mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-23 12:43:55 +08:00
tracing: Use trace_sched_process_free() instead of exit() for pid tracing
On exit, if a process is preempted after the trace_sched_process_exit() tracepoint but before the process is done exiting, then when it gets scheduled in, the function tracers will not filter it properly against the function tracing pid filters. That is because the function tracing pid filters hooks to the sched_process_exit() tracepoint to remove the exiting task's pid from the filter list. Because the filtering happens at the sched_switch tracepoint, when the exiting task schedules back in to finish up the exit, it will no longer be in the function pid filtering tables. This was noticeable in the notrace self tests on a preemptable kernel, as the tests would fail as it exits and preempted after being taken off the notrace filter table and on scheduling back in it would not be in the notrace list, and then the ending of the exit function would trace. The test detected this and would fail. Cc: stable@vger.kernel.org Cc: Namhyung Kim <namhyung@kernel.org> Fixes:1e10486ffe
("ftrace: Add 'function-fork' trace option") Fixes:c37775d578
("tracing: Add infrastructure to allow set_event_pid to follow children" Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
This commit is contained in:
parent
477d084781
commit
afcab63665
@ -6985,12 +6985,12 @@ void ftrace_pid_follow_fork(struct trace_array *tr, bool enable)
|
||||
if (enable) {
|
||||
register_trace_sched_process_fork(ftrace_pid_follow_sched_process_fork,
|
||||
tr);
|
||||
register_trace_sched_process_exit(ftrace_pid_follow_sched_process_exit,
|
||||
register_trace_sched_process_free(ftrace_pid_follow_sched_process_exit,
|
||||
tr);
|
||||
} else {
|
||||
unregister_trace_sched_process_fork(ftrace_pid_follow_sched_process_fork,
|
||||
tr);
|
||||
unregister_trace_sched_process_exit(ftrace_pid_follow_sched_process_exit,
|
||||
unregister_trace_sched_process_free(ftrace_pid_follow_sched_process_exit,
|
||||
tr);
|
||||
}
|
||||
}
|
||||
|
@ -538,12 +538,12 @@ void trace_event_follow_fork(struct trace_array *tr, bool enable)
|
||||
if (enable) {
|
||||
register_trace_prio_sched_process_fork(event_filter_pid_sched_process_fork,
|
||||
tr, INT_MIN);
|
||||
register_trace_prio_sched_process_exit(event_filter_pid_sched_process_exit,
|
||||
register_trace_prio_sched_process_free(event_filter_pid_sched_process_exit,
|
||||
tr, INT_MAX);
|
||||
} else {
|
||||
unregister_trace_sched_process_fork(event_filter_pid_sched_process_fork,
|
||||
tr);
|
||||
unregister_trace_sched_process_exit(event_filter_pid_sched_process_exit,
|
||||
unregister_trace_sched_process_free(event_filter_pid_sched_process_exit,
|
||||
tr);
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user