From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 13522 invoked by alias); 9 Jul 2015 11:50:11 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 13512 invoked by uid 89); 9 Jul 2015 11:50:10 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.2 required=5.0 tests=BAYES_50,RCVD_IN_DNSWL_LOW,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS,UNPARSEABLE_RELAY autolearn=ham version=3.3.2 X-HELO: plane.gmane.org Received: from plane.gmane.org (HELO plane.gmane.org) (80.91.229.3) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-SHA encrypted) ESMTPS; Thu, 09 Jul 2015 11:50:09 +0000 Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1ZDAL6-0000zK-RT for systemtap@sourceware.org; Thu, 09 Jul 2015 13:50:05 +0200 Received: from abts-north-dynamic-004.27.177.122.airtelbroadband.in ([abts-north-dynamic-004.27.177.122.airtelbroadband.in]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Thu, 09 Jul 2015 13:50:04 +0200 Received: from panand by abts-north-dynamic-004.27.177.122.airtelbroadband.in with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Thu, 09 Jul 2015 13:50:04 +0200 To: systemtap@sourceware.org From: Pratyush Anand Subject: Re: [PATCH -tip v11 0/7] kprobes: =?utf-8?b?Tk9LUFJPQkVfU1lNQk9M?= for modules, and scalbility efforts Date: Thu, 09 Jul 2015 11:50:00 -0000 Message-ID: References: <20140514082034.5791.38607.stgit@ltc230.yrl.intra.hitachi.co.jp> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit User-Agent: Loom/3.14 (http://gmane.org/) X-IsSubscribed: yes X-SW-Source: 2015-q3/txt/msg00024.txt.bz2 Hi Masami, Masami Hiramatsu hitachi.com> writes: > > Hi, > Here is the version 11 of NOKPROBE_SYMBOL/scalability series. > This fixes some issues. If I have not missed then v11 seems the last version posted for this series. However, I do not see any ACK/NACK for the series. So, I am just curious that why didn't it got merged into upstream. It seems a useful series and without these patches system becomes extremely slow with large number of kprobes enabled. When I enabled massive kprobes [1] on my ARM64 system without this patch series, I see "NMI watchdog: BUG: soft lockup" for all CPUs even before all kprobes are enabled. However, If I use these patches then system is able to survive and I can see following output for script [1]. real 1m49.734s user 0m0.000s sys 0m53.950s 31364 kprobes enabled :-) I was able to run `usex -e` to load the system, although I see that system is mostly occupied by kernel (97%). * Unix System EXerciser * USER SYSTEM IDLE LOADAVG TASKS/RUN TEST TIME * * USEX Version 1.9-36 * 3% 97% 0% 24.58 232/27 000:02:49 * ~Pratyush [1] #!/bin/sh grep ' [tT] ' /proc/kallsyms | fgrep -v '[' | awk '{print $3}' > syms.list echo 0 > /sys/kernel/debug/tracing/events/enable echo 0 > /sys/kernel/debug/tracing/events/kprobes/enable echo > /sys/kernel/debug/tracing/kprobe_events for i in `cat syms.list`; do echo "p $i" >> /sys/kernel/debug/tracing/kprobe_events ; done time echo 1 > /sys/kernel/debug/tracing/events/kprobes/enable num_kprobe=`cat /sys/kernel/debug/tracing/kprobe_events | wc -l` echo "$num_kprobe kprobes enabled :-)"