From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 30150 invoked by alias); 13 Mar 2006 08:28:11 -0000 Received: (qmail 30117 invoked by uid 48); 13 Mar 2006 08:28:08 -0000 Date: Mon, 13 Mar 2006 08:28:00 -0000 Message-ID: <20060313082808.30116.qmail@sourceware.org> From: "yanmin dot zhang at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20060313062327.2452.bibo.mao@intel.com> References: <20060313062327.2452.bibo.mao@intel.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2452] kretprobe spinlock recursive remove X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00768.txt.bz2 ------- Additional Comments From yanmin dot zhang at intel dot com 2006-03-13 08:28 ------- The patch looks like a hack and disables kprobe within the kret handler. A thorough approach is to change kretprobe_inst table as a list per task_struct and delete the spin lock in trampoline_handler, then estimate if it's a reentrancy for current task. This approach has better scalability and also solve this issue. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2452 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.