public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Accessing user memory from NMI
@ 2009-06-18  8:20 Paul Mackerras
  2009-06-18  8:36 ` Peter Zijlstra
  0 siblings, 1 reply; 5+ messages in thread
From: Paul Mackerras @ 2009-06-18  8:20 UTC (permalink / raw)
  To: Ingo Molnar, Peter Zijlstra; +Cc: linux-kernel, benh

What was the conclusion you guys came to about doing a user stack
backtrace in an NMI handler?  Are you going to access user memory
directly or are you going to use the __fast_get_user_pages approach?

Ben H and I were talking today about what we'd need in order to be
able to read user memory in a PMU interrupt handler.  It looks like we
could read user memory directly with a bit of care, on 64-bit at
least.  Because of the MMU hash table that would almost always work
provided the page has already been touched (which stack pages would
have been), but there is a small chance that the access might fail
even if the address has a valid PTE.  At that point we could fall back
to the __fast_get_user_pages method, but I'm not sure it's worth it.

Paul.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2009-06-20 17:40 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-06-18  8:20 Accessing user memory from NMI Paul Mackerras
2009-06-18  8:36 ` Peter Zijlstra
2009-06-20 16:34   ` Ingo Molnar
2009-06-20 16:58     ` Mathieu Desnoyers
2009-06-20 17:40       ` Ingo Molnar

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox