Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753197Ab0BHGyf (ORCPT ); Mon, 8 Feb 2010 01:54:35 -0500 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:49518 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750812Ab0BHGyd (ORCPT ); Mon, 8 Feb 2010 01:54:33 -0500 Date: Mon, 8 Feb 2010 07:54:25 +0100 From: Pavel Machek To: "H. Peter Anvin" Cc: rostedt@goodmis.org, Linus Torvalds , Peter Zijlstra , Tom Tromey , Kyle Moffett , "Frank Ch. Eigler" , Oleg Nesterov , Andrew Morton , Stephen Rothwell , Fr??d??ric Weisbecker , LKML , Arnaldo Carvalho de Melo , linux-next@vger.kernel.org, utrace-devel@redhat.com, Thomas Gleixner , JimKeniston , Arjan van de Ven Subject: Re: linux-next: add utrace tree Message-ID: <20100208065425.GB1290@ucw.cz> References: <1264575134.4283.1983.camel@laptop> <1264600792.31321.464.camel@gandalf.stny.rr.com> <4B607B1A.3080007@zytor.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4B607B1A.3080007@zytor.com> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1575 Lines: 35 Hi! > >>> Right, so you're going to love uprobes, which does exactly that. The > >>> current proposal is overwriting the target instruction with an INT3 and > >>> injecting an extra vma into the target process's address space > >>> containing the original instruction(s) and possible jumps back to the > >>> old code stream. > >> > >> Just out of interest, how does it handle the threading issue? > >> > >> Last I saw, at least some CPU people were _very_ nervous about overwriting > >> instructions if another CPU might be just about to execute them. > > > > I think the issue was that ring 0 was never meant to do that, where as, > > ring 3 does it all the time. Doesn't the dynamic library modify its > > text? > > No, it has nothing to do with ring. It has to do with modifying code > that another CPU could be executing at the same time, and with modifying > code on the same processor through another virtual alias (they are > different issues.) The same issues apply regardless of the CPL of the > processor. ...but these are always 'there could be cpu bugs around' issues, right? Like amd k6. AFAICT x86 always supported self-modifying code without any extra barriers needed... -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/