This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/2293] confirm preemption/interrupt blocking in systemtap probes
- From: "hunt at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 27 Feb 2006 17:32:51 -0000
- Subject: [Bug translator/2293] confirm preemption/interrupt blocking in systemtap probes
- References: <20060207171449.2293.fche@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From hunt at redhat dot com 2006-02-27 17:32 -------
(In reply to comment #3)
> Other runtime protective measure still exist though: get_cpu/put_cpu can simply
> be smp_processor_id.
Yeah, I forgot about those.
I've been trying to solve a problem created by this change. The problem is with
scripts that collect a large amount of data then dump it all at probe end. You
have now disabled interrupts, so the data fills the buffers but stpd cannot
empty them. So we have effectively limited systemtap output to whatever space is
remaining in buffer when "probe end" is hit. Which might not be much.
That's fine for little test scripts, but a real solution is needed. Ideas?
--
http://sourceware.org/bugzilla/show_bug.cgi?id=2293
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.