip = regs->ip;
> +
> + if (regs->flags & X86_VM_MASK) {
> + /*
> + * If we are in VM86 mode, add the segment offset to convert to
> + * a linear address.
> + */
> + ip += 0x10 * regs->cs;
Sweet nostalgic memories ;-)
> + } else {
> + /*
> + * For IA32 we look at the GDT/LDT segment base to convert the
> + * effective IP to a linear address.
> + */
> + ip += code_segment_base(regs);
> + }
I'm also not entirely sure about skid across context switches
and all that, the idx might not relate to the current LDT
anymore - but I suspect we can ignore that problem.
( Another race is skid across descriptor updates - fortunately
sys_modify_ldt() is thick enough to be a practical barrier
against that and we were never crazy enough to mmap() portions
of the LDT to user-space or so. )
But no big fundamental objections from me, it would just be
awfully nice to double check all the boundary conditions in this
new code.
Thanks,
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists