This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: [PATCH] kprobe-booster: boosting multi-probe


Hi,

bibo,mao wrote:
> Masami Hiramatsu wrote:
>> I think your patch enables booster even when preemption is
>> enabled, and it may be dangerous. Some running processes can
>> be preempted by another process when it is executing the codes in
>> the instruction buffer. When the boosted-probe is deregistered, that
>> instruction buffer is removed. Then, those preempted processes
>> can't continue to run, because they can't back to the preempted address.
>> So, I think, for the safety, the booster should NOT be enabled when
>> preemption is enabled.
>> Please fix it.
> It actually is one problem, now I fix it. But actually most time kprobe
> happen in preempt enable places, such as system call entry position,
> then booster function will lose its effect.

Sure, I know. There are some solutions for it. One of the my idea
is to inhibit preemption in the instruction buffer by
checking interruption address at the interrupt handler.
However, I thought this should modify other kernel subsystem
and the patch would become too complex.
So, in the first release patch, I just disabled booster when
preemption is enabled.

After all, this patch seems good to me.
Thanks for the hack.


-- 
Masami HIRAMATSU
2nd Research Dept.
Hitachi, Ltd., Systems Development Laboratory
E-mail: hiramatu@sdl.hitachi.co.jp


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]