From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 17139 invoked by alias); 20 Nov 2013 17:57:32 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 17127 invoked by uid 89); 20 Nov 2013 17:57:31 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=1.5 required=5.0 tests=AWL,BAYES_50,RDNS_NONE autolearn=no version=3.3.2 X-HELO: cdptpa-oedge-vip.email.rr.com Received: from Unknown (HELO cdptpa-oedge-vip.email.rr.com) (107.14.166.225) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 20 Nov 2013 17:57:00 +0000 Received: from [67.255.60.225] ([67.255.60.225:52126] helo=gandalf.local.home) by cdptpa-oedge03 (envelope-from ) (ecelerity 3.5.0.35861 r(Momo-dev:tip)) with ESMTP id 84/A8-31125-2E7FC825; Wed, 20 Nov 2013 17:56:52 +0000 Date: Wed, 20 Nov 2013 17:57:00 -0000 From: Steven Rostedt To: "Frank Ch. Eigler" Cc: Ingo Molnar , Masami Hiramatsu , linux-arch@vger.kernel.org, Ananth N Mavinakayanahalli , Sandeepa Prabhu , x86@kernel.org, lkml , virtualization@lists.linux-foundation.org, systemtap@sourceware.org, "David S. Miller" Subject: Re: [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist Message-ID: <20131120125649.40ca99c3@gandalf.local.home> In-Reply-To: <20131120173600.GK8993@redhat.com> References: <20131120042148.15296.88360.stgit@kbuild-fedora.novalocal> <20131120153801.GA9743@gmail.com> <20131120173600.GK8993@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-RR-Connecting-IP: 107.14.168.142:25 X-SW-Source: 2013-q4/txt/msg00253.txt.bz2 On Wed, 20 Nov 2013 12:36:00 -0500 "Frank Ch. Eigler" wrote: > Hi - > > > > Does this new blacklist cover enough that the kernel now survives a > > > broadly wildcarded perf-probe, e.g. over e.g. all of its kallsyms? > > > > That's generally the purpose of the annotations - if it doesn't then > > that's a bug. > > AFAIK, no kernel since kprobes was introduced has ever stood up to > that test. perf probe lacks the wildcarding powers of systemtap, so > one needs to resort to something like: > > # cat /proc/kallsyms | grep ' [tT] ' | while read addr type symbol; do > perf probe $symbol > done I'm curious to why one would do that. IIUC, perf now has function tracing support. -- Steve > > then wait for a few hours for that to finish. Then, or while the loop > is still running, run > > # perf record -e 'probe:*' -aR sleep 1 > > to take a kernel down. > > > - FChE