Bug 597329 - Backport the uprobes singlestep bypass
Summary: Backport the uprobes singlestep bypass
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: systemtap   
(Show other bugs)
Version: 6.0
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: Frank Ch. Eigler
QA Contact: Petr Muller
Depends On:
TreeView+ depends on / blocked
Reported: 2010-05-28 16:34 UTC by Josh Stone
Modified: 2016-09-20 02:06 UTC (History)
3 users (show)

Fixed In Version: systemtap-1.2-5.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-11-10 21:44:43 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Josh Stone 2010-05-28 16:34:33 UTC
A recent change in systemtap's uprobes kernel module lets it skip singlestepping after a breakpoint on easily emulated instructions, especially NOPs.


This is significant for SDT, our userspace static probes, because those probes always insert a NOP for systemtap to put a breakpoint on.  Using our benchmark scripts/probe_perf/bench.sh, which measures the overhead of nearly 4 million probe hits, I get these elapsed times:

   not instrumented:  0.86s
   uprobes w/ sstep: 16.46s
  uprobes w/o sstep:  7.81s

I believe this is a very worthwhile and easy change to backport into RHEL's systemtap package.

Comment 1 Josh Stone 2010-06-09 19:02:47 UTC
This commit is needed to fix powerpc:


We are also waiting on IBM folks to see if we need additions in powerpc's arch_validate_probed_insn().

Comment 2 Josh Stone 2010-06-14 22:53:09 UTC
uprobes_ppc: Don't emulate privileged MSR opcodes

(FLW) I believe it's good to go...

Comment 5 releng-rhel@redhat.com 2010-11-10 21:44:43 UTC
Red Hat Enterprise Linux 6.0 is now available and should resolve
the problem described in this bug report. This report is therefore being closed
with a resolution of CURRENTRELEASE. You may reopen this bug report if the
solution does not work for you.

Note You need to log in before you can comment on or make changes to this bug.