This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/6417] Wildcard probe hangs system


------- Additional Comments From srinivasa at in dot ibm dot com  2008-04-16 09:53 -------
Created an attachment (id=2700)
 --> (http://sourceware.org/bugzilla/attachment.cgi?id=2700&action=view)
Patch to blacklist atomic_* functions.

When we use wildcards in scripts, Systemtap probes all functions present in the

file(s). For example, probe module("ext3").function("*") will probe all
functions called in fs/ext3/*.c, which includes atomic_* functions too.
But atomic_* functions are used in systemtap/kprobes and might be in
handlers,so we need to blacklist these functions.

In addition, get_bh() and put_bh() are both inline functions but in turn use
atomic functions. Ideally the atomic_* blacklist needs to take care of this,
but doesn't (probably 'cos of the way inlines are handled currently). So,
blacklist them too.


-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=6417

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]