Displaying 11 results from an estimated 11 matches for "available_filter_funct".
2013 Nov 22
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...;>
>> Then it needs to be fixed ASAP!
>
> OK, I see. At least the two patches included this series
> should be fixed. :)
>
> And more, I need to test all symbols and drills down.
OK, what I've found was;
- The functions which can be ftraced look good.
(see tracing/available_filter_functions)
- following functions should not be able to be probed.
- memcpy, memset
- native_load_sp0 and some other native functions (need to be clear)
- restore
- trace_graph_return
- trace_hardirqs_off_thunk, trace_hardirqs_on_thunk
- This list still be not perfect. I just enabled/di...
2013 Nov 22
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...;>
>> Then it needs to be fixed ASAP!
>
> OK, I see. At least the two patches included this series
> should be fixed. :)
>
> And more, I need to test all symbols and drills down.
OK, what I've found was;
- The functions which can be ftraced look good.
(see tracing/available_filter_functions)
- following functions should not be able to be probed.
- memcpy, memset
- native_load_sp0 and some other native functions (need to be clear)
- restore
- trace_graph_return
- trace_hardirqs_off_thunk, trace_hardirqs_on_thunk
- This list still be not perfect. I just enabled/di...
2016 May 25
3
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
?ukasz Daniluk reported that on a RHEL kernel that his machine would lock up
after enabling function tracer. I asked him to bisect the functions within
available_filter_functions, which he did and it came down to three:
_paravirt_nop(), _paravirt_ident_32() and _paravirt_ident_64()
It was found that this is only an issue when noreplace-paravirt is added to
the kernel command line.
This means that those functions are most likely called within critical
sections of the...
2016 May 25
3
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
?ukasz Daniluk reported that on a RHEL kernel that his machine would lock up
after enabling function tracer. I asked him to bisect the functions within
available_filter_functions, which he did and it came down to three:
_paravirt_nop(), _paravirt_ident_32() and _paravirt_ident_64()
It was found that this is only an issue when noreplace-paravirt is added to
the kernel command line.
This means that those functions are most likely called within critical
sections of the...
2013 Nov 28
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...OK, I see. At least the two patches included this series
>>> should be fixed. :)
>>>
>>> And more, I need to test all symbols and drills down.
>>
>> OK, what I've found was;
>> - The functions which can be ftraced look good.
>> (see tracing/available_filter_functions)
>> - following functions should not be able to be probed.
>> - memcpy, memset
>> - native_load_sp0 and some other native functions (need to be clear)
>> - restore
>> - trace_graph_return
>> - trace_hardirqs_off_thunk, trace_hardirqs_on_thunk...
2013 Nov 28
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...OK, I see. At least the two patches included this series
>>> should be fixed. :)
>>>
>>> And more, I need to test all symbols and drills down.
>>
>> OK, what I've found was;
>> - The functions which can be ftraced look good.
>> (see tracing/available_filter_functions)
>> - following functions should not be able to be probed.
>> - memcpy, memset
>> - native_load_sp0 and some other native functions (need to be clear)
>> - restore
>> - trace_graph_return
>> - trace_hardirqs_off_thunk, trace_hardirqs_on_thunk...
2013 Nov 27
0
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...!
> >
> > OK, I see. At least the two patches included this series
> > should be fixed. :)
> >
> > And more, I need to test all symbols and drills down.
>
> OK, what I've found was;
> - The functions which can be ftraced look good.
> (see tracing/available_filter_functions)
> - following functions should not be able to be probed.
> - memcpy, memset
> - native_load_sp0 and some other native functions (need to be clear)
> - restore
> - trace_graph_return
> - trace_hardirqs_off_thunk, trace_hardirqs_on_thunk
> - This list stil...
2013 Nov 30
0
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
...included this series
> >>> should be fixed. :)
> >>>
> >>> And more, I need to test all symbols and drills down.
> >>
> >> OK, what I've found was;
> >> - The functions which can be ftraced look good.
> >> (see tracing/available_filter_functions)
> >> - following functions should not be able to be probed.
> >> - memcpy, memset
> >> - native_load_sp0 and some other native functions (need to be clear)
> >> - restore
> >> - trace_graph_return
> >> - trace_hardirqs_off_t...
2016 Sep 02
0
[PATCH] x86/paravirt: Do not trace _paravirt_ident_*() functions
...as far back as 2.6.32.
Thanks!
-- Steve
On Wed, 25 May 2016 13:47:26 -0400
Steven Rostedt <rostedt at goodmis.org> wrote:
> ?ukasz Daniluk reported that on a RHEL kernel that his machine would lock up
> after enabling function tracer. I asked him to bisect the functions within
> available_filter_functions, which he did and it came down to three:
>
> _paravirt_nop(), _paravirt_ident_32() and _paravirt_ident_64()
>
> It was found that this is only an issue when noreplace-paravirt is added to
> the kernel command line.
>
> This means that those functions are most likely cal...
2013 Nov 21
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
* Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
> (2013/11/21 2:36), Frank Ch. Eigler wrote:
[ ... ]
> > one needs to resort to something like:
> >
> > # cat /proc/kallsyms | grep ' [tT] ' | while read addr type symbol; do
> > perf probe $symbol
> > done
> >
> > then wait for a few hours for that to finish. Then, or
2013 Nov 21
2
[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
* Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote:
> (2013/11/21 2:36), Frank Ch. Eigler wrote:
[ ... ]
> > one needs to resort to something like:
> >
> > # cat /proc/kallsyms | grep ' [tT] ' | while read addr type symbol; do
> > perf probe $symbol
> > done
> >
> > then wait for a few hours for that to finish. Then, or