public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* blacklist all functions on possible kprobes paths?
@ 2006-10-31  9:32 Gui,Jian
  0 siblings, 0 replies; only message in thread
From: Gui,Jian @ 2006-10-31  9:32 UTC (permalink / raw)
  To: systemtap

Hi,

During the whitelist test of systemtap, I found probing on
emulate_step function crashed the system when it is used combined
with other probe points. But when it is used alone, everything will
be fine since it is not triggered.

As emulate_step, there are some other functions in the possible
kernel paths of kprobes. Another example is branch_taken, which is
called in some case branches in emulate_step.

Some of them can be probed successfully in normal tests since they
are never triggered, but they may cause crash for the same reason.

For the safe probe of systemtap, shall we blacklist the functions
on all possilbe paths of kprobes or mark them "__kprobes"?

Thanks.

-Guijian

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-10-31  9:31 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-10-31  9:32 blacklist all functions on possible kprobes paths? Gui,Jian

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).