Blame SOURCES/rhbz1906662.patch

958cb3
commit 374d37118ae1274077a425261ef1428151eb6d7c
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Tue Nov 10 10:03:34 2020 -0800
958cb3
958cb3
    stp_utrace: disable IRQs when holding the bucket spin lock
958cb3
    
958cb3
    This lock can be acquired from inside an IRQ, leading to a deadlock:
958cb3
    
958cb3
    WARNING: inconsistent lock state
958cb3
    4.14.35-1902.6.6.el7uek.x86_64.debug #2 Tainted: G           OE
958cb3
    --------------------------------
958cb3
    inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
958cb3
    sh/15779 [HC1[1]:SC0[0]:HE0:SE1] takes:
958cb3
     (&(lock)->rlock#3){?.+.}, at: [<ffffffffc0c080b0>] _stp_mempool_alloc+0x35/0xab [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
    {HARDIRQ-ON-W} state was registered at:
958cb3
      lock_acquire+0xe0/0x238
958cb3
      _raw_spin_lock+0x3d/0x7a
958cb3
      utrace_task_alloc+0xa4/0xe3 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      utrace_attach_task+0x136/0x194 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      __stp_utrace_attach+0x57/0x216 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      stap_start_task_finder+0x12e/0x33f [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      systemtap_module_init+0x114d/0x11f0 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      _stp_handle_start+0xea/0x1c5 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      _stp_ctl_write_cmd+0x28d/0x2d1 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
      full_proxy_write+0x67/0xbb
958cb3
      __vfs_write+0x3a/0x170
958cb3
      vfs_write+0xc7/0x1c0
958cb3
      SyS_write+0x58/0xbf
958cb3
      do_syscall_64+0x7e/0x22c
958cb3
      entry_SYSCALL_64_after_hwframe+0x16e/0x0
958cb3
    irq event stamp: 9454
958cb3
    hardirqs last  enabled at (9453): [<ffffffffa696c960>] _raw_write_unlock_irqrestore+0x40/0x67
958cb3
    hardirqs last disabled at (9454): [<ffffffffa6a05417>] apic_timer_interrupt+0x1c7/0x1d1
958cb3
    softirqs last  enabled at (9202): [<ffffffffa6c00361>] __do_softirq+0x361/0x4e5
958cb3
    softirqs last disabled at (9195): [<ffffffffa60aeb76>] irq_exit+0xf6/0x102
958cb3
    
958cb3
    other info that might help us debug this:
958cb3
     Possible unsafe locking scenario:
958cb3
    
958cb3
           CPU0
958cb3
           ----
958cb3
      lock(&(lock)->rlock#3);
958cb3
      <Interrupt>
958cb3
        lock(&(lock)->rlock#3);
958cb3
    
958cb3
     *** DEADLOCK ***
958cb3
    
958cb3
    no locks held by sh/15779.
958cb3
    
958cb3
    stack backtrace:
958cb3
    CPU: 16 PID: 15779 Comm: sh Tainted: G           OE   4.14.35-1902.6.6.el7uek.x86_64.debug #2
958cb3
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
958cb3
    Call Trace:
958cb3
     <IRQ>
958cb3
     dump_stack+0x81/0xb6
958cb3
     print_usage_bug+0x1fc/0x20d
958cb3
     ? check_usage_backwards+0x130/0x12b
958cb3
     mark_lock+0x1f8/0x27b
958cb3
     __lock_acquire+0x6e7/0x165a
958cb3
     ? sched_clock_local+0x18/0x81
958cb3
     ? perf_swevent_hrtimer+0x136/0x151
958cb3
     lock_acquire+0xe0/0x238
958cb3
     ? _stp_mempool_alloc+0x35/0xab [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _raw_spin_lock_irqsave+0x55/0x97
958cb3
     ? _stp_mempool_alloc+0x35/0xab [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_mempool_alloc+0x35/0xab [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_ctl_get_buffer+0x69/0x215 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_ctl_send+0x4e/0x169 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_vlog+0xac/0x143 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     ? _stp_utrace_probe_cb+0xa4/0xa4 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_warn+0x6a/0x88 [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     function___global_warn__overload_0+0x60/0xac [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     probe_67+0xce/0x10e [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     _stp_hrtimer_notify_function+0x2db/0x55f [orxray_lj_lua_fgraph_XXXXXXX]
958cb3
     __hrtimer_run_queues+0x132/0x5c5
958cb3
     hrtimer_interrupt+0xb7/0x1ca
958cb3
     smp_apic_timer_interrupt+0xa5/0x35a
958cb3
     apic_timer_interrupt+0x1cc/0x1d1
958cb3
     </IRQ>
958cb3
958cb3
diff --git a/runtime/stp_utrace.c b/runtime/stp_utrace.c
958cb3
index e2880f1e4..46ba48923 100644
958cb3
--- a/runtime/stp_utrace.c
958cb3
+++ b/runtime/stp_utrace.c
958cb3
@@ -490,9 +490,9 @@ static int utrace_exit(void)
958cb3
 		rcu_read_lock();
958cb3
 		stap_hlist_for_each_entry_rcu(utrace, node, &bucket->head, hlist) {
958cb3
 			utrace->freed = true;
958cb3
-			stp_spin_lock(&bucket->lock);
958cb3
+			stp_spin_lock_irqsave(&bucket->lock, flags);
958cb3
 			hlist_del_rcu(&utrace->hlist);
958cb3
-			stp_spin_unlock(&bucket->lock);
958cb3
+			stp_spin_unlock_irqrestore(&bucket->lock, flags);
958cb3
 
958cb3
 			utrace_cleanup(utrace);
958cb3
 		}
958cb3
@@ -724,6 +724,7 @@ static struct utrace *utrace_task_alloc(struct utrace_bucket *bucket,
958cb3
 					struct task_struct *task)
958cb3
 {
958cb3
 	struct utrace *utrace;
958cb3
+	unsigned long flags;
958cb3
 
958cb3
 	utrace = kmem_cache_zalloc(utrace_cachep, STP_ALLOC_FLAGS);
958cb3
 	if (unlikely(!utrace))
958cb3
@@ -739,9 +740,9 @@ static struct utrace *utrace_task_alloc(struct utrace_bucket *bucket,
958cb3
 	atomic_set(&utrace->resume_work_added, 0);
958cb3
 	atomic_set(&utrace->report_work_added, 0);
958cb3
 
958cb3
-	stp_spin_lock(&bucket->lock);
958cb3
+	stp_spin_lock_irqsave(&bucket->lock, flags);
958cb3
 	hlist_add_head_rcu(&utrace->hlist, &bucket->head);
958cb3
-	stp_spin_unlock(&bucket->lock);
958cb3
+	stp_spin_unlock_irqrestore(&bucket->lock, flags);
958cb3
 	return utrace;
958cb3
 }
958cb3
 
958cb3
@@ -768,15 +769,17 @@ static struct utrace *utrace_task_alloc(struct utrace_bucket *bucket,
958cb3
  */
958cb3
 static void utrace_free(struct utrace_bucket *bucket, struct utrace *utrace)
958cb3
 {
958cb3
+	unsigned long flags;
958cb3
+
958cb3
 	if (unlikely(!utrace))
958cb3
 		return;
958cb3
 
958cb3
 	/* Remove this utrace from the mapping list of tasks to
958cb3
 	 * struct utrace. */
958cb3
 	utrace->freed = true;
958cb3
-	stp_spin_lock(&bucket->lock);
958cb3
+	stp_spin_lock_irqsave(&bucket->lock, flags);
958cb3
 	hlist_del_rcu(&utrace->hlist);
958cb3
-	stp_spin_unlock(&bucket->lock);
958cb3
+	stp_spin_unlock_irqrestore(&bucket->lock, flags);
958cb3
 
958cb3
 	/* Free the utrace struct. */
958cb3
 #ifdef STP_TF_DEBUG
958cb3
commit 6a092f5ae824d4ce972c10b8681b9272e2fd67f3
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Tue Nov 17 11:03:53 2020 -0800
958cb3
958cb3
    task_finder: call _stp_vma_done() upon error to fix memory leak
958cb3
    
958cb3
    The memory allocated inside stap_initialize_vma_map() is not freed upon
958cb3
    error when the task finder is started because a call to _stp_vma_done()
958cb3
    in the error path is missing. Add it to fix the leak.
958cb3
958cb3
diff --git a/task_finder.cxx b/task_finder.cxx
958cb3
index d08d44a75..7c45e728b 100644
958cb3
--- a/task_finder.cxx
958cb3
+++ b/task_finder.cxx
958cb3
@@ -66,6 +66,7 @@ task_finder_derived_probe_group::emit_module_init (systemtap_session& s)
958cb3
 
958cb3
   s.op->newline() << "if (rc) {";
958cb3
   s.op->newline(1) << "stap_stop_task_finder();";
958cb3
+  s.op->newline() << "_stp_vma_done();";
958cb3
   s.op->newline(-1) << "}";
958cb3
   s.op->newline(-1) << "}";
958cb3
 }
958cb3
commit 3c4f82ca024df4f8e213f7c77418493262d4a4d7
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Tue Nov 24 10:50:10 2020 -0800
958cb3
958cb3
    runtime_context: factor out RCU usage using a rw lock
958cb3
    
958cb3
    We can factor out the RCU insanity in here by just adding in a rw lock
958cb3
    and using that to synchronize _stp_runtime_contexts_free() with any code
958cb3
    that has the runtime context held.
958cb3
958cb3
diff --git a/runtime/linux/runtime_context.h b/runtime/linux/runtime_context.h
958cb3
index 41fecba81..18566957a 100644
958cb3
--- a/runtime/linux/runtime_context.h
958cb3
+++ b/runtime/linux/runtime_context.h
958cb3
@@ -11,15 +11,14 @@
958cb3
 #ifndef _LINUX_RUNTIME_CONTEXT_H_
958cb3
 #define _LINUX_RUNTIME_CONTEXT_H_
958cb3
 
958cb3
-#ifndef __rcu
958cb3
-#define __rcu
958cb3
-#endif
958cb3
-
958cb3
-static struct context __rcu *contexts[NR_CPUS] = { NULL };
958cb3
+/* Can't use STP_DEFINE_RWLOCK() or this might be replaced with a spin lock */
958cb3
+static DEFINE_RWLOCK(_stp_context_lock);
958cb3
+static DEFINE_PER_CPU(struct context *, contexts);
958cb3
+static atomic_t _stp_context_stop = ATOMIC_INIT(0);
958cb3
 
958cb3
 static int _stp_runtime_contexts_alloc(void)
958cb3
 {
958cb3
-	int cpu;
958cb3
+	unsigned int cpu;
958cb3
 
958cb3
 	for_each_possible_cpu(cpu) {
958cb3
 		/* Module init, so in user context, safe to use
958cb3
@@ -31,91 +30,67 @@ static int _stp_runtime_contexts_alloc(void)
958cb3
 				    (unsigned long) sizeof (struct context));
958cb3
 			return -ENOMEM;
958cb3
 		}
958cb3
-		rcu_assign_pointer(contexts[cpu], c);
958cb3
+		per_cpu(contexts, cpu) = c;
958cb3
 	}
958cb3
 	return 0;
958cb3
 }
958cb3
 
958cb3
 /* We should be free of all probes by this time, but for example the timer for
958cb3
  * _stp_ctl_work_callback may still be running and looking for contexts.  We
958cb3
- * use RCU-sched synchronization to be sure its safe to free them.  */
958cb3
+ * use _stp_context_stop and a write lock to be sure its safe to free them.  */
958cb3
 static void _stp_runtime_contexts_free(void)
958cb3
 {
958cb3
-	// Note that 'free_contexts' is static because it is
958cb3
-	// (probably) too big to fit on a kernel function's stack.
958cb3
-	static struct context *free_contexts[NR_CPUS] = { NULL };
958cb3
-	int cpu;
958cb3
+	unsigned long flags;
958cb3
+	unsigned int cpu;
958cb3
 
958cb3
-	/* First, save all the pointers.  */
958cb3
-	rcu_read_lock_sched();
958cb3
-	for_each_possible_cpu(cpu) {
958cb3
-		free_contexts[cpu] = rcu_dereference_sched(contexts[cpu]);
958cb3
-	}
958cb3
-	rcu_read_unlock_sched();
958cb3
+	/* Sync to make sure existing readers are done */
958cb3
+	atomic_set(&_stp_context_stop, 1);
958cb3
+	write_lock_irqsave(&_stp_context_lock, flags);
958cb3
+	write_unlock_irqrestore(&_stp_context_lock, flags);
958cb3
 
958cb3
-	/* Now clear all pointers to prevent new readers.  */
958cb3
-	for_each_possible_cpu(cpu) {
958cb3
-		rcu_assign_pointer(contexts[cpu], NULL);
958cb3
-	}
958cb3
-
958cb3
-	/* Sync to make sure existing readers are done.  */
958cb3
-	stp_synchronize_sched();
958cb3
-
958cb3
-	/* Now we can actually free the contexts.  */
958cb3
-	for_each_possible_cpu(cpu) {
958cb3
-		struct context *c = free_contexts[cpu];
958cb3
-		if (c != NULL) {
958cb3
-			free_contexts[cpu] = NULL;
958cb3
-			_stp_vfree(c);
958cb3
-		}
958cb3
-	}
958cb3
+	/* Now we can actually free the contexts */
958cb3
+	for_each_possible_cpu(cpu)
958cb3
+		_stp_vfree(per_cpu(contexts, cpu));
958cb3
 }
958cb3
 
958cb3
 static inline struct context * _stp_runtime_get_context(void)
958cb3
 {
958cb3
-	// RHBZ1788662 rcu operations are rejected in idle-cpu contexts
958cb3
-	// in effect: skip probe if it's in rcu-idle state
958cb3
-#if defined(STAPCONF_RCU_IS_WATCHING) || LINUX_VERSION_CODE >= KERNEL_VERSION(3,13,0) // linux commit #5c173eb8
958cb3
-        if (! rcu_is_watching())
958cb3
-		return 0;
958cb3
-#elif LINUX_VERSION_CODE >= KERNEL_VERSION(3,3,0) // linux commit #9b2e4f18
958cb3
-        if (! rcu_is_cpu_idle())
958cb3
-		return 0;
958cb3
-#else
958cb3
-	; // XXX older kernels didn't put tracepoints in idle-cpu
958cb3
-#endif
958cb3
-	return rcu_dereference_sched(contexts[smp_processor_id()]);
958cb3
+	if (atomic_read(&_stp_context_stop))
958cb3
+		return NULL;
958cb3
+
958cb3
+	return per_cpu(contexts, smp_processor_id());
958cb3
 }
958cb3
 
958cb3
 static struct context * _stp_runtime_entryfn_get_context(void)
958cb3
+	__acquires(&_stp_context_lock)
958cb3
 {
958cb3
 	struct context* __restrict__ c = NULL;
958cb3
-	preempt_disable ();
958cb3
+
958cb3
+	if (!read_trylock(&_stp_context_lock))
958cb3
+		return NULL;
958cb3
+
958cb3
 	c = _stp_runtime_get_context();
958cb3
 	if (c != NULL) {
958cb3
-		if (atomic_inc_return(&c->busy) == 1) {
958cb3
-			// NB: Notice we're not re-enabling preemption
958cb3
+		if (!atomic_cmpxchg(&c->busy, 0, 1)) {
958cb3
+			// NB: Notice we're not releasing _stp_context_lock
958cb3
 			// here. We exepect the calling code to call
958cb3
 			// _stp_runtime_entryfn_get_context() and
958cb3
 			// _stp_runtime_entryfn_put_context() as a
958cb3
 			// pair.
958cb3
 			return c;
958cb3
 		}
958cb3
-		atomic_dec(&c->busy);
958cb3
 	}
958cb3
-	preempt_enable_no_resched();
958cb3
+	read_unlock(&_stp_context_lock);
958cb3
 	return NULL;
958cb3
 }
958cb3
 
958cb3
 static inline void _stp_runtime_entryfn_put_context(struct context *c)
958cb3
+	__releases(&_stp_context_lock)
958cb3
 {
958cb3
 	if (c) {
958cb3
-		if (c == _stp_runtime_get_context())
958cb3
-			atomic_dec(&c->busy);
958cb3
-		/* else, warn about bad state? */
958cb3
-		preempt_enable_no_resched();
958cb3
+		atomic_set(&c->busy, 0);
958cb3
+		read_unlock(&_stp_context_lock);
958cb3
 	}
958cb3
-	return;
958cb3
 }
958cb3
 
958cb3
 static void _stp_runtime_context_wait(void)
958cb3
@@ -130,9 +105,13 @@ static void _stp_runtime_context_wait(void)
958cb3
 		int i;
958cb3
 
958cb3
 		holdon = 0;
958cb3
-		rcu_read_lock_sched();
958cb3
+		read_lock(&_stp_context_lock);
958cb3
+		if (atomic_read(&_stp_context_stop)) {
958cb3
+			read_unlock(&_stp_context_lock);
958cb3
+			break;
958cb3
+		}
958cb3
 		for_each_possible_cpu(i) {
958cb3
-			struct context *c = rcu_dereference_sched(contexts[i]);
958cb3
+			struct context *c = per_cpu(contexts, i);
958cb3
 			if (c != NULL
958cb3
 			    && atomic_read (& c->busy)) {
958cb3
 				holdon = 1;
958cb3
@@ -146,7 +125,7 @@ static void _stp_runtime_context_wait(void)
958cb3
 				}
958cb3
 			}
958cb3
 		}
958cb3
-		rcu_read_unlock_sched();
958cb3
+		read_unlock(&_stp_context_lock);
958cb3
 
958cb3
 		/*
958cb3
 		 * Just in case things are really really stuck, a
958cb3
commit bb25d64f7b6c98ef2fc8b711f19bd6271866d727
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Tue Dec 1 09:54:07 2020 -0800
958cb3
958cb3
    runtime_context: synchronize _stp_context_stop more strictly
958cb3
    
958cb3
    We're only reading _stp_context_stop while the read lock is held, so we
958cb3
    can move the modification of it to inside the write lock to ensure
958cb3
    strict memory ordering. As such, it no longer needs to be an atomic_t
958cb3
    variable.
958cb3
    
958cb3
    We also don't need to disable IRQs when holding the write lock because
958cb3
    only read_trylock is used from IRQ context, not read_lock, so there's no
958cb3
    possibility of a deadlock occurring.
958cb3
958cb3
diff --git a/runtime/linux/runtime_context.h b/runtime/linux/runtime_context.h
958cb3
index 18566957a..e716e6d39 100644
958cb3
--- a/runtime/linux/runtime_context.h
958cb3
+++ b/runtime/linux/runtime_context.h
958cb3
@@ -14,7 +14,7 @@
958cb3
 /* Can't use STP_DEFINE_RWLOCK() or this might be replaced with a spin lock */
958cb3
 static DEFINE_RWLOCK(_stp_context_lock);
958cb3
 static DEFINE_PER_CPU(struct context *, contexts);
958cb3
-static atomic_t _stp_context_stop = ATOMIC_INIT(0);
958cb3
+static bool _stp_context_stop;
958cb3
 
958cb3
 static int _stp_runtime_contexts_alloc(void)
958cb3
 {
958cb3
@@ -40,13 +40,12 @@ static int _stp_runtime_contexts_alloc(void)
958cb3
  * use _stp_context_stop and a write lock to be sure its safe to free them.  */
958cb3
 static void _stp_runtime_contexts_free(void)
958cb3
 {
958cb3
-	unsigned long flags;
958cb3
 	unsigned int cpu;
958cb3
 
958cb3
 	/* Sync to make sure existing readers are done */
958cb3
-	atomic_set(&_stp_context_stop, 1);
958cb3
-	write_lock_irqsave(&_stp_context_lock, flags);
958cb3
-	write_unlock_irqrestore(&_stp_context_lock, flags);
958cb3
+	write_lock(&_stp_context_lock);
958cb3
+	_stp_context_stop = true;
958cb3
+	write_unlock(&_stp_context_lock);
958cb3
 
958cb3
 	/* Now we can actually free the contexts */
958cb3
 	for_each_possible_cpu(cpu)
958cb3
@@ -55,7 +54,7 @@ static void _stp_runtime_contexts_free(void)
958cb3
 
958cb3
 static inline struct context * _stp_runtime_get_context(void)
958cb3
 {
958cb3
-	if (atomic_read(&_stp_context_stop))
958cb3
+	if (_stp_context_stop)
958cb3
 		return NULL;
958cb3
 
958cb3
 	return per_cpu(contexts, smp_processor_id());
958cb3
@@ -106,7 +105,7 @@ static void _stp_runtime_context_wait(void)
958cb3
 
958cb3
 		holdon = 0;
958cb3
 		read_lock(&_stp_context_lock);
958cb3
-		if (atomic_read(&_stp_context_stop)) {
958cb3
+		if (_stp_context_stop) {
958cb3
 			read_unlock(&_stp_context_lock);
958cb3
 			break;
958cb3
 		}
958cb3
commit 0cc239e6f0fff79cb584fc857d3220402558db37
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Tue Dec 1 18:47:04 2020 -0800
958cb3
958cb3
    runtime_context: replace _stp_context_lock with an atomic variable
958cb3
    
958cb3
    We can't use any lock primitives here, such as spin locks or rw locks,
958cb3
    because lock_acquire() has tracepoints inside of it. This can cause a
958cb3
    deadlock, so we have to roll our own synchronization mechanism using an
958cb3
    atomic variable.
958cb3
958cb3
diff --git a/runtime/linux/runtime_context.h b/runtime/linux/runtime_context.h
958cb3
index e716e6d39..7dd240e1a 100644
958cb3
--- a/runtime/linux/runtime_context.h
958cb3
+++ b/runtime/linux/runtime_context.h
958cb3
@@ -11,10 +11,9 @@
958cb3
 #ifndef _LINUX_RUNTIME_CONTEXT_H_
958cb3
 #define _LINUX_RUNTIME_CONTEXT_H_
958cb3
 
958cb3
-/* Can't use STP_DEFINE_RWLOCK() or this might be replaced with a spin lock */
958cb3
-static DEFINE_RWLOCK(_stp_context_lock);
958cb3
+/* Can't use a lock primitive for this because lock_acquire() has tracepoints */
958cb3
+static atomic_t _stp_contexts_busy_ctr = ATOMIC_INIT(0);
958cb3
 static DEFINE_PER_CPU(struct context *, contexts);
958cb3
-static bool _stp_context_stop;
958cb3
 
958cb3
 static int _stp_runtime_contexts_alloc(void)
958cb3
 {
958cb3
@@ -37,15 +36,14 @@ static int _stp_runtime_contexts_alloc(void)
958cb3
 
958cb3
 /* We should be free of all probes by this time, but for example the timer for
958cb3
  * _stp_ctl_work_callback may still be running and looking for contexts.  We
958cb3
- * use _stp_context_stop and a write lock to be sure its safe to free them.  */
958cb3
+ * use _stp_contexts_busy_ctr to be sure its safe to free them.  */
958cb3
 static void _stp_runtime_contexts_free(void)
958cb3
 {
958cb3
 	unsigned int cpu;
958cb3
 
958cb3
 	/* Sync to make sure existing readers are done */
958cb3
-	write_lock(&_stp_context_lock);
958cb3
-	_stp_context_stop = true;
958cb3
-	write_unlock(&_stp_context_lock);
958cb3
+	while (atomic_cmpxchg(&_stp_contexts_busy_ctr, 0, INT_MAX))
958cb3
+		cpu_relax();
958cb3
 
958cb3
 	/* Now we can actually free the contexts */
958cb3
 	for_each_possible_cpu(cpu)
958cb3
@@ -54,24 +52,20 @@ static void _stp_runtime_contexts_free(void)
958cb3
 
958cb3
 static inline struct context * _stp_runtime_get_context(void)
958cb3
 {
958cb3
-	if (_stp_context_stop)
958cb3
-		return NULL;
958cb3
-
958cb3
 	return per_cpu(contexts, smp_processor_id());
958cb3
 }
958cb3
 
958cb3
 static struct context * _stp_runtime_entryfn_get_context(void)
958cb3
-	__acquires(&_stp_context_lock)
958cb3
 {
958cb3
 	struct context* __restrict__ c = NULL;
958cb3
 
958cb3
-	if (!read_trylock(&_stp_context_lock))
958cb3
+	if (!atomic_add_unless(&_stp_contexts_busy_ctr, 1, INT_MAX))
958cb3
 		return NULL;
958cb3
 
958cb3
 	c = _stp_runtime_get_context();
958cb3
 	if (c != NULL) {
958cb3
 		if (!atomic_cmpxchg(&c->busy, 0, 1)) {
958cb3
-			// NB: Notice we're not releasing _stp_context_lock
958cb3
+			// NB: Notice we're not releasing _stp_contexts_busy_ctr
958cb3
 			// here. We exepect the calling code to call
958cb3
 			// _stp_runtime_entryfn_get_context() and
958cb3
 			// _stp_runtime_entryfn_put_context() as a
958cb3
@@ -79,16 +73,15 @@ static struct context * _stp_runtime_entryfn_get_context(void)
958cb3
 			return c;
958cb3
 		}
958cb3
 	}
958cb3
-	read_unlock(&_stp_context_lock);
958cb3
+	atomic_dec(&_stp_contexts_busy_ctr);
958cb3
 	return NULL;
958cb3
 }
958cb3
 
958cb3
 static inline void _stp_runtime_entryfn_put_context(struct context *c)
958cb3
-	__releases(&_stp_context_lock)
958cb3
 {
958cb3
 	if (c) {
958cb3
 		atomic_set(&c->busy, 0);
958cb3
-		read_unlock(&_stp_context_lock);
958cb3
+		atomic_dec(&_stp_contexts_busy_ctr);
958cb3
 	}
958cb3
 }
958cb3
 
958cb3
@@ -104,11 +97,9 @@ static void _stp_runtime_context_wait(void)
958cb3
 		int i;
958cb3
 
958cb3
 		holdon = 0;
958cb3
-		read_lock(&_stp_context_lock);
958cb3
-		if (_stp_context_stop) {
958cb3
-			read_unlock(&_stp_context_lock);
958cb3
+		if (!atomic_add_unless(&_stp_contexts_busy_ctr, 1, INT_MAX))
958cb3
 			break;
958cb3
-		}
958cb3
+
958cb3
 		for_each_possible_cpu(i) {
958cb3
 			struct context *c = per_cpu(contexts, i);
958cb3
 			if (c != NULL
958cb3
@@ -124,7 +115,7 @@ static void _stp_runtime_context_wait(void)
958cb3
 				}
958cb3
 			}
958cb3
 		}
958cb3
-		read_unlock(&_stp_context_lock);
958cb3
+		atomic_dec(&_stp_contexts_busy_ctr);
958cb3
 
958cb3
 		/*
958cb3
 		 * Just in case things are really really stuck, a
958cb3
commit fbab0ea35e6af0d6599c6de3708b24008bf03ae6
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 2 11:07:11 2020 -0800
958cb3
958cb3
    runtime_context: disable preempt while holding the context
958cb3
    
958cb3
    After the context lock was converted to an atomic in the previous
958cb3
    commit, the preempt disable logic disappeared. Add it back.
958cb3
958cb3
diff --git a/runtime/linux/runtime_context.h b/runtime/linux/runtime_context.h
958cb3
index 7dd240e1a..7a1532e54 100644
958cb3
--- a/runtime/linux/runtime_context.h
958cb3
+++ b/runtime/linux/runtime_context.h
958cb3
@@ -34,6 +34,24 @@ static int _stp_runtime_contexts_alloc(void)
958cb3
 	return 0;
958cb3
 }
958cb3
 
958cb3
+static bool _stp_runtime_context_trylock(void)
958cb3
+{
958cb3
+	bool locked;
958cb3
+
958cb3
+	preempt_disable();
958cb3
+	locked = atomic_add_unless(&_stp_contexts_busy_ctr, 1, INT_MAX);
958cb3
+	if (!locked)
958cb3
+		preempt_enable_no_resched();
958cb3
+
958cb3
+	return locked;
958cb3
+}
958cb3
+
958cb3
+static void _stp_runtime_context_unlock(void)
958cb3
+{
958cb3
+	atomic_dec(&_stp_contexts_busy_ctr);
958cb3
+	preempt_enable_no_resched();
958cb3
+}
958cb3
+
958cb3
 /* We should be free of all probes by this time, but for example the timer for
958cb3
  * _stp_ctl_work_callback may still be running and looking for contexts.  We
958cb3
  * use _stp_contexts_busy_ctr to be sure its safe to free them.  */
958cb3
@@ -59,7 +77,7 @@ static struct context * _stp_runtime_entryfn_get_context(void)
958cb3
 {
958cb3
 	struct context* __restrict__ c = NULL;
958cb3
 
958cb3
-	if (!atomic_add_unless(&_stp_contexts_busy_ctr, 1, INT_MAX))
958cb3
+	if (!_stp_runtime_context_trylock())
958cb3
 		return NULL;
958cb3
 
958cb3
 	c = _stp_runtime_get_context();
958cb3
@@ -73,7 +91,7 @@ static struct context * _stp_runtime_entryfn_get_context(void)
958cb3
 			return c;
958cb3
 		}
958cb3
 	}
958cb3
-	atomic_dec(&_stp_contexts_busy_ctr);
958cb3
+	_stp_runtime_context_unlock();
958cb3
 	return NULL;
958cb3
 }
958cb3
 
958cb3
@@ -81,7 +99,7 @@ static inline void _stp_runtime_entryfn_put_context(struct context *c)
958cb3
 {
958cb3
 	if (c) {
958cb3
 		atomic_set(&c->busy, 0);
958cb3
-		atomic_dec(&_stp_contexts_busy_ctr);
958cb3
+		_stp_runtime_context_unlock();
958cb3
 	}
958cb3
 }
958cb3
 
958cb3
@@ -97,7 +115,7 @@ static void _stp_runtime_context_wait(void)
958cb3
 		int i;
958cb3
 
958cb3
 		holdon = 0;
958cb3
-		if (!atomic_add_unless(&_stp_contexts_busy_ctr, 1, INT_MAX))
958cb3
+		if (!_stp_runtime_context_trylock())
958cb3
 			break;
958cb3
 
958cb3
 		for_each_possible_cpu(i) {
958cb3
@@ -115,7 +133,7 @@ static void _stp_runtime_context_wait(void)
958cb3
 				}
958cb3
 			}
958cb3
 		}
958cb3
-		atomic_dec(&_stp_contexts_busy_ctr);
958cb3
+		_stp_runtime_context_unlock();
958cb3
 
958cb3
 		/*
958cb3
 		 * Just in case things are really really stuck, a
958cb3
commit aedc044d5d38cb2fa6144d0a3345d06847862f1b
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 2 11:27:47 2020 -0800
958cb3
958cb3
    task_finder_vma: add kfree_rcu() compat for old kernels
958cb3
    
958cb3
    Newer RHEL 6 kernels have kfree_rcu(), but older ones do not. Using
958cb3
    kfree_rcu() is beneficial because it lets the RCU subsystem know that
958cb3
    the queued RCU callback is low-priority, and can be deferred, hence why
958cb3
    we don't replace kfree_rcu() with call_rcu() outright. Luckily,
958cb3
    kfree_rcu() is a macro so we can just #ifdef with it.
958cb3
958cb3
diff --git a/runtime/task_finder_vma.c b/runtime/task_finder_vma.c
958cb3
index 7f0f6ed56..dc77a80f5 100644
958cb3
--- a/runtime/task_finder_vma.c
958cb3
+++ b/runtime/task_finder_vma.c
958cb3
@@ -87,6 +87,15 @@ __stp_tf_vma_new_entry(void)
958cb3
 	return entry;
958cb3
 }
958cb3
 
958cb3
+#ifndef kfree_rcu
958cb3
+static void __stp_tf_vma_free_entry(struct rcu_head *rcu)
958cb3
+{
958cb3
+	struct __stp_tf_vma_entry *entry = container_of(rcu, typeof(*entry), rcu);
958cb3
+
958cb3
+	kfree(entry);
958cb3
+}
958cb3
+#endif
958cb3
+
958cb3
 // __stp_tf_vma_put_entry(): Put a specified number of references on the entry.
958cb3
 static void
958cb3
 __stp_tf_vma_put_entry(struct __stp_tf_vma_bucket *bucket,
958cb3
@@ -106,7 +115,11 @@ __stp_tf_vma_put_entry(struct __stp_tf_vma_bucket *bucket,
958cb3
 	hlist_del_rcu(&entry->hlist);
958cb3
 	stp_spin_unlock_irqrestore(&bucket->lock, flags);
958cb3
 
958cb3
+#ifdef kfree_rcu
958cb3
 	kfree_rcu(entry, rcu);
958cb3
+#else
958cb3
+	call_rcu(&entry->rcu, __stp_tf_vma_free_entry);
958cb3
+#endif
958cb3
 }
958cb3
 
958cb3
 // stap_initialize_vma_map():  Initialize the free list.  Grabs the
958cb3
commit 6a27888b118b7a94650a68aae028957cdd5fb5f5
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 2 18:09:17 2020 -0800
958cb3
958cb3
    REVERTME: tapset-timers: work around on-the-fly deadlocks caused by mutex_trylock
958cb3
    
958cb3
    The following deadlock exists due to tracepoints existing inside a lock
958cb3
    that is used both inside probe context and outside probe context:
958cb3
     #0 [ffff88017f6d7a08] kvm_wait at ffffffff81079f5a
958cb3
     #1 [ffff88017f6d7a30] __pv_queued_spin_lock_slowpath at ffffffff8114f51e
958cb3
     #2 [ffff88017f6d7a70] queued_spin_lock_slowpath at ffffffff810e842b
958cb3
     #3 [ffff88017f6d7a80] mutex_trylock at ffffffff81882b1b
958cb3
     #4 [ffff88017f6d7ab8] _stp_transport_trylock_relay_inode at ffffffffc0c599df [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #5 [ffff88017f6d7ad8] __stp_print_flush at ffffffffc09b6483 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #6 [ffff88017f6d7b10] probe_7879 at ffffffffc0a98c85 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #7 [ffff88017f6d7b38] enter_real_tracepoint_probe_1543 at ffffffffc0c3b757 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #8 [ffff88017f6d7b70] enter_tracepoint_probe_1543 at ffffffffc09b117e [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #9 [ffff88017f6d7b80] lock_acquire at ffffffff811460ba
958cb3
    #10 [ffff88017f6d7be8] mutex_trylock at ffffffff81882a27
958cb3
    #11 [ffff88017f6d7c20] _stp_transport_trylock_relay_inode at ffffffffc0c599df [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #12 [ffff88017f6d7c40] __stp_print_flush at ffffffffc09b6483 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #13 [ffff88017f6d7c78] _stp_vlog at ffffffffc09b8d32 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #14 [ffff88017f6d7cd8] _stp_dbug at ffffffffc09ba43b [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #15 [ffff88017f6d7d38] systemtap_module_refresh at ffffffffc09ba51d [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #16 [ffff88017f6d7d50] module_refresher at ffffffffc09ba53e [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
    #17 [ffff88017f6d7d60] process_one_work at ffffffff810da9cc
958cb3
    #18 [ffff88017f6d7de8] worker_thread at ffffffff810dafe6
958cb3
    #19 [ffff88017f6d7e48] kthread at ffffffff810e44cf
958cb3
    #20 [ffff88017f6d7f50] ret_from_fork_nospec_begin at ffffffff818958dd
958cb3
    
958cb3
    Note the deadlock due to _stp_transport_trylock_relay_inode recursing
958cb3
    onto itself via mutex_trylock.
958cb3
    
958cb3
    This is a temporary fix for the issue until a proper patch is made to
958cb3
    remove the mutex_trylock from __stp_print_flush. This should be reverted
958cb3
    when that patch lands (it will have something to do with bulkmode).
958cb3
958cb3
diff --git a/tapset-timers.cxx b/tapset-timers.cxx
958cb3
index 10da17cda..503498c85 100644
958cb3
--- a/tapset-timers.cxx
958cb3
+++ b/tapset-timers.cxx
958cb3
@@ -391,11 +391,11 @@ hrtimer_derived_probe_group::emit_module_refresh (systemtap_session& s)
958cb3
   s.op->newline(+1) <<   "struct stap_hrtimer_probe* stp = &stap_hrtimer_probes[i];";
958cb3
   // timer disabled, but condition says enabled?
958cb3
   s.op->newline( 0) <<   "if (!stp->enabled && stp->probe->cond_enabled) {";
958cb3
-  s.op->newline(+1) <<     "dbug_otf(\"enabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
+  s.op->newline(+1) <<     "//dbug_otf(\"enabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
   s.op->newline( 0) <<     "_stp_hrtimer_start(stp);";
958cb3
   // timer enabled, but condition says disabled?
958cb3
   s.op->newline(-1) <<   "} else if (stp->enabled && !stp->probe->cond_enabled) {";
958cb3
-  s.op->newline(+1) <<     "dbug_otf(\"disabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
+  s.op->newline(+1) <<     "//dbug_otf(\"disabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
   s.op->newline( 0) <<     "_stp_hrtimer_cancel(stp);";
958cb3
   s.op->newline(-1) <<   "}";
958cb3
   s.op->newline( 0) <<   "stp->enabled = stp->probe->cond_enabled;";
958cb3
commit 7187dcf39412fcb25c432d318be8e49a6051f055
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Thu Dec 3 12:57:34 2020 -0800
958cb3
958cb3
    runtime: fix print races in IRQ context and during print cleanup
958cb3
    
958cb3
    Prints can race when there's a print called from IRQ context or a print
958cb3
    called while print cleanup takes place, which can lead to garbled print
958cb3
    messages, out-of-bounds memory accesses, and memory use-after-free. This
958cb3
    is one example of racy modification of the print buffer len in IRQ
958cb3
    context which caused a panic due to an out-of-bounds memory access:
958cb3
    
958cb3
    BUG: unable to handle kernel paging request at ffffe8ffff621000
958cb3
    IP: [<ffffffffc05da0f3>] _stp_vsprint_memory+0x83/0x950 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
    PGD 174b90067 PUD 174b8f067 PMD 174b93067 PTE 0
958cb3
    Oops: 0002 [#1] SMP
958cb3
    CPU: 12 PID: 3468 Comm: cat Kdump: loaded Tainted: G           OE  ------------   3.10.0-1127.19.1.el7.x86_64.debug #1
958cb3
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20180531_142017-buildhw-08.phx2.fedoraproject.org-1.fc28 04/01/2014
958cb3
    task: ffff88001f4f0000 ti: ffff88004ea5c000 task.ti: ffff88004ea5c000
958cb3
    RIP: 0010:[<ffffffffc05da0f3>]  [<ffffffffc05da0f3>] _stp_vsprint_memory+0x83/0x950 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
    RSP: 0018:ffff88004ea5f9a8  EFLAGS: 00010082
958cb3
    RAX: ffffe8ffff621001 RBX: ffffe8ffff620ff2 RCX: fffffffffffffffe
958cb3
    RDX: 000000000000006e RSI: ffffffffffffffff RDI: ffffc90002c23730
958cb3
    RBP: ffff88004ea5fa28 R08: 00000000ffffffff R09: 0000000000000073
958cb3
    R10: ffffc90002c243d7 R11: 0000000000000001 R12: ffffc90002c2373f
958cb3
    R13: ffffe8ffff621004 R14: 0000000000000012 R15: 00000000fffffffe
958cb3
    FS:  00007f8a9b1d4740(0000) GS:ffff880179e00000(0000) knlGS:0000000000000000
958cb3
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
958cb3
    CR2: ffffe8ffff621000 CR3: 00000000b3e3c000 CR4: 0000000000360fe0
958cb3
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
958cb3
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
958cb3
    Call Trace:
958cb3
     [<ffffffff8103eb89>] ? sched_clock+0x9/0x10
958cb3
     [<ffffffff8114036f>] ? lock_release_holdtime.part.30+0xf/0x1a0
958cb3
     [<ffffffffc05dcb80>] function___global_trace__overload_0+0x5b0/0x1220 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
     [<ffffffffc05d8993>] ? stp_lock_probe+0x53/0xe0 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
     [<ffffffff8188d879>] ? kretprobe_trampoline_holder+0x9/0x9
958cb3
     [<ffffffffc05e0662>] probe_7118+0x82/0xe0 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
     [<ffffffffc05de866>] enter_kretprobe_common+0x256/0x490 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
     [<ffffffff813489f1>] ? proc_sys_open+0x51/0x60
958cb3
     [<ffffffffc05dead0>] enter_kretprobe_probe+0x10/0x20 [stap_2c44636dfda18135ca3012a752599da6_13_533]
958cb3
     [<ffffffff8188e1d8>] trampoline_handler+0x148/0x220
958cb3
     [<ffffffff813489f1>] ? proc_sys_open+0x51/0x60
958cb3
     [<ffffffff8188d89e>] kretprobe_trampoline+0x25/0x57
958cb3
     [<ffffffff813489f1>] ? proc_sys_open+0x51/0x60
958cb3
     [<ffffffff8188d879>] kretprobe_trampoline_holder+0x9/0x9
958cb3
     [<ffffffff81384702>] ? security_inode_permission+0x22/0x30
958cb3
     [<ffffffff813489a0>] ? sysctl_head_finish+0x50/0x50
958cb3
     [<ffffffff812ac11d>] vfs_open+0x5d/0xb0
958cb3
     [<ffffffff812bb74a>] ? may_open+0x5a/0x120
958cb3
     [<ffffffff812c0af5>] do_last+0x285/0x15b0
958cb3
     [<ffffffff812bf18e>] ? link_path_walk+0x27e/0x8c0
958cb3
     [<ffffffff812c1ef0>] path_openat+0xd0/0x5d0
958cb3
     [<ffffffff8107a7f3>] ? kvm_clock_read+0x33/0x40
958cb3
     [<ffffffff812c38ad>] do_filp_open+0x4d/0xb0
958cb3
     [<ffffffff81889497>] ? _raw_spin_unlock+0x27/0x40
958cb3
     [<ffffffff812d5a9b>] ? __alloc_fd+0xfb/0x270
958cb3
     [<ffffffff812ad784>] do_sys_open+0x124/0x220
958cb3
     [<ffffffff812ad89e>] SyS_open+0x1e/0x20
958cb3
     [<ffffffff8188d879>] kretprobe_trampoline_holder+0x9/0x9
958cb3
    
958cb3
    This patch resolves the IRQ print races by disabling IRQs on the local
958cb3
    CPU when accessing said CPU's print buffer, and resolves the cleanup
958cb3
    races with a lock. We also protect against data corruption and panics
958cb3
    from prints inside NMIs now by checking if the current CPU was accessing
958cb3
    the log buffer when an NMI fired; in this case, the NMI's prints will be
958cb3
    dropped, as there is no way to safely service them without creating a
958cb3
    dedicated log buffer for them. This is achieved by forbidding reentrancy
958cb3
    with respect to _stp_print_trylock_irqsave() when the runtime context
958cb3
    isn't held. Reentrancy is otherwise allowed when the runtime context is
958cb3
    held because the runtime context provides reentrancy protection.
958cb3
958cb3
diff --git a/runtime/linux/io.c b/runtime/linux/io.c
958cb3
index 74a032c52..122708e2a 100644
958cb3
--- a/runtime/linux/io.c
958cb3
+++ b/runtime/linux/io.c
958cb3
@@ -20,9 +20,6 @@
958cb3
 
958cb3
 #define WARN_STRING "WARNING: "
958cb3
 #define ERR_STRING "ERROR: "
958cb3
-#if (STP_LOG_BUF_LEN < 10) /* sizeof(WARN_STRING) */
958cb3
-#error "STP_LOG_BUF_LEN is too short"
958cb3
-#endif
958cb3
 
958cb3
 enum code { INFO=0, WARN, ERROR, DBUG };
958cb3
 
958cb3
@@ -31,25 +28,37 @@ static void _stp_vlog (enum code type, const char *func, int line, const char *f
958cb3
 
958cb3
 static void _stp_vlog (enum code type, const char *func, int line, const char *fmt, va_list args)
958cb3
 {
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
+	size_t bytes_avail;
958cb3
 	int num;
958cb3
-	char *buf = per_cpu_ptr(Stp_lbuf, get_cpu());
958cb3
+	char *buf;
958cb3
 	int start = 0;
958cb3
 
958cb3
+	if (!_stp_print_trylock_irqsave(&flags))
958cb3
+		return;
958cb3
+
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	bytes_avail = STP_BUFFER_SIZE - log->len;
958cb3
+	if (unlikely(!bytes_avail))
958cb3
+		goto err_unlock;
958cb3
+
958cb3
+	buf = &log->buf[log->len];
958cb3
 	if (type == DBUG) {
958cb3
-		start = _stp_snprintf(buf, STP_LOG_BUF_LEN, "%s:%d: ", func, line);
958cb3
+		start = _stp_snprintf(buf, bytes_avail, "%s:%d: ", func, line);
958cb3
 	} else if (type == WARN) {
958cb3
-		/* This strcpy() is OK, since we know STP_LOG_BUF_LEN
958cb3
-		 * is > sizeof(WARN_STRING). */
958cb3
-		strcpy (buf, WARN_STRING);
958cb3
-		start = sizeof(WARN_STRING) - 1;
958cb3
+		strncpy(buf, WARN_STRING, bytes_avail);
958cb3
+		start = min(bytes_avail, sizeof(WARN_STRING) - 1);
958cb3
 	} else if (type == ERROR) {
958cb3
-		/* This strcpy() is OK, since we know STP_LOG_BUF_LEN
958cb3
-		 * is > sizeof(ERR_STRING) (which is < sizeof(WARN_STRING). */
958cb3
-		strcpy (buf, ERR_STRING);
958cb3
-		start = sizeof(ERR_STRING) - 1;
958cb3
+		strncpy(buf, ERR_STRING, bytes_avail);
958cb3
+		start = min(bytes_avail, sizeof(ERR_STRING) - 1);
958cb3
 	}
958cb3
 
958cb3
-	num = vscnprintf (buf + start, STP_LOG_BUF_LEN - start - 1, fmt, args);
958cb3
+	bytes_avail -= start;
958cb3
+	if (unlikely(!bytes_avail))
958cb3
+		goto err_unlock;
958cb3
+
958cb3
+	num = vscnprintf(buf + start, bytes_avail - 1, fmt, args);
958cb3
 	if (num + start) {
958cb3
 		if (buf[num + start - 1] != '\n') {
958cb3
 			buf[num + start] = '\n';
958cb3
@@ -66,12 +75,13 @@ static void _stp_vlog (enum code type, const char *func, int line, const char *f
958cb3
 		if (type != DBUG) {
958cb3
 			_stp_ctl_send(STP_OOB_DATA, buf, start + num + 1);
958cb3
 		} else {
958cb3
-			_stp_print(buf);
958cb3
-			_stp_print_flush();
958cb3
+			log->len += start + num;
958cb3
+			__stp_print_flush(log);
958cb3
 		}
958cb3
 #endif
958cb3
 	}
958cb3
-	put_cpu();
958cb3
+err_unlock:
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 /** Prints warning.
958cb3
diff --git a/runtime/linux/print.c b/runtime/linux/print.c
958cb3
index 777bca8b0..2aa2f1c8d 100644
958cb3
--- a/runtime/linux/print.c
958cb3
+++ b/runtime/linux/print.c
958cb3
@@ -35,84 +35,179 @@
958cb3
  * @{
958cb3
  */
958cb3
 
958cb3
-typedef struct __stp_pbuf {
958cb3
-	uint32_t len;			/* bytes used in the buffer */
958cb3
+struct _stp_log {
958cb3
+	unsigned int len; /* Bytes used in the buffer */
958cb3
 	char buf[STP_BUFFER_SIZE];
958cb3
-} _stp_pbuf;
958cb3
+	atomic_t reentrancy_lock;
958cb3
+};
958cb3
+#include "print_flush.c"
958cb3
 
958cb3
-static void *Stp_pbuf = NULL;
958cb3
+static struct _stp_log *_stp_log_pcpu;
958cb3
+
958cb3
+/*
958cb3
+ * An atomic counter is used to synchronize every possible print buffer usage
958cb3
+ * with the _stp_print_cleanup() function. The cleanup function sets the counter
958cb3
+ * to INT_MAX after waiting for everything using the print buffer to finish. We
958cb3
+ * cannot use a lock primitive to implement this because lock_acquire() contains
958cb3
+ * tracepoints and print statements are used both inside and outside of probes.
958cb3
+ * If the lock were only used inside probes, the runtime context would protect
958cb3
+ * us from recursing into the lock_acquire() tracepoints and deadlocking. We
958cb3
+ * instead use _stp_print_ctr as if it were a read-write lock.
958cb3
+ */
958cb3
+static atomic_t _stp_print_ctr = ATOMIC_INIT(0);
958cb3
 
958cb3
-/** private buffer for _stp_vlog() */
958cb3
-#ifndef STP_LOG_BUF_LEN
958cb3
-#define STP_LOG_BUF_LEN 256
958cb3
-#endif
958cb3
+/*
958cb3
+ * This disables IRQs to make per-CPU print buffer accesses atomic. There is a
958cb3
+ * reentrancy protection mechanism specifically for NMIs, since they can violate
958cb3
+ * our atomic guarantee. Reentrancy is otherwise allowed within code sections
958cb3
+ * that have the runtime context held (via _stp_runtime_entryfn_get_context()).
958cb3
+ */
958cb3
+static bool _stp_print_trylock_irqsave(unsigned long *flags)
958cb3
+{
958cb3
+	bool context_held = false;
958cb3
+	struct _stp_log *log;
958cb3
+
958cb3
+	local_irq_save(*flags);
958cb3
+	if (!atomic_add_unless(&_stp_print_ctr, 1, INT_MAX))
958cb3
+		goto irq_restore;
958cb3
+
958cb3
+	/*
958cb3
+	 * Check the per-CPU reentrancy lock for contention, unless the runtime
958cb3
+	 * context is already held, in which case we already have reentrancy
958cb3
+	 * protection. Otherwise, if the reentrancy lock is contented, that
958cb3
+	 * means we're either inside an NMI that fired while the current CPU was
958cb3
+	 * accessing the log buffer, or something is trying to nest calls to
958cb3
+	 * _stp_print_trylock_irqsave(). Our only choice is to reject the log
958cb3
+	 * access attempt in this case because log buffer corruption and panics
958cb3
+	 * could ensue if we're inside an NMI.
958cb3
+	 */
958cb3
+	if (_stp_runtime_context_trylock()) {
958cb3
+		struct context *c = _stp_runtime_get_context();
958cb3
+		context_held = c && atomic_read(&c->busy);
958cb3
+		_stp_runtime_context_unlock();
958cb3
+	}
958cb3
 
958cb3
-typedef char _stp_lbuf[STP_LOG_BUF_LEN];
958cb3
-static void *Stp_lbuf = NULL;
958cb3
+	/* Fall back onto the reentrancy lock if the context isn't held */
958cb3
+	if (!context_held) {
958cb3
+		log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+		if (atomic_cmpxchg(&log->reentrancy_lock, 0, 1))
958cb3
+			goto print_unlock;
958cb3
+	}
958cb3
+
958cb3
+	return true;
958cb3
+
958cb3
+print_unlock:
958cb3
+	atomic_dec(&_stp_print_ctr);
958cb3
+irq_restore:
958cb3
+	local_irq_restore(*flags);
958cb3
+	return false;
958cb3
+}
958cb3
+
958cb3
+static void _stp_print_unlock_irqrestore(unsigned long *flags)
958cb3
+{
958cb3
+	bool context_held = false;
958cb3
+	struct _stp_log *log;
958cb3
+
958cb3
+	if (_stp_runtime_context_trylock()) {
958cb3
+		struct context *c = _stp_runtime_get_context();
958cb3
+		context_held = c && atomic_read(&c->busy);
958cb3
+		_stp_runtime_context_unlock();
958cb3
+	}
958cb3
+
958cb3
+	if (!context_held) {
958cb3
+		log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+		atomic_set(&log->reentrancy_lock, 0);
958cb3
+	}
958cb3
+
958cb3
+	atomic_dec(&_stp_print_ctr);
958cb3
+	local_irq_restore(*flags);
958cb3
+}
958cb3
 
958cb3
 /* create percpu print and io buffers */
958cb3
 static int _stp_print_init (void)
958cb3
 {
958cb3
-	Stp_pbuf = _stp_alloc_percpu(sizeof(_stp_pbuf));
958cb3
-	if (unlikely(Stp_pbuf == 0))
958cb3
-		return -1;
958cb3
-
958cb3
-	/* now initialize IO buffer used in io.c */
958cb3
-	Stp_lbuf = _stp_alloc_percpu(sizeof(_stp_lbuf));
958cb3
-	if (unlikely(Stp_lbuf == 0)) {
958cb3
-		_stp_free_percpu(Stp_pbuf);
958cb3
-		return -1;
958cb3
+	unsigned int cpu;
958cb3
+
958cb3
+	_stp_log_pcpu = _stp_alloc_percpu(sizeof(*_stp_log_pcpu));
958cb3
+	if (!_stp_log_pcpu)
958cb3
+		return -ENOMEM;
958cb3
+
958cb3
+	for_each_possible_cpu(cpu) {
958cb3
+		struct _stp_log *log = per_cpu_ptr(_stp_log_pcpu, cpu);
958cb3
+
958cb3
+		log->reentrancy_lock = (atomic_t)ATOMIC_INIT(0);
958cb3
 	}
958cb3
 	return 0;
958cb3
 }
958cb3
 
958cb3
 static void _stp_print_cleanup (void)
958cb3
 {
958cb3
-	if (Stp_pbuf)
958cb3
-		_stp_free_percpu(Stp_pbuf);
958cb3
-	if (Stp_lbuf)
958cb3
-		_stp_free_percpu(Stp_lbuf);
958cb3
-}
958cb3
+	unsigned int cpu;
958cb3
 
958cb3
-#include "print_flush.c"
958cb3
+	/* Wait for the loggers to finish modifying the print buffers */
958cb3
+	while (atomic_cmpxchg(&_stp_print_ctr, 0, INT_MAX))
958cb3
+		cpu_relax();
958cb3
+
958cb3
+	for_each_possible_cpu(cpu) {
958cb3
+		struct _stp_log *log = per_cpu_ptr(_stp_log_pcpu, cpu);
958cb3
+
958cb3
+		/*
958cb3
+		 * Flush anything that could be left in the print buffer. It is
958cb3
+		 * safe to do this without any kind of synchronization mechanism
958cb3
+		 * because nothing is using this print buffer anymore.
958cb3
+		 */
958cb3
+		__stp_print_flush(log);
958cb3
+	}
958cb3
+
958cb3
+	_stp_free_percpu(_stp_log_pcpu);
958cb3
+}
958cb3
 
958cb3
 static inline void _stp_print_flush(void)
958cb3
 {
958cb3
-	stp_print_flush(per_cpu_ptr(Stp_pbuf, smp_processor_id()));
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
+
958cb3
+	if (!_stp_print_trylock_irqsave(&flags))
958cb3
+		return;
958cb3
+
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	__stp_print_flush(log);
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
+
958cb3
 #ifndef STP_MAXBINARYARGS
958cb3
 #define STP_MAXBINARYARGS 127
958cb3
 #endif
958cb3
 
958cb3
 
958cb3
-/** Reserves space in the output buffer for direct I/O.
958cb3
+/** Reserves space in the output buffer for direct I/O. Must be called with
958cb3
+ * _stp_print_trylock_irqsave() held.
958cb3
  */
958cb3
 static void * _stp_reserve_bytes (int numbytes)
958cb3
 {
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-	int size = STP_BUFFER_SIZE - pb->len;
958cb3
-	void * ret;
958cb3
+	struct _stp_log *log;
958cb3
+	char *ret;
958cb3
 
958cb3
 	if (unlikely(numbytes == 0 || numbytes > STP_BUFFER_SIZE))
958cb3
 		return NULL;
958cb3
 
958cb3
-	if (unlikely(numbytes > size))
958cb3
-		_stp_print_flush();
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	if (unlikely(numbytes > (STP_BUFFER_SIZE - log->len)))
958cb3
+		__stp_print_flush(log);
958cb3
 
958cb3
-	ret = pb->buf + pb->len;
958cb3
-	pb->len += numbytes;
958cb3
+	ret = &log->buf[log->len];
958cb3
+	log->len += numbytes;
958cb3
 	return ret;
958cb3
 }
958cb3
 
958cb3
 
958cb3
 static void _stp_unreserve_bytes (int numbytes)
958cb3
 {
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-
958cb3
-	if (unlikely(numbytes == 0 || numbytes > pb->len))
958cb3
-		return;
958cb3
+	struct _stp_log *log;
958cb3
 
958cb3
-	pb->len -= numbytes;
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	if (numbytes <= log->len)
958cb3
+		log->len -= numbytes;
958cb3
 }
958cb3
 
958cb3
 /** Write 64-bit args directly into the output stream.
958cb3
@@ -123,22 +218,25 @@ static void _stp_unreserve_bytes (int numbytes)
958cb3
  */
958cb3
 static void _stp_print_binary (int num, ...)
958cb3
 {
958cb3
+	unsigned long flags;
958cb3
 	va_list vargs;
958cb3
 	int i;
958cb3
 	int64_t *args;
958cb3
-	
958cb3
+
958cb3
 	if (unlikely(num > STP_MAXBINARYARGS))
958cb3
 		num = STP_MAXBINARYARGS;
958cb3
 
958cb3
-	args = _stp_reserve_bytes(num * sizeof(int64_t));
958cb3
+	if (!_stp_print_trylock_irqsave(&flags))
958cb3
+		return;
958cb3
 
958cb3
-	if (likely(args != NULL)) {
958cb3
+	args = _stp_reserve_bytes(num * sizeof(int64_t));
958cb3
+	if (args) {
958cb3
 		va_start(vargs, num);
958cb3
-		for (i = 0; i < num; i++) {
958cb3
+		for (i = 0; i < num; i++)
958cb3
 			args[i] = va_arg(vargs, int64_t);
958cb3
-		}
958cb3
 		va_end(vargs);
958cb3
 	}
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 /** Print into the print buffer.
958cb3
@@ -149,6 +247,7 @@ static void _stp_print_binary (int num, ...)
958cb3
 static void _stp_printf (const char *fmt, ...)
958cb3
 {
958cb3
 	va_list args;
958cb3
+
958cb3
 	va_start(args, fmt);
958cb3
 	_stp_vsnprintf(NULL, 0, fmt, args);
958cb3
 	va_end(args);
958cb3
@@ -160,37 +259,36 @@ static void _stp_printf (const char *fmt, ...)
958cb3
 
958cb3
 static void _stp_print (const char *str)
958cb3
 {
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-	char *end = pb->buf + STP_BUFFER_SIZE;
958cb3
-	char *ptr = pb->buf + pb->len;
958cb3
-	char *instr = (char *)str;
958cb3
-
958cb3
-	while (ptr < end && *instr)
958cb3
-		*ptr++ = *instr++;
958cb3
-
958cb3
-	/* Did loop terminate due to lack of buffer space? */
958cb3
-	if (unlikely(*instr)) {
958cb3
-		/* Don't break strings across subbufs. */
958cb3
-		/* Restart after flushing. */
958cb3
-		_stp_print_flush();
958cb3
-		end = pb->buf + STP_BUFFER_SIZE;
958cb3
-		ptr = pb->buf + pb->len;
958cb3
-		instr = (char *)str;
958cb3
-		while (ptr < end && *instr)
958cb3
-			*ptr++ = *instr++;
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
+
958cb3
+	if (!_stp_print_trylock_irqsave(&flags))
958cb3
+		return;
958cb3
+
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	while (1) {
958cb3
+		while (log->len < STP_BUFFER_SIZE && *str)
958cb3
+			log->buf[log->len++] = *str++;
958cb3
+		if (likely(!*str))
958cb3
+			break;
958cb3
+		__stp_print_flush(log);
958cb3
 	}
958cb3
-	pb->len = ptr - pb->buf;
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 static void _stp_print_char (const char c)
958cb3
 {
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-	int size = STP_BUFFER_SIZE - pb->len;
958cb3
-	if (unlikely(1 >= size))
958cb3
-		_stp_print_flush();
958cb3
-	
958cb3
-	pb->buf[pb->len] = c;
958cb3
-	pb->len ++;
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
+
958cb3
+	if (!_stp_print_trylock_irqsave(&flags))
958cb3
+		return;
958cb3
+
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	if (unlikely(log->len == STP_BUFFER_SIZE))
958cb3
+		__stp_print_flush(log);
958cb3
+	log->buf[log->len++] = c;
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 static void _stp_print_kernel_info(char *sname, char *vstr, int ctx, int num_probes)
958cb3
diff --git a/runtime/print.h b/runtime/print.h
958cb3
index ede71f033..ffdea594d 100644
958cb3
--- a/runtime/print.h
958cb3
+++ b/runtime/print.h
958cb3
@@ -10,6 +10,9 @@
958cb3
 #ifndef _STP_PRINT_H_
958cb3
 #define _STP_PRINT_H_
958cb3
 
958cb3
+/* The lock must be held with IRQs disabled to do any printing */
958cb3
+static bool _stp_print_trylock_irqsave(unsigned long *flags);
958cb3
+static void _stp_print_unlock_irqrestore(unsigned long *flags);
958cb3
 static int _stp_print_init(void);
958cb3
 static void _stp_print_cleanup(void);
958cb3
 static void *_stp_reserve_bytes(int numbytes);
958cb3
diff --git a/runtime/print_flush.c b/runtime/print_flush.c
958cb3
index cf40a2645..acd6a32d9 100644
958cb3
--- a/runtime/print_flush.c
958cb3
+++ b/runtime/print_flush.c
958cb3
@@ -13,40 +13,31 @@
958cb3
  * is filled, or this is called. This MUST be called before returning
958cb3
  * from a probe or accumulated output in the print buffer will be lost.
958cb3
  *
958cb3
- * @note Preemption must be disabled to use this.
958cb3
+ * @note Interrupts must be disabled to use this.
958cb3
  */
958cb3
 
958cb3
-static STP_DEFINE_SPINLOCK(_stp_print_lock);
958cb3
-
958cb3
-void stp_print_flush(_stp_pbuf *pb)
958cb3
+static void __stp_print_flush(struct _stp_log *log)
958cb3
 {
958cb3
-	size_t len = pb->len;
958cb3
+	size_t len = log->len;
958cb3
 	void *entry = NULL;
958cb3
 
958cb3
 	/* check to see if there is anything in the buffer */
958cb3
 	if (likely(len == 0))
958cb3
 		return;
958cb3
 
958cb3
-	pb->len = 0;
958cb3
-
958cb3
-	if (unlikely(_stp_transport_get_state() != STP_TRANSPORT_RUNNING))
958cb3
-		return;
958cb3
+	log->len = 0;
958cb3
 
958cb3
 	dbug_trans(1, "len = %zu\n", len);
958cb3
 
958cb3
 #ifdef STP_BULKMODE
958cb3
 #ifdef NO_PERCPU_HEADERS
958cb3
 	{
958cb3
-		struct context* __restrict__ c = NULL;
958cb3
-		char *bufp = pb->buf;
958cb3
+		char *bufp = log->buf;
958cb3
 		int inode_locked;
958cb3
 
958cb3
-		c = _stp_runtime_entryfn_get_context();
958cb3
-
958cb3
 		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
 			atomic_inc (&_stp_transport_failures);
958cb3
 #ifndef STP_TRANSPORT_RISKY
958cb3
-			_stp_runtime_entryfn_put_context(c);
958cb3
 			return;
958cb3
 #endif
958cb3
 		}
958cb3
@@ -70,26 +61,20 @@ void stp_print_flush(_stp_pbuf *pb)
958cb3
 
958cb3
 		if (inode_locked)
958cb3
 			_stp_transport_unlock_relay_inode();
958cb3
-
958cb3
-		_stp_runtime_entryfn_put_context(c);
958cb3
 	}
958cb3
 
958cb3
 #else  /* !NO_PERCPU_HEADERS */
958cb3
 
958cb3
 	{
958cb3
-		struct context* __restrict__ c = NULL;
958cb3
-		char *bufp = pb->buf;
958cb3
+		char *bufp = log->buf;
958cb3
 		struct _stp_trace t = {	.sequence = _stp_seq_inc(),
958cb3
 					.pdu_len = len};
958cb3
 		size_t bytes_reserved;
958cb3
 		int inode_locked;
958cb3
 
958cb3
-		c = _stp_runtime_entryfn_get_context();
958cb3
-
958cb3
 		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
 			atomic_inc (&_stp_transport_failures);
958cb3
 #ifndef STP_TRANSPORT_RISKY
958cb3
-			_stp_runtime_entryfn_put_context(c);
958cb3
 			return;
958cb3
 #endif
958cb3
 		}
958cb3
@@ -124,48 +109,24 @@ void stp_print_flush(_stp_pbuf *pb)
958cb3
 
958cb3
 		if (inode_locked)
958cb3
 			_stp_transport_unlock_relay_inode();
958cb3
-
958cb3
-		_stp_runtime_entryfn_put_context(c);
958cb3
 	}
958cb3
 #endif /* !NO_PERCPU_HEADERS */
958cb3
 
958cb3
 #else  /* !STP_BULKMODE */
958cb3
 
958cb3
 	{
958cb3
-		unsigned long flags;
958cb3
-		struct context* __restrict__ c = NULL;
958cb3
-		char *bufp = pb->buf;
958cb3
+		char *bufp = log->buf;
958cb3
 		int inode_locked;
958cb3
 
958cb3
-		/* Prevent probe reentrancy on _stp_print_lock.
958cb3
-		 *
958cb3
-		 * Since stp_print_flush may be called from probe context, we
958cb3
-		 * have to make sure that its lock, _stp_print_lock, can't
958cb3
-		 * possibly be held outside probe context too.  We ensure this
958cb3
-		 * by grabbing the context here, so any probe triggered by this
958cb3
-		 * region will appear reentrant and be skipped rather than
958cb3
-		 * deadlock.  Failure to get_context just means we're already
958cb3
-		 * in a probe, which is fine.
958cb3
-		 *
958cb3
-		 * (see also _stp_ctl_send for a similar situation)
958cb3
-                 *
958cb3
-                 * A better solution would be to replace this
958cb3
-                 * concurrency-control-laden effort with a lockless
958cb3
-                 * algorithm.
958cb3
-		 */
958cb3
-		c = _stp_runtime_entryfn_get_context();
958cb3
-
958cb3
 		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
 			atomic_inc (&_stp_transport_failures);
958cb3
 #ifndef STP_TRANSPORT_RISKY
958cb3
 			dbug_trans(0, "discarding %zu bytes of data\n", len);
958cb3
-			_stp_runtime_entryfn_put_context(c);
958cb3
 			return;
958cb3
 #endif
958cb3
 		}
958cb3
 
958cb3
 		dbug_trans(1, "calling _stp_data_write...\n");
958cb3
-		stp_spin_lock_irqsave(&_stp_print_lock, flags);
958cb3
 		while (len > 0) {
958cb3
 			size_t bytes_reserved;
958cb3
 
958cb3
@@ -182,12 +143,9 @@ void stp_print_flush(_stp_pbuf *pb)
958cb3
 			    break;
958cb3
 			}
958cb3
 		}
958cb3
-		stp_spin_unlock_irqrestore(&_stp_print_lock, flags);
958cb3
 
958cb3
 		if (inode_locked)
958cb3
 			_stp_transport_unlock_relay_inode();
958cb3
-
958cb3
-		_stp_runtime_entryfn_put_context(c);
958cb3
 	}
958cb3
 #endif /* !STP_BULKMODE */
958cb3
 }
958cb3
diff --git a/runtime/stack.c b/runtime/stack.c
958cb3
index 241ccf793..da23d4395 100644
958cb3
--- a/runtime/stack.c
958cb3
+++ b/runtime/stack.c
958cb3
@@ -690,13 +690,20 @@ static void _stp_stack_kernel_sprint(char *str, int size, struct context* c,
958cb3
 	 * then call _stp_stack_print,
958cb3
 	 * then copy the result into the output string
958cb3
 	 * and clear the print buffer. */
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-	_stp_print_flush();
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
 
958cb3
-	_stp_stack_kernel_print(c, sym_flags);
958cb3
+	if (!_stp_print_trylock_irqsave(&flags)) {
958cb3
+		*str = '\0';
958cb3
+		return;
958cb3
+	}
958cb3
 
958cb3
-	strlcpy(str, pb->buf, size < (int)pb->len ? size : (int)pb->len);
958cb3
-	pb->len = 0;
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	__stp_print_flush(log);
958cb3
+	_stp_stack_kernel_print(c, sym_flags);
958cb3
+	strlcpy(str, log->buf, min_t(int, size, log->len));
958cb3
+	log->len = 0;
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 static void _stp_stack_user_sprint(char *str, int size, struct context* c,
958cb3
@@ -707,13 +714,20 @@ static void _stp_stack_user_sprint(char *str, int size, struct context* c,
958cb3
 	 * then call _stp_stack_print,
958cb3
 	 * then copy the result into the output string
958cb3
 	 * and clear the print buffer. */
958cb3
-	_stp_pbuf *pb = per_cpu_ptr(Stp_pbuf, smp_processor_id());
958cb3
-	_stp_print_flush();
958cb3
+	struct _stp_log *log;
958cb3
+	unsigned long flags;
958cb3
 
958cb3
-	_stp_stack_user_print(c, sym_flags);
958cb3
+	if (!_stp_print_trylock_irqsave(&flags)) {
958cb3
+		*str = '\0';
958cb3
+		return;
958cb3
+	}
958cb3
 
958cb3
-	strlcpy(str, pb->buf, size < (int)pb->len ? size : (int)pb->len);
958cb3
-	pb->len = 0;
958cb3
+	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
+	__stp_print_flush(log);
958cb3
+	_stp_stack_user_print(c, sym_flags);
958cb3
+	strlcpy(str, log->buf, min_t(int, size, log->len));
958cb3
+	log->len = 0;
958cb3
+	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
 
958cb3
 #endif /* _STACK_C_ */
958cb3
diff --git a/runtime/transport/transport.c b/runtime/transport/transport.c
958cb3
index 57955334b..44e69b68c 100644
958cb3
--- a/runtime/transport/transport.c
958cb3
+++ b/runtime/transport/transport.c
958cb3
@@ -540,8 +540,8 @@ static void _stp_transport_close(void)
958cb3
 		   current->pid);
958cb3
 	_stp_cleanup_and_exit(0);
958cb3
 	_stp_unregister_ctl_channel();
958cb3
+	_stp_print_cleanup(); /* Requires the transport, so free this first */
958cb3
 	_stp_transport_fs_close();
958cb3
-	_stp_print_cleanup();	/* free print buffers */
958cb3
 	_stp_mem_debug_done();
958cb3
 
958cb3
 	dbug_trans(1, "---- CLOSED ----\n");
958cb3
diff --git a/runtime/vsprintf.c b/runtime/vsprintf.c
958cb3
index 28fd18f16..417d9f7f3 100644
958cb3
--- a/runtime/vsprintf.c
958cb3
+++ b/runtime/vsprintf.c
958cb3
@@ -542,6 +542,8 @@ _stp_vsnprintf(char *buf, size_t size, const char *fmt, va_list args)
958cb3
 				   number of chars for from string */
958cb3
 	int qualifier;		/* 'h', 'l', or 'L' for integer fields */
958cb3
 	int num_bytes = 0;
958cb3
+	unsigned long irqflags = 0;
958cb3
+	bool got_print_lock = false;
958cb3
 
958cb3
 	/* Reject out-of-range values early */
958cb3
 	if (unlikely((int) size < 0))
958cb3
@@ -724,11 +726,14 @@ _stp_vsnprintf(char *buf, size_t size, const char *fmt, va_list args)
958cb3
 	    num_bytes = STP_BUFFER_SIZE;
958cb3
 	  }
958cb3
 
958cb3
+	  if (!_stp_print_trylock_irqsave(&irqflags))
958cb3
+	    return 0;
958cb3
 	  str = (char*)_stp_reserve_bytes(num_bytes);
958cb3
 	  if (str == NULL) {
958cb3
 	    _stp_error("Couldn't reserve any print buffer space\n");
958cb3
-	    return 0;
958cb3
+	    goto err_unlock;
958cb3
 	  }
958cb3
+	  got_print_lock = true;
958cb3
 	  size = num_bytes;
958cb3
 	  end = str + size - 1;
958cb3
 
958cb3
@@ -820,8 +825,10 @@ _stp_vsnprintf(char *buf, size_t size, const char *fmt, va_list args)
958cb3
 					field_width, precision,
958cb3
 					*fmt, flags);
958cb3
 			if (unlikely(str == NULL)) {
958cb3
-				if (num_bytes > 0)
958cb3
+				if (num_bytes > 0) {
958cb3
 					_stp_unreserve_bytes(num_bytes);
958cb3
+					goto err_unlock;
958cb3
+				}
958cb3
 				return 0;
958cb3
 			}
958cb3
 			continue;
958cb3
@@ -923,7 +930,14 @@ _stp_vsnprintf(char *buf, size_t size, const char *fmt, va_list args)
958cb3
                   /* don't write out a null byte if the buf size is zero */
958cb3
                   *end = '\0';
958cb3
 	}
958cb3
+
958cb3
+	if (got_print_lock)
958cb3
+		_stp_print_unlock_irqrestore(&irqflags);
958cb3
 	return str-buf;
958cb3
+
958cb3
+err_unlock:
958cb3
+	_stp_print_unlock_irqrestore(&irqflags);
958cb3
+	return 0;
958cb3
 }
958cb3
 
958cb3
 #endif /* _VSPRINTF_C_ */
958cb3
diff --git a/translate.cxx b/translate.cxx
958cb3
index 53f1d0725..f0195486c 100644
958cb3
--- a/translate.cxx
958cb3
+++ b/translate.cxx
958cb3
@@ -1354,6 +1354,9 @@ c_unparser::emit_compiled_printfs ()
958cb3
       o->newline() << "unsigned long ptr_value;";
958cb3
       o->newline() << "int num_bytes;";
958cb3
 
958cb3
+      if (print_to_stream)
958cb3
+	  o->newline() << "unsigned long irqflags;";
958cb3
+
958cb3
       o->newline() << "(void) width;";
958cb3
       o->newline() << "(void) precision;";
958cb3
       o->newline() << "(void) ptr_value;";
958cb3
@@ -1452,7 +1455,9 @@ c_unparser::emit_compiled_printfs ()
958cb3
 	    }
958cb3
 
958cb3
 	  o->newline() << "num_bytes = clamp(num_bytes, 0, STP_BUFFER_SIZE);";
958cb3
-	  o->newline() << "str = (char*)_stp_reserve_bytes(num_bytes);";
958cb3
+	  o->newline() << "if (!_stp_print_trylock_irqsave(&irqflags))";
958cb3
+	  o->newline(1) << "return;";
958cb3
+	  o->newline(-1) << "str = (char*)_stp_reserve_bytes(num_bytes);";
958cb3
 	  o->newline() << "end = str ? str + num_bytes - 1 : 0;";
958cb3
         }
958cb3
       else // !print_to_stream
958cb3
@@ -1547,8 +1552,14 @@ c_unparser::emit_compiled_printfs ()
958cb3
 	      o->newline() << "if (unlikely(str == NULL)) {";
958cb3
 	      o->indent(1);
958cb3
 	      if (print_to_stream)
958cb3
+                {
958cb3
 		  o->newline() << "_stp_unreserve_bytes(num_bytes);";
958cb3
-	      o->newline() << "return;";
958cb3
+	          o->newline() << "goto err_unlock;";
958cb3
+                }
958cb3
+              else
958cb3
+                {
958cb3
+	          o->newline() << "return;";
958cb3
+                }
958cb3
 	      o->newline(-1) << "}";
958cb3
 	      break;
958cb3
 
958cb3
@@ -1575,6 +1586,11 @@ c_unparser::emit_compiled_printfs ()
958cb3
 
958cb3
       o->newline(-1) << "}";
958cb3
 
958cb3
+      if (print_to_stream)
958cb3
+        {
958cb3
+          o->newline(-1) << "err_unlock:";
958cb3
+          o->newline(1) << "_stp_print_unlock_irqrestore(&irqflags);";
958cb3
+        }
958cb3
       o->newline(-1) << "}";
958cb3
     }
958cb3
   o->newline() << "#endif // STP_LEGACY_PRINT";
958cb3
commit e8c7a2067ec7fc6315ee9bc34a010ec5f0369c5c
958cb3
Author: Frank Ch. Eigler <fche@redhat.com>
958cb3
Date:   Fri Dec 4 19:33:22 2020 -0500
958cb3
958cb3
    testsuite pr14536.stp: toughen
958cb3
    
958cb3
    This test case stresses nesting of heavy duty processing (backtrace
958cb3
    printing) within kernel interrupt processing paths.  It seems to
958cb3
    sometimes trigger problems - so let's make the test harder to make
958cb3
    latent problems show up more likely.  Instead of quitting after the
958cb3
    first irq_* function hit, stick around for 10 seconds.
958cb3
958cb3
diff --git a/testsuite/systemtap.base/pr14546.stp b/testsuite/systemtap.base/pr14546.stp
958cb3
index 3e59a6f3a..e4c205a8f 100644
958cb3
--- a/testsuite/systemtap.base/pr14546.stp
958cb3
+++ b/testsuite/systemtap.base/pr14546.stp
958cb3
@@ -2,5 +2,6 @@ probe kernel.function("irq_*").call {
958cb3
       x = 10; y = 10; z = 10; w = 10
958cb3
       $1
958cb3
       assert(!(x != 10 || y != 10 || z != 10 || w != 10), "memory got corrupted by " . @1)
958cb3
-      exit()
958cb3
 }
958cb3
+
958cb3
+probe timer.s(10) { exit () }
958cb3
commit cd6399e621646856824ea96b11605a0f52011272
958cb3
Author: Frank Ch. Eigler <fche@redhat.com>
958cb3
Date:   Fri Dec 4 21:33:21 2020 -0500
958cb3
958cb3
    dyninst transport: add _stp_print_*lock_irq* stubs
958cb3
    
958cb3
    Recent code on the transport/linux side needs a few new (stub)
958cb3
    functions and type decls.
958cb3
958cb3
diff --git a/runtime/dyninst/print.c b/runtime/dyninst/print.c
958cb3
index 9d91224ba..c78def272 100644
958cb3
--- a/runtime/dyninst/print.c
958cb3
+++ b/runtime/dyninst/print.c
958cb3
@@ -107,4 +107,18 @@ static void _stp_print_char (const char c)
958cb3
 	}
958cb3
 }
958cb3
 
958cb3
+
958cb3
+/* no-op stub synchronization */
958cb3
+static bool _stp_print_trylock_irqsave(unsigned long *flags)
958cb3
+{
958cb3
+        (void) flags;
958cb3
+        return true;
958cb3
+}
958cb3
+
958cb3
+static void _stp_print_unlock_irqrestore(unsigned long *flags)
958cb3
+{
958cb3
+        (void) flags;
958cb3
+}
958cb3
+
958cb3
+
958cb3
 #endif /* _STAPDYN_PRINT_C_ */
958cb3
diff --git a/runtime/dyninst/runtime_defines.h b/runtime/dyninst/runtime_defines.h
958cb3
index 5c3dec519..d00c76a21 100644
958cb3
--- a/runtime/dyninst/runtime_defines.h
958cb3
+++ b/runtime/dyninst/runtime_defines.h
958cb3
@@ -7,3 +7,6 @@
958cb3
 #define STAPCONF_PAGEFAULT_DISABLE  1
958cb3
 #define pagefault_disable()
958cb3
 #define pagefault_enable()
958cb3
+
958cb3
+typedef int bool;
958cb3
+enum { false=0, true=1 };
958cb3
commit fd93cf71df80f7bb5aae707ea5a5875727a85770
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 9 12:55:10 2020 -0800
958cb3
958cb3
    PR26844: fix off-by-one error when copying printed backtraces
958cb3
    
958cb3
    Since log->buf isn't null-terminated, log->len represents the total
958cb3
    number of bytes present in the log buffer for copying. The use of
958cb3
    strlcpy() here with log->len as its size results in log->len - 1 bytes
958cb3
    being copied, with the log->len'nth byte of the output buffer being set
958cb3
    to zero to terminate the string. Use memcpy() instead to remedy this,
958cb3
    while ensuring that the output buffer has space for null termination,
958cb3
    since the output buffer needs to be terminated.
958cb3
958cb3
diff --git a/runtime/stack.c b/runtime/stack.c
958cb3
index da23d4395..85883d6c4 100644
958cb3
--- a/runtime/stack.c
958cb3
+++ b/runtime/stack.c
958cb3
@@ -692,6 +692,7 @@ static void _stp_stack_kernel_sprint(char *str, int size, struct context* c,
958cb3
 	 * and clear the print buffer. */
958cb3
 	struct _stp_log *log;
958cb3
 	unsigned long flags;
958cb3
+	int bytes;
958cb3
 
958cb3
 	if (!_stp_print_trylock_irqsave(&flags)) {
958cb3
 		*str = '\0';
958cb3
@@ -701,7 +702,9 @@ static void _stp_stack_kernel_sprint(char *str, int size, struct context* c,
958cb3
 	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
 	__stp_print_flush(log);
958cb3
 	_stp_stack_kernel_print(c, sym_flags);
958cb3
-	strlcpy(str, log->buf, min_t(int, size, log->len));
958cb3
+	bytes = min_t(int, size - 1, log->len);
958cb3
+	memcpy(str, log->buf, bytes);
958cb3
+	str[bytes] = '\0';
958cb3
 	log->len = 0;
958cb3
 	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
@@ -716,6 +719,7 @@ static void _stp_stack_user_sprint(char *str, int size, struct context* c,
958cb3
 	 * and clear the print buffer. */
958cb3
 	struct _stp_log *log;
958cb3
 	unsigned long flags;
958cb3
+	int bytes;
958cb3
 
958cb3
 	if (!_stp_print_trylock_irqsave(&flags)) {
958cb3
 		*str = '\0';
958cb3
@@ -725,7 +729,9 @@ static void _stp_stack_user_sprint(char *str, int size, struct context* c,
958cb3
 	log = per_cpu_ptr(_stp_log_pcpu, raw_smp_processor_id());
958cb3
 	__stp_print_flush(log);
958cb3
 	_stp_stack_user_print(c, sym_flags);
958cb3
-	strlcpy(str, log->buf, min_t(int, size, log->len));
958cb3
+	bytes = min_t(int, size - 1, log->len);
958cb3
+	memcpy(str, log->buf, bytes);
958cb3
+	str[bytes] = '\0';
958cb3
 	log->len = 0;
958cb3
 	_stp_print_unlock_irqrestore(&flags);
958cb3
 }
958cb3
commit 8819e2a04596deb2fe427d261bebcaf3d2620dfb
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 9 17:22:20 2020 -0800
958cb3
958cb3
    always use per-cpu bulkmode relayfs files to communicate with userspace
958cb3
    
958cb3
    Using a mutex_trylock() in __stp_print_flush() leads to a lot of havoc,
958cb3
    for numerous. Firstly, since __stp_print_flush() can be called from IRQ
958cb3
    context, holding the inode mutex from here would make the mutex owner
958cb3
    become nonsense, since mutex locks can only be held in contexts backed
958cb3
    by the scheduler. Secondly, the mutex_trylock implementation has a
958cb3
    spin_lock() inside of it that leads to two issues: IRQs aren't disabled
958cb3
    when acquiring this spin_lock(), so using it from IRQ context can lead
958cb3
    to a deadlock, and since spin locks can have tracepoints via
958cb3
    lock_acquire(), the spin_lock() can recurse on itself inside a stap
958cb3
    probe and deadlock, like so:
958cb3
    
958cb3
     #0 [ffff88017f6d7a08] kvm_wait at ffffffff81079f5a
958cb3
     #1 [ffff88017f6d7a30] __pv_queued_spin_lock_slowpath at ffffffff8114f51e
958cb3
     #2 [ffff88017f6d7a70] queued_spin_lock_slowpath at ffffffff810e842b
958cb3
     #3 [ffff88017f6d7a80] mutex_trylock at ffffffff81882b1b
958cb3
     #4 [ffff88017f6d7ab8] _stp_transport_trylock_relay_inode at ffffffffc0c599df [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #5 [ffff88017f6d7ad8] __stp_print_flush at ffffffffc09b6483 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #6 [ffff88017f6d7b10] probe_7879 at ffffffffc0a98c85 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #7 [ffff88017f6d7b38] enter_real_tracepoint_probe_1543 at ffffffffc0c3b757 [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #8 [ffff88017f6d7b70] enter_tracepoint_probe_1543 at ffffffffc09b117e [stap_47650d3377d05db0ab7cbbaa25765809__11657]
958cb3
     #9 [ffff88017f6d7b80] lock_acquire at ffffffff811460ba
958cb3
    
958cb3
    The reason the mutex_trylock() was needed in the first place was because
958cb3
    staprun doesn't properly use the relayfs API when reading buffers in
958cb3
    non-bulk mode. It tries to read all CPUs' buffers from a single thread,
958cb3
    when it should be reading each CPU's buffer from a thread running on
958cb3
    said CPU in order to utilize relayfs' synchronization guarantees, which
958cb3
    are made by disabling IRQs on the local CPU when a buffer is modified.
958cb3
    
958cb3
    This change makes staprun always use per-CPU threads to read print
958cb3
    buffers so that we don't need the mutex_trylock() in the print flush
958cb3
    routine, which resolves a wide variety of serious bugs.
958cb3
    
958cb3
    We also need to adjust the transport sub-buffer count to accommodate for
958cb3
    frequent print flushing. The sub-buffer size is now reduced to match the
958cb3
    log buffer size, which is 8192 by default, and the number of sub-buffers
958cb3
    is increased to 256. This uses exactly the same amount of memory as
958cb3
    before.
958cb3
958cb3
diff --git a/runtime/print_flush.c b/runtime/print_flush.c
958cb3
index acd6a32d9..f4d72d30f 100644
958cb3
--- a/runtime/print_flush.c
958cb3
+++ b/runtime/print_flush.c
958cb3
@@ -18,6 +18,7 @@
958cb3
 
958cb3
 static void __stp_print_flush(struct _stp_log *log)
958cb3
 {
958cb3
+	char *bufp = log->buf;
958cb3
 	size_t len = log->len;
958cb3
 	void *entry = NULL;
958cb3
 
958cb3
@@ -26,126 +27,20 @@ static void __stp_print_flush(struct _stp_log *log)
958cb3
 		return;
958cb3
 
958cb3
 	log->len = 0;
958cb3
-
958cb3
 	dbug_trans(1, "len = %zu\n", len);
958cb3
-
958cb3
-#ifdef STP_BULKMODE
958cb3
-#ifdef NO_PERCPU_HEADERS
958cb3
-	{
958cb3
-		char *bufp = log->buf;
958cb3
-		int inode_locked;
958cb3
-
958cb3
-		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
-			atomic_inc (&_stp_transport_failures);
958cb3
-#ifndef STP_TRANSPORT_RISKY
958cb3
-			return;
958cb3
-#endif
958cb3
-		}
958cb3
-
958cb3
-		while (len > 0) {
958cb3
-			size_t bytes_reserved;
958cb3
-
958cb3
-			bytes_reserved = _stp_data_write_reserve(len, &entry);
958cb3
-			if (likely(entry && bytes_reserved > 0)) {
958cb3
-				memcpy(_stp_data_entry_data(entry), bufp,
958cb3
-				       bytes_reserved);
958cb3
-				_stp_data_write_commit(entry);
958cb3
-				bufp += bytes_reserved;
958cb3
-				len -= bytes_reserved;
958cb3
-			}
958cb3
-			else {
958cb3
-				atomic_inc(&_stp_transport_failures);
958cb3
-				break;
958cb3
-			}
958cb3
-		}
958cb3
-
958cb3
-		if (inode_locked)
958cb3
-			_stp_transport_unlock_relay_inode();
958cb3
-	}
958cb3
-
958cb3
-#else  /* !NO_PERCPU_HEADERS */
958cb3
-
958cb3
-	{
958cb3
-		char *bufp = log->buf;
958cb3
-		struct _stp_trace t = {	.sequence = _stp_seq_inc(),
958cb3
-					.pdu_len = len};
958cb3
+	do {
958cb3
 		size_t bytes_reserved;
958cb3
-		int inode_locked;
958cb3
 
958cb3
-		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
-			atomic_inc (&_stp_transport_failures);
958cb3
-#ifndef STP_TRANSPORT_RISKY
958cb3
-			return;
958cb3
-#endif
958cb3
-		}
958cb3
-
958cb3
-		bytes_reserved = _stp_data_write_reserve(sizeof(struct _stp_trace), &entry);
958cb3
-		if (likely(entry && bytes_reserved > 0)) {
958cb3
-			/* prevent unaligned access by using memcpy() */
958cb3
-			memcpy(_stp_data_entry_data(entry), &t, sizeof(t));
958cb3
+		bytes_reserved = _stp_data_write_reserve(len, &entry);
958cb3
+		if (likely(entry && bytes_reserved)) {
958cb3
+			memcpy(_stp_data_entry_data(entry), bufp,
958cb3
+			       bytes_reserved);
958cb3
 			_stp_data_write_commit(entry);
958cb3
-		}
958cb3
-		else {
958cb3
+			bufp += bytes_reserved;
958cb3
+			len -= bytes_reserved;
958cb3
+		} else {
958cb3
 			atomic_inc(&_stp_transport_failures);
958cb3
-			goto done;
958cb3
+			break;
958cb3
 		}
958cb3
-
958cb3
-		while (len > 0) {
958cb3
-			bytes_reserved = _stp_data_write_reserve(len, &entry);
958cb3
-			if (likely(entry && bytes_reserved > 0)) {
958cb3
-				memcpy(_stp_data_entry_data(entry), bufp,
958cb3
-				       bytes_reserved);
958cb3
-				_stp_data_write_commit(entry);
958cb3
-				bufp += bytes_reserved;
958cb3
-				len -= bytes_reserved;
958cb3
-			}
958cb3
-			else {
958cb3
-				atomic_inc(&_stp_transport_failures);
958cb3
-				break;
958cb3
-			}
958cb3
-		}
958cb3
-
958cb3
-	done:
958cb3
-
958cb3
-		if (inode_locked)
958cb3
-			_stp_transport_unlock_relay_inode();
958cb3
-	}
958cb3
-#endif /* !NO_PERCPU_HEADERS */
958cb3
-
958cb3
-#else  /* !STP_BULKMODE */
958cb3
-
958cb3
-	{
958cb3
-		char *bufp = log->buf;
958cb3
-		int inode_locked;
958cb3
-
958cb3
-		if (!(inode_locked = _stp_transport_trylock_relay_inode())) {
958cb3
-			atomic_inc (&_stp_transport_failures);
958cb3
-#ifndef STP_TRANSPORT_RISKY
958cb3
-			dbug_trans(0, "discarding %zu bytes of data\n", len);
958cb3
-			return;
958cb3
-#endif
958cb3
-		}
958cb3
-
958cb3
-		dbug_trans(1, "calling _stp_data_write...\n");
958cb3
-		while (len > 0) {
958cb3
-			size_t bytes_reserved;
958cb3
-
958cb3
-			bytes_reserved = _stp_data_write_reserve(len, &entry);
958cb3
-			if (likely(entry && bytes_reserved > 0)) {
958cb3
-				memcpy(_stp_data_entry_data(entry), bufp,
958cb3
-				       bytes_reserved);
958cb3
-				_stp_data_write_commit(entry);
958cb3
-				bufp += bytes_reserved;
958cb3
-				len -= bytes_reserved;
958cb3
-			}
958cb3
-			else {
958cb3
-			    atomic_inc(&_stp_transport_failures);
958cb3
-			    break;
958cb3
-			}
958cb3
-		}
958cb3
-
958cb3
-		if (inode_locked)
958cb3
-			_stp_transport_unlock_relay_inode();
958cb3
-	}
958cb3
-#endif /* !STP_BULKMODE */
958cb3
+	} while (len > 0);
958cb3
 }
958cb3
diff --git a/runtime/transport/relay_v2.c b/runtime/transport/relay_v2.c
958cb3
index ff621f71d..2ba5eea7d 100644
958cb3
--- a/runtime/transport/relay_v2.c
958cb3
+++ b/runtime/transport/relay_v2.c
958cb3
@@ -67,7 +67,7 @@ static size_t __stp_relay_switch_subbuf(struct rchan_buf *buf, size_t length)
958cb3
 		return 0;
958cb3
 
958cb3
 	if (unlikely(length > buf->chan->subbuf_size))
958cb3
-		goto toobig;
958cb3
+		length = buf->chan->subbuf_size;
958cb3
 
958cb3
 	if (buf->offset != buf->chan->subbuf_size + 1) {
958cb3
 		buf->prev_padding = buf->chan->subbuf_size - buf->offset;
958cb3
@@ -98,14 +98,7 @@ static size_t __stp_relay_switch_subbuf(struct rchan_buf *buf, size_t length)
958cb3
 	buf->data = new;
958cb3
 	buf->padding[new_subbuf] = 0;
958cb3
 
958cb3
-	if (unlikely(length + buf->offset > buf->chan->subbuf_size))
958cb3
-		goto toobig;
958cb3
-
958cb3
 	return length;
958cb3
-
958cb3
-toobig:
958cb3
-	buf->chan->last_toobig = length;
958cb3
-	return 0;
958cb3
 }
958cb3
 
958cb3
 static void __stp_relay_wakeup_readers(struct rchan_buf *buf)
958cb3
@@ -117,24 +110,17 @@ static void __stp_relay_wakeup_readers(struct rchan_buf *buf)
958cb3
 
958cb3
 static void __stp_relay_wakeup_timer(stp_timer_callback_parameter_t unused)
958cb3
 {
958cb3
-#ifdef STP_BULKMODE
958cb3
 	int i;
958cb3
-#endif
958cb3
 
958cb3
 	if (atomic_read(&_stp_relay_data.wakeup)) {
958cb3
 		struct rchan_buf *buf;
958cb3
 		
958cb3
 		atomic_set(&_stp_relay_data.wakeup, 0);
958cb3
-#ifdef STP_BULKMODE
958cb3
 		for_each_possible_cpu(i) {
958cb3
 			buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf,
958cb3
 						    i);
958cb3
 			__stp_relay_wakeup_readers(buf);
958cb3
 		}
958cb3
-#else
958cb3
-		buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf, 0);
958cb3
-		__stp_relay_wakeup_readers(buf);
958cb3
-#endif
958cb3
 	}
958cb3
 
958cb3
 	if (atomic_read(&_stp_relay_data.transport_state) == STP_TRANSPORT_RUNNING)
958cb3
@@ -235,55 +221,8 @@ static void _stp_transport_data_fs_stop(void)
958cb3
 		atomic_set (&_stp_relay_data.transport_state, STP_TRANSPORT_STOPPED);
958cb3
 		del_timer_sync(&_stp_relay_data.timer);
958cb3
 		dbug_trans(0, "flushing...\n");
958cb3
-		if (_stp_relay_data.rchan) {
958cb3
-			struct rchan_buf *buf;
958cb3
-
958cb3
-			/* NB we cannot call relay_flush() directly here since
958cb3
-			 * we need to do inode locking ourselves.
958cb3
-			 */
958cb3
-
958cb3
-#ifdef STP_BULKMODE
958cb3
-			unsigned int i;
958cb3
-			struct rchan *rchan = _stp_relay_data.rchan;
958cb3
-
958cb3
-			for_each_possible_cpu(i) {
958cb3
-				buf = _stp_get_rchan_subbuf(rchan->buf, i);
958cb3
-				if (buf) {
958cb3
-					struct inode *inode = buf->dentry->d_inode;
958cb3
-
958cb3
-					/* NB we are in the syscall context which
958cb3
-					 * allows sleeping. The following inode
958cb3
-					 * locking might sleep. See PR26131. */
958cb3
-					_stp_lock_inode(inode);
958cb3
-
958cb3
-					/* NB we intentionally avoids calling
958cb3
-					 * our own __stp_relay_switch_subbuf()
958cb3
-					 * since here we can sleep. */
958cb3
-					relay_switch_subbuf(buf, 0);
958cb3
-
958cb3
-					_stp_unlock_inode(inode);
958cb3
-				}
958cb3
-			}
958cb3
-#else  /* !STP_BULKMODE */
958cb3
-			buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf, 0);
958cb3
-
958cb3
-			if (buf != NULL) {
958cb3
-				struct inode *inode = buf->dentry->d_inode;
958cb3
-
958cb3
-				/* NB we are in the syscall context which allows
958cb3
-				 * sleeping. The following inode locking might
958cb3
-				 * sleep. See PR26131. */
958cb3
-				_stp_lock_inode(inode);
958cb3
-
958cb3
-				/* NB we intentionally avoids calling
958cb3
-				 * our own __stp_relay_switch_subbuf()
958cb3
-				 * since here we can sleep. */
958cb3
-				relay_switch_subbuf(buf, 0);
958cb3
-
958cb3
-				_stp_unlock_inode(inode);
958cb3
-			}
958cb3
-#endif
958cb3
-		}
958cb3
+		if (_stp_relay_data.rchan)
958cb3
+			relay_flush(_stp_relay_data.rchan);
958cb3
 	}
958cb3
 }
958cb3
 
958cb3
@@ -308,9 +247,7 @@ static int _stp_transport_data_fs_init(void)
958cb3
 
958cb3
 	/* Create "trace" file. */
958cb3
 	npages = _stp_subbuf_size * _stp_nsubbufs;
958cb3
-#ifdef STP_BULKMODE
958cb3
 	npages *= num_online_cpus();
958cb3
-#endif
958cb3
 	npages >>= PAGE_SHIFT;
958cb3
 	si_meminfo(&si);
958cb3
 #define MB(i) (unsigned long)((i) >> (20 - PAGE_SHIFT))
958cb3
@@ -347,9 +284,7 @@ static int _stp_transport_data_fs_init(void)
958cb3
         {
958cb3
                 u64 relay_mem;
958cb3
                 relay_mem = _stp_subbuf_size * _stp_nsubbufs;
958cb3
-#ifdef STP_BULKMODE
958cb3
                 relay_mem *= num_online_cpus();
958cb3
-#endif
958cb3
                 _stp_allocated_net_memory += relay_mem;
958cb3
                 _stp_allocated_memory += relay_mem;
958cb3
         }
958cb3
@@ -386,12 +321,7 @@ _stp_data_write_reserve(size_t size_request, void **entry)
958cb3
 		return -EINVAL;
958cb3
 
958cb3
 	buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf,
958cb3
-#ifdef STP_BULKMODE
958cb3
-				    smp_processor_id()
958cb3
-#else
958cb3
-				    0
958cb3
-#endif
958cb3
-				    );
958cb3
+				    smp_processor_id());
958cb3
 	if (unlikely(buf->offset + size_request > buf->chan->subbuf_size)) {
958cb3
 		size_request = __stp_relay_switch_subbuf(buf, size_request);
958cb3
 		if (!size_request)
958cb3
@@ -411,65 +341,10 @@ static unsigned char *_stp_data_entry_data(void *entry)
958cb3
 
958cb3
 static int _stp_data_write_commit(void *entry)
958cb3
 {
958cb3
-	/* Nothing to do here. */
958cb3
-	return 0;
958cb3
-}
958cb3
-
958cb3
-static noinline int _stp_transport_trylock_relay_inode(void)
958cb3
-{
958cb3
-	unsigned i;
958cb3
 	struct rchan_buf *buf;
958cb3
-	struct inode *inode;
958cb3
-#ifdef DEBUG_TRANS
958cb3
-	cycles_t begin;
958cb3
-#endif
958cb3
 
958cb3
 	buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf,
958cb3
-#ifdef STP_BULKMODE
958cb3
-				    smp_processor_id()
958cb3
-#else
958cb3
-				    0
958cb3
-#endif
958cb3
-				    );
958cb3
-	if (buf == NULL)
958cb3
-		return 0;
958cb3
-
958cb3
-	inode = buf->dentry->d_inode;
958cb3
-
958cb3
-#ifdef DEBUG_TRANS
958cb3
-	begin = get_cycles();
958cb3
-#endif
958cb3
-
958cb3
-	/* NB this bounded spinlock is needed for stream mode. it is observed
958cb3
-	 * that almost all of the iterations needed are less than 50K iterations
958cb3
-	 * or about 300K cycles.
958cb3
-	 */
958cb3
-	for (i = 0; i < 50 * 1000; i++) {
958cb3
-		if (_stp_trylock_inode(inode)) {
958cb3
-			dbug_trans(3, "got inode lock: i=%u: cycles: %llu", i,
958cb3
-				   get_cycles() - begin);
958cb3
-			return 1;
958cb3
-		}
958cb3
-	}
958cb3
-
958cb3
-	dbug_trans(0, "failed to get inode lock: i=%u: cycles: %llu", i,
958cb3
-		   get_cycles() - begin);
958cb3
+				    smp_processor_id());
958cb3
+	__stp_relay_switch_subbuf(buf, 0);
958cb3
 	return 0;
958cb3
 }
958cb3
-
958cb3
-static void _stp_transport_unlock_relay_inode(void)
958cb3
-{
958cb3
-	struct rchan_buf *buf;
958cb3
-
958cb3
-	buf = _stp_get_rchan_subbuf(_stp_relay_data.rchan->buf,
958cb3
-#ifdef STP_BULKMODE
958cb3
-				    smp_processor_id()
958cb3
-#else
958cb3
-				    0
958cb3
-#endif
958cb3
-				    );
958cb3
-	if (buf == NULL)
958cb3
-		return;
958cb3
-
958cb3
-	_stp_unlock_inode(buf->dentry->d_inode);
958cb3
-}
958cb3
diff --git a/runtime/transport/transport.c b/runtime/transport/transport.c
958cb3
index 96426eb7b..1be3e9485 100644
958cb3
--- a/runtime/transport/transport.c
958cb3
+++ b/runtime/transport/transport.c
958cb3
@@ -49,7 +49,6 @@ static int _stp_probes_started = 0;
958cb3
  * transport state flag is atomic. */
958cb3
 static atomic_t _stp_transport_state = ATOMIC_INIT(_STP_TS_UNINITIALIZED);
958cb3
 
958cb3
-static inline int _stp_trylock_inode(struct inode *inode);
958cb3
 static inline void _stp_lock_inode(struct inode *inode);
958cb3
 static inline void _stp_unlock_inode(struct inode *inode);
958cb3
 
958cb3
@@ -70,8 +69,8 @@ static inline void _stp_unlock_inode(struct inode *inode);
958cb3
 #include "procfs.c"
958cb3
 #include "control.c"
958cb3
 
958cb3
-static unsigned _stp_nsubbufs = 8;
958cb3
-static unsigned _stp_subbuf_size = 65536*4;
958cb3
+static unsigned _stp_nsubbufs = 256;
958cb3
+static unsigned _stp_subbuf_size = STP_BUFFER_SIZE;
958cb3
 
958cb3
 /* module parameters */
958cb3
 static int _stp_bufsize;
958cb3
@@ -643,23 +642,6 @@ err0:
958cb3
 	return -1;
958cb3
 }
958cb3
 
958cb3
-/* returns 1 when the lock is successfully acquired, 0 otherwise. */
958cb3
-static inline int _stp_trylock_inode(struct inode *inode)
958cb3
-{
958cb3
-#ifdef STAPCONF_INODE_RWSEM
958cb3
-	return inode_trylock(inode);
958cb3
-#else
958cb3
-#if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,16)
958cb3
-	return mutex_trylock(&inode->i_mutex);
958cb3
-#else
958cb3
-	/* NB down_trylock() uses a different convention where 0 means
958cb3
-	 * the lock is successfully acquired.
958cb3
-	 */
958cb3
-	return !down_trylock(&inode->i_sem);
958cb3
-#endif
958cb3
-#endif
958cb3
-}
958cb3
-
958cb3
 static inline void _stp_lock_inode(struct inode *inode)
958cb3
 {
958cb3
 #ifdef STAPCONF_INODE_RWSEM
958cb3
diff --git a/runtime/transport/transport.h b/runtime/transport/transport.h
958cb3
index 51723b7f5..cc09fc0ae 100644
958cb3
--- a/runtime/transport/transport.h
958cb3
+++ b/runtime/transport/transport.h
958cb3
@@ -98,24 +98,6 @@ enum _stp_transport_state {
958cb3
  */
958cb3
 static enum _stp_transport_state _stp_transport_get_state(void);
958cb3
 
958cb3
-/*
958cb3
- * _stp_transport_trylock_relay_inode
958cb3
- *
958cb3
- * This function locks the relay file inode to protect against relay readers
958cb3
- * (i.e., staprun/stapio).
958cb3
- * Returns whether the lock is successfully obtained.
958cb3
- */
958cb3
-static noinline int _stp_transport_trylock_relay_inode(void);
958cb3
-
958cb3
-/*
958cb3
- * _stp_transport_unlock_relay_inode
958cb3
- *
958cb3
- * This function releases the lock obtained by
958cb3
- * _stp_transport_trylock_relay_inode.
958cb3
- * should only call this when the lock is indeed obtained.
958cb3
- */
958cb3
-static void _stp_transport_unlock_relay_inode(void);
958cb3
-
958cb3
 /*
958cb3
  * _stp_transport_data_fs_init
958cb3
  *
958cb3
diff --git a/staprun/relay.c b/staprun/relay.c
958cb3
index 2f5f2e06a..c76e76719 100644
958cb3
--- a/staprun/relay.c
958cb3
+++ b/staprun/relay.c
958cb3
@@ -131,6 +131,7 @@ static void *reader_thread(void *data)
958cb3
 	sigset_t sigs;
958cb3
 	off_t wsize = 0;
958cb3
 	int fnum = 0;
958cb3
+	cpu_set_t cpu_mask;
958cb3
 
958cb3
 	sigemptyset(&sigs;;
958cb3
 	sigaddset(&sigs,SIGUSR2);
958cb3
@@ -139,21 +140,18 @@ static void *reader_thread(void *data)
958cb3
 	sigfillset(&sigs;;
958cb3
 	sigdelset(&sigs,SIGUSR2);
958cb3
 
958cb3
-	if (bulkmode) {
958cb3
-		cpu_set_t cpu_mask;
958cb3
-		CPU_ZERO(&cpu_mask);
958cb3
-		CPU_SET(cpu, &cpu_mask);
958cb3
-		if( sched_setaffinity( 0, sizeof(cpu_mask), &cpu_mask ) < 0 )
958cb3
-			_perr("sched_setaffinity");
958cb3
+	CPU_ZERO(&cpu_mask);
958cb3
+	CPU_SET(cpu, &cpu_mask);
958cb3
+	if( sched_setaffinity( 0, sizeof(cpu_mask), &cpu_mask ) < 0 )
958cb3
+		_perr("sched_setaffinity");
958cb3
 #ifdef NEED_PPOLL
958cb3
-		/* Without a real ppoll, there is a small race condition that could */
958cb3
-		/* block ppoll(). So use a timeout to prevent that. */
958cb3
-		timeout->tv_sec = 10;
958cb3
-		timeout->tv_nsec = 0;
958cb3
+	/* Without a real ppoll, there is a small race condition that could */
958cb3
+	/* block ppoll(). So use a timeout to prevent that. */
958cb3
+	timeout->tv_sec = 10;
958cb3
+	timeout->tv_nsec = 0;
958cb3
 #else
958cb3
-		timeout = NULL;
958cb3
+	timeout = NULL;
958cb3
 #endif
958cb3
-	}
958cb3
 
958cb3
         if (reader_timeout_ms && timeout) {
958cb3
                 timeout->tv_sec = reader_timeout_ms / 1000;
958cb3
@@ -358,11 +356,6 @@ int init_relayfs(void)
958cb3
 		_err("couldn't open %s.\n", buf);
958cb3
 		return -1;
958cb3
 	}
958cb3
-	if (ncpus > 1 && bulkmode == 0) {
958cb3
-		_err("ncpus=%d, bulkmode = %d\n", ncpus, bulkmode);
958cb3
-		_err("This is inconsistent! Please file a bug report. Exiting now.\n");
958cb3
-		return -1;
958cb3
-	}
958cb3
 
958cb3
         /* PR7097 */
958cb3
         if (load_only)
958cb3
commit d86b64029598f69b47d9cf4295f30b7093f38cfc
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 9 17:22:27 2020 -0800
958cb3
958cb3
    Revert "REVERTME: tapset-timers: work around on-the-fly deadlocks caused by mutex_trylock"
958cb3
    
958cb3
    This reverts commit 6a27888b118b7a94650a68aae028957cdd5fb5f5.
958cb3
    
958cb3
    No longer needed. As promised, we're reverting this.
958cb3
958cb3
diff --git a/tapset-timers.cxx b/tapset-timers.cxx
958cb3
index 503498c85..10da17cda 100644
958cb3
--- a/tapset-timers.cxx
958cb3
+++ b/tapset-timers.cxx
958cb3
@@ -391,11 +391,11 @@ hrtimer_derived_probe_group::emit_module_refresh (systemtap_session& s)
958cb3
   s.op->newline(+1) <<   "struct stap_hrtimer_probe* stp = &stap_hrtimer_probes[i];";
958cb3
   // timer disabled, but condition says enabled?
958cb3
   s.op->newline( 0) <<   "if (!stp->enabled && stp->probe->cond_enabled) {";
958cb3
-  s.op->newline(+1) <<     "//dbug_otf(\"enabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
+  s.op->newline(+1) <<     "dbug_otf(\"enabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
   s.op->newline( 0) <<     "_stp_hrtimer_start(stp);";
958cb3
   // timer enabled, but condition says disabled?
958cb3
   s.op->newline(-1) <<   "} else if (stp->enabled && !stp->probe->cond_enabled) {";
958cb3
-  s.op->newline(+1) <<     "//dbug_otf(\"disabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
+  s.op->newline(+1) <<     "dbug_otf(\"disabling (hrtimer) pidx %zu\\n\", stp->probe->index);";
958cb3
   s.op->newline( 0) <<     "_stp_hrtimer_cancel(stp);";
958cb3
   s.op->newline(-1) <<   "}";
958cb3
   s.op->newline( 0) <<   "stp->enabled = stp->probe->cond_enabled;";
958cb3
commit 3abe2c40b2dae499aff2e31beff121fbe43f7654
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Fri Dec 11 12:31:25 2020 -0800
958cb3
958cb3
    transport: set is_global to zero even when bulkmode is disabled
958cb3
    
958cb3
    This is needed now that we always want per-cpu logger threads. When
958cb3
    is_global is set to a non-zero value, relay won't create per-cpu log
958cb3
    files.
958cb3
958cb3
diff --git a/runtime/transport/debugfs.c b/runtime/transport/debugfs.c
958cb3
index 28a5bf89d..bd20281a0 100644
958cb3
--- a/runtime/transport/debugfs.c
958cb3
+++ b/runtime/transport/debugfs.c
958cb3
@@ -256,13 +256,8 @@ __stp_debugfs_relay_create_buf_file_callback(const char *filename,
958cb3
 	 * cause relay_open() to create a single global buffer rather
958cb3
 	 * than the default set of per-cpu buffers.
958cb3
 	 */
958cb3
-	if (is_global) {
958cb3
-#ifdef STP_BULKMODE
958cb3
+	if (is_global)
958cb3
 		*is_global = 0;
958cb3
-#else
958cb3
-		*is_global = 1;
958cb3
-#endif
958cb3
-	}
958cb3
 
958cb3
 	if (IS_ERR(file)) {
958cb3
 		file = NULL;
958cb3
diff --git a/runtime/transport/procfs.c b/runtime/transport/procfs.c
958cb3
index 262409356..b0a5d5760 100644
958cb3
--- a/runtime/transport/procfs.c
958cb3
+++ b/runtime/transport/procfs.c
958cb3
@@ -328,13 +328,8 @@ __stp_procfs_relay_create_buf_file_callback(const char *filename,
958cb3
   unsigned i = 0;
958cb3
   struct inode* in;
958cb3
   
958cb3
-  if (is_global) {
958cb3
-#ifdef STP_BULKMODE
958cb3
+  if (is_global)
958cb3
           *is_global = 0;
958cb3
-#else
958cb3
-          *is_global = 1;
958cb3
-#endif
958cb3
-  }
958cb3
   
958cb3
   if (parent != _stp_procfs_module_dir_path.dentry)
958cb3
     goto out;
958cb3
commit a26bf7890196395d73ac193b23e271398731745d
958cb3
Author: Frank Ch. Eigler <fche@redhat.com>
958cb3
Date:   Fri Dec 11 15:39:29 2020 -0500
958cb3
958cb3
    relay transport: comment on STP_BULK message
958cb3
    
958cb3
    While we've eliminated any STP_BULKMODE effects from the way relayfs
958cb3
    files are used ("always bulkmode"), staprun/stapio still need to know
958cb3
    whether the user intended "stap -b" or not, so they can save files
958cb3
    stpd_cpu* files separately.
958cb3
958cb3
diff --git a/runtime/transport/control.c b/runtime/transport/control.c
958cb3
index 9343b3c28..d123bef2f 100644
958cb3
--- a/runtime/transport/control.c
958cb3
+++ b/runtime/transport/control.c
958cb3
@@ -88,6 +88,9 @@ static ssize_t _stp_ctl_write_cmd(struct file *file, const char __user *buf, siz
958cb3
 		break;
958cb3
 
958cb3
 	case STP_BULK:
958cb3
+                // NB: this signals the runtime to save separate
958cb3
+                // per-cpu files; our kernel->userspace files are now
958cb3
+                // always bulkmode (trace$N files).
958cb3
 #ifdef STP_BULKMODE
958cb3
                 // no action needed
958cb3
                 break;
958cb3
commit b43eb4ed690bf2421978ed2896667e45e60c3400
958cb3
Author: Cosmin Tanislav <demonsingur@gmail.com>
958cb3
Date:   Thu Dec 10 16:48:54 2020 -0500
958cb3
958cb3
    bugfix: runtime: transport: handle more error cases in module init
958cb3
    
958cb3
    Signed-off-by: Sultan Alsawaf <sultan@openresty.com>
958cb3
958cb3
diff --git a/runtime/transport/relay_v2.c b/runtime/transport/relay_v2.c
958cb3
index 2ba5eea7d..27729f4c8 100644
958cb3
--- a/runtime/transport/relay_v2.c
958cb3
+++ b/runtime/transport/relay_v2.c
958cb3
@@ -277,6 +277,7 @@ static int _stp_transport_data_fs_init(void)
958cb3
 #endif  /* (RELAYFS_CHANNEL_VERSION < 7) */
958cb3
 	if (!_stp_relay_data.rchan) {
958cb3
 		rc = -ENOENT;
958cb3
+		errk("%s: relay_open() failed: %d\n", THIS_MODULE->name, rc);
958cb3
 		goto err;
958cb3
 	}
958cb3
         /* Increment _stp_allocated_memory and _stp_allocated_net_memory to account for buffers
958cb3
diff --git a/runtime/transport/transport.c b/runtime/transport/transport.c
958cb3
index 1be3e9485..f005e14e2 100644
958cb3
--- a/runtime/transport/transport.c
958cb3
+++ b/runtime/transport/transport.c
958cb3
@@ -552,6 +552,8 @@ static void _stp_transport_close(void)
958cb3
  */
958cb3
 static int _stp_transport_init(void)
958cb3
 {
958cb3
+	int ret;
958cb3
+
958cb3
 	dbug_trans(1, "transport_init\n");
958cb3
 #ifdef STAPCONF_TASK_UID
958cb3
 	_stp_uid = current->uid;
958cb3
@@ -603,20 +605,28 @@ static int _stp_transport_init(void)
958cb3
 		dbug_trans(1, "Using %d subbufs of size %d\n", _stp_nsubbufs, _stp_subbuf_size);
958cb3
 	}
958cb3
 
958cb3
-	if (_stp_transport_fs_init(THIS_MODULE->name) != 0)
958cb3
+	ret = _stp_transport_fs_init(THIS_MODULE->name);
958cb3
+	if (ret)
958cb3
 		goto err0;
958cb3
 
958cb3
 	/* create control channel */
958cb3
-	if (_stp_register_ctl_channel() < 0)
958cb3
+	ret = _stp_register_ctl_channel();
958cb3
+	if (ret < 0)
958cb3
 		goto err1;
958cb3
 
958cb3
 	/* create print buffers */
958cb3
-	if (_stp_print_init() < 0)
958cb3
+	ret = _stp_print_init();
958cb3
+	if (ret < 0) {
958cb3
+		errk("%s: can't create print buffers!", THIS_MODULE->name);
958cb3
 		goto err2;
958cb3
+	}
958cb3
 
958cb3
 	/* set _stp_module_self dynamic info */
958cb3
-	if (_stp_module_update_self() < 0)
958cb3
+	ret = _stp_module_update_self();
958cb3
+	if (ret < 0) {
958cb3
+		errk("%s: can't update dynamic info!", THIS_MODULE->name);
958cb3
 		goto err3;
958cb3
+	}
958cb3
 
958cb3
 	/* start transport */
958cb3
 	_stp_transport_data_fs_start();
958cb3
@@ -639,7 +649,7 @@ err2:
958cb3
 err1:
958cb3
 	_stp_transport_fs_close();
958cb3
 err0:
958cb3
-	return -1;
958cb3
+	return ret;
958cb3
 }
958cb3
 
958cb3
 static inline void _stp_lock_inode(struct inode *inode)
958cb3
commit 341bf33f14062269c52bcebaa309518d9972ca00
958cb3
Author: Frank Ch. Eigler <fche@redhat.com>
958cb3
Date:   Fri Dec 11 18:06:36 2020 -0500
958cb3
958cb3
    staprun: handle more and fewer cpus better
958cb3
    
958cb3
    NR_CPUS was a hard-coded minimum and maximum on the number of CPUs
958cb3
    worth of trace$N files staprun/stapio would open at startup.  While a
958cb3
    constant is useful for array sizing (and so might as well be really
958cb3
    large), the actual iteration should be informed by get_nprocs_conf(3).
958cb3
    
958cb3
    This patch replaces NR_CPUS with MAX_NR_CPUS (now 1024, why not), and
958cb3
    limits open/thread iterations to the actual number of processors.  It
958cb3
    even prints an error if a behemoth >1K-core machine comes into being.
958cb3
958cb3
diff --git a/staprun/relay.c b/staprun/relay.c
958cb3
index c76e76719..3eb8df34b 100644
958cb3
--- a/staprun/relay.c
958cb3
+++ b/staprun/relay.c
958cb3
@@ -12,16 +12,16 @@
958cb3
 
958cb3
 #include "staprun.h"
958cb3
 
958cb3
-int out_fd[NR_CPUS];
958cb3
+int out_fd[MAX_NR_CPUS];
958cb3
 int monitor_end = 0;
958cb3
-static pthread_t reader[NR_CPUS];
958cb3
-static int relay_fd[NR_CPUS];
958cb3
-static int avail_cpus[NR_CPUS];
958cb3
-static int switch_file[NR_CPUS];
958cb3
-static pthread_mutex_t mutex[NR_CPUS];
958cb3
+static pthread_t reader[MAX_NR_CPUS];
958cb3
+static int relay_fd[MAX_NR_CPUS];
958cb3
+static int avail_cpus[MAX_NR_CPUS];
958cb3
+static int switch_file[MAX_NR_CPUS];
958cb3
+static pthread_mutex_t mutex[MAX_NR_CPUS];
958cb3
 static int bulkmode = 0;
958cb3
 static volatile int stop_threads = 0;
958cb3
-static time_t *time_backlog[NR_CPUS];
958cb3
+static time_t *time_backlog[MAX_NR_CPUS];
958cb3
 static int backlog_order=0;
958cb3
 #define BACKLOG_MASK ((1 << backlog_order) - 1)
958cb3
 #define MONITORLINELENGTH 4096
958cb3
@@ -313,12 +313,19 @@ int init_relayfs(void)
958cb3
 	if (send_request(STP_BULK, rqbuf, sizeof(rqbuf)) == 0)
958cb3
 		bulkmode = 1;
958cb3
 
958cb3
-	/* Try to open a slew of per-cpu trace%d files.  Per PR19241, we
958cb3
-	   need to go through all potentially present CPUs up to NR_CPUS, that
958cb3
-	   we hope is a reasonable limit.  For !bulknode, "trace0" will be
958cb3
-	   typically used. */
958cb3
+	/* Try to open a slew of per-cpu trace%d files.  Per PR19241,
958cb3
+	   we need to go through all potentially present CPUs up to
958cb3
+	   get_nprocs_conf(), up to MAX_NR_CPUS (used for array
958cb3
+	   allocations).  For !bulknode, "trace0" will be typically
958cb3
+	   used, prior to systemtap 4.5; after, all are used. */
958cb3
 
958cb3
-	for (i = 0; i < NR_CPUS; i++) {
958cb3
+        int nprocs = get_nprocs_conf();
958cb3
+        if (nprocs > MAX_NR_CPUS) {
958cb3
+                err("Too many CPUs: get_nprocs_conf()=%d vs MAX_NR_CPUS=%d\n", nprocs, MAX_NR_CPUS);
958cb3
+                return -1;
958cb3
+        }
958cb3
+        
958cb3
+	for (i = 0; i < nprocs; i++) {
958cb3
                 relay_fd[i] = -1;
958cb3
 
958cb3
 #ifdef HAVE_OPENAT
958cb3
@@ -348,7 +355,8 @@ int init_relayfs(void)
958cb3
 		}
958cb3
 	}
958cb3
 	ncpus = cpui;
958cb3
-	dbug(2, "ncpus=%d, bulkmode = %d\n", ncpus, bulkmode);
958cb3
+        /* ncpus could be smaller than nprocs if some cpus are offline */
958cb3
+	dbug(2, "ncpus=%d, nprocs=%d, bulkmode=%d\n", ncpus, nprocs, bulkmode);
958cb3
 	for (i = 0; i < ncpus; i++)
958cb3
 		dbug(2, "cpui=%d, relayfd=%d\n", i, avail_cpus[i]);
958cb3
 
958cb3
diff --git a/staprun/relay_old.c b/staprun/relay_old.c
958cb3
index f0d2e918f..248e6059d 100644
958cb3
--- a/staprun/relay_old.c
958cb3
+++ b/staprun/relay_old.c
958cb3
@@ -14,12 +14,12 @@
958cb3
 #include "staprun.h"
958cb3
 
958cb3
 /* temporary per-cpu output written here for relayfs, filebase0...N */
958cb3
-static int relay_fd[NR_CPUS];
958cb3
-static int proc_fd[NR_CPUS];
958cb3
-static FILE *percpu_tmpfile[NR_CPUS];
958cb3
-static char *relay_buffer[NR_CPUS];
958cb3
-static pthread_t reader[NR_CPUS];
958cb3
-static int switch_file[NR_CPUS];
958cb3
+static int relay_fd[MAX_NR_CPUS];
958cb3
+static int proc_fd[MAX_NR_CPUS];
958cb3
+static FILE *percpu_tmpfile[MAX_NR_CPUS];
958cb3
+static char *relay_buffer[MAX_NR_CPUS];
958cb3
+static pthread_t reader[MAX_NR_CPUS];
958cb3
+static int switch_file[MAX_NR_CPUS];
958cb3
 static int bulkmode = 0;
958cb3
 unsigned subbuf_size = 0;
958cb3
 unsigned n_subbufs = 0;
958cb3
@@ -37,7 +37,7 @@ static struct buf_status
958cb3
 {
958cb3
 	struct _stp_buf_info info;
958cb3
 	unsigned max_backlog; /* max # sub-buffers ready at one time */
958cb3
-} status[NR_CPUS];
958cb3
+} status[MAX_NR_CPUS];
958cb3
 
958cb3
 
958cb3
 /**
958cb3
@@ -461,7 +461,13 @@ int init_oldrelayfs(void)
958cb3
 	relay_fd[0] = -1;
958cb3
 	out_fd[0] = 0;
958cb3
 
958cb3
-	for (i = 0; i < NR_CPUS; i++) {
958cb3
+        int nprocs = get_nprocs_conf();
958cb3
+        if (nprocs > MAX_NR_CPUS) {
958cb3
+                err("Too many CPUs: get_nprocs_conf()=%d vs MAX_NR_CPUS=%d\n", nprocs, MAX_NR_CPUS);
958cb3
+                goto err;
958cb3
+        }
958cb3
+        
958cb3
+	for (i = 0; i < nprocs; i++) {
958cb3
 		int ret = open_relayfs_files(i, relay_filebase, proc_filebase);
958cb3
 		if (ret == 0)
958cb3
 			break;
958cb3
@@ -472,7 +478,8 @@ int init_oldrelayfs(void)
958cb3
 	}
958cb3
 
958cb3
 	ncpus = i;
958cb3
-	dbug(2, "ncpus=%d\n", ncpus);
958cb3
+        /* ncpus could be smaller than nprocs if some cpus are offline */
958cb3
+	dbug(2, "ncpus=%d, nprocs=%d\n", ncpus, nprocs);
958cb3
 
958cb3
 	if (ncpus == 0) {
958cb3
 		err("Couldn't open relayfs files.\n");
958cb3
diff --git a/staprun/stap_merge.c b/staprun/stap_merge.c
958cb3
index 7507f0e3d..87de7d465 100644
958cb3
--- a/staprun/stap_merge.c
958cb3
+++ b/staprun/stap_merge.c
958cb3
@@ -31,15 +31,15 @@ static void usage (char *prog)
958cb3
 }
958cb3
 
958cb3
 #define TIMESTAMP_SIZE (sizeof(int))
958cb3
-#define NR_CPUS 256
958cb3
+#define MAX_NR_CPUS 1024
958cb3
 
958cb3
 int main (int argc, char *argv[])
958cb3
 {
958cb3
 	char *buf, *outfile_name = NULL;
958cb3
 	int c, i, j, rc, dropped=0;
958cb3
-	long count=0, min, num[NR_CPUS] = { 0 };
958cb3
+	long count=0, min, num[MAX_NR_CPUS] = { 0 };
958cb3
 	FILE *ofp = NULL;
958cb3
-	FILE *fp[NR_CPUS] = { 0 };
958cb3
+	FILE *fp[MAX_NR_CPUS] = { 0 };
958cb3
 	int ncpus, len, verbose = 0;
958cb3
 	int bufsize = 65536;
958cb3
 
958cb3
@@ -67,6 +67,10 @@ int main (int argc, char *argv[])
958cb3
 
958cb3
 	i = 0;
958cb3
 	while (optind < argc) {
958cb3
+                if (i >= MAX_NR_CPUS) {
958cb3
+                        fprintf(stderr, "too many files (MAX_NR_CPUS=%d)\n", MAX_NR_CPUS);
958cb3
+			return -1;
958cb3
+		}                  
958cb3
 		fp[i] = fopen(argv[optind++], "r");
958cb3
 		if (!fp[i]) {
958cb3
 			fprintf(stderr, "error opening file %s.\n", argv[optind - 1]);
958cb3
diff --git a/staprun/staprun.h b/staprun/staprun.h
958cb3
index e05dbe5b6..2d68bf527 100644
958cb3
--- a/staprun/staprun.h
958cb3
+++ b/staprun/staprun.h
958cb3
@@ -37,6 +37,7 @@
958cb3
 #include <sys/wait.h>
958cb3
 #include <sys/statfs.h>
958cb3
 #include <syslog.h>
958cb3
+#include <sys/sysinfo.h>
958cb3
 
958cb3
 /* Include config.h to pick up dependency for --prefix usage. */
958cb3
 #include "../config.h"
958cb3
@@ -285,10 +286,10 @@ extern int optopt;
958cb3
 extern int optind;
958cb3
 
958cb3
 /* maximum number of CPUs we can handle */
958cb3
-#define NR_CPUS 256
958cb3
+#define MAX_NR_CPUS 1024
958cb3
 
958cb3
 /* relay*.c uses these */
958cb3
-extern int out_fd[NR_CPUS];
958cb3
+extern int out_fd[MAX_NR_CPUS];
958cb3
 
958cb3
 /* relay_old uses these. Set in ctl.c */
958cb3
 extern unsigned subbuf_size;
958cb3
commit b4b5a29b51586f75de16cacdb44bdf0b3ad0478e
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Mon Dec 14 13:20:34 2020 -0800
958cb3
958cb3
    staprun: use the correct out_fd when bulkmode and fsize_max aren't used
958cb3
    
958cb3
    When bulkmode and fsize_max aren't used, there is only one output fd and
958cb3
    it is stored at out_fd[avail_cpus[0]].
958cb3
958cb3
diff --git a/staprun/relay.c b/staprun/relay.c
958cb3
index 3eb8df34b..d0202e52f 100644
958cb3
--- a/staprun/relay.c
958cb3
+++ b/staprun/relay.c
958cb3
@@ -232,10 +232,17 @@ static void *reader_thread(void *data)
958cb3
 					wbuf += bytes;
958cb3
 					wsize += bytes;
958cb3
 				} else {
958cb3
-	                                rc = write(out_fd[cpu], wbuf, wbytes);
958cb3
+					int fd;
958cb3
+					/* Only bulkmode and fsize_max use per-cpu output files. Otherwise,
958cb3
+					   there's just a single output fd stored at out_fd[avail_cpus[0]]. */
958cb3
+					if (bulkmode || fsize_max)
958cb3
+						fd = out_fd[cpu];
958cb3
+					else
958cb3
+						fd = out_fd[avail_cpus[0]];
958cb3
+	                                rc = write(fd, wbuf, wbytes);
958cb3
 	                                if (rc <= 0) {
958cb3
 						perr("Couldn't write to output %d for cpu %d, exiting.",
958cb3
-	                                             out_fd[cpu], cpu);
958cb3
+	                                             fd, cpu);
958cb3
 	                                        goto error_out;
958cb3
 	                                }
958cb3
 	                                wbytes -= rc;
958cb3
commit b26b4e2c257e0bd65134eed5e51d754227a4ed3f
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 30 14:21:42 2020 -0800
958cb3
958cb3
    task_finder2: fix panics due to broken task work cancellation
958cb3
    
958cb3
    The task_work_cancel() API uses function pointers to uniquely identify
958cb3
    task work structs, so there's no guarantee that a specific task work
958cb3
    struct we want to cancel is the one that will actually get canceled.
958cb3
    This issue would cause task work structs to be freed while they were
958cb3
    still queued up on the task's task-worker list.
958cb3
    
958cb3
    This is an example of one such panic, where the DEBUG_MEM feature
958cb3
    reported that a __stp_tf_task_work struct (56 bytes) wasn't freed,
958cb3
    because that specific task worker got canceled and instead an active
958cb3
    task worker got freed!
958cb3
    
958cb3
    orxray_resty_mem_X_35062: ERROR: Memory ffff8809ed388620 len=56 allocation type: kmalloc. Not freed.
958cb3
    BUG: unable to handle kernel paging request at ffffffffa0570877
958cb3
    IP: [<ffffffffa0570877>] 0xffffffffa0570876
958cb3
    PGD 1abd067 PUD 1abe063 PMD 1028286067 PTE 0
958cb3
    Oops: 0010 [#1] SMP
958cb3
    CPU: 3 PID: 1338 Comm: nginx Tainted: G           OE  ------------   3.10.0-514.10.2.el7.x86_64.debug #1
958cb3
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
958cb3
    task: ffff880eae2d0000 ti: ffff880eaf2e4000 task.ti: ffff880eaf2e4000
958cb3
    RIP: 0010:[<ffffffffa0570877>]  [<ffffffffa0570877>] 0xffffffffa0570876
958cb3
    RSP: 0018:ffff880eaf2e7d78  EFLAGS: 00010282
958cb3
    RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000
958cb3
    RDX: ffff8809ed388640 RSI: 0000000000000000 RDI: ffff8809ed388640
958cb3
    RBP: ffff880eaf2e7da0 R08: 0000000000000000 R09: 0000000000000000
958cb3
    R10: 0000000000000001 R11: ffffffffff90001c R12: ffffffff8248b1c0
958cb3
    R13: ffff880eae2d0818 R14: ffff880eae2d0000 R15: 00007eff3d2490b0
958cb3
    FS:  00007eff3dcd2740(0000) GS:ffff881037c00000(0000) knlGS:0000000000000000
958cb3
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
958cb3
    CR2: ffffffffa0570877 CR3: 0000000ebce67000 CR4: 00000000003406e0
958cb3
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
958cb3
    DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
958cb3
    Stack:
958cb3
     ffffffff810c6544 ffff880eaf2e7f58 ffff880eaf2e7e70 ffff880eae2d0000
958cb3
     00007eff3dcb3338 ffff880eaf2e7e38 ffffffff810b31ba ffff880eaf2e7dc0
958cb3
     ffffffff8106c279 ffff880eaf2e7e50 ffff880ef8a792c0 ffff880eaf2e7df8
958cb3
    Call Trace:
958cb3
     [<ffffffff810c6544>] ? task_work_run+0xb4/0xe0
958cb3
     [<ffffffff810b31ba>] get_signal_to_deliver+0x85a/0x960
958cb3
     [<ffffffff8106c279>] ? kvm_sched_clock_read+0x9/0x20
958cb3
     [<ffffffff810e7b4d>] ? sched_clock_local+0x1d/0x80
958cb3
     [<ffffffff810e7dd8>] ? sched_clock_cpu+0xb8/0xe0
958cb3
     [<ffffffff810324a7>] do_signal+0x57/0x6e0
958cb3
     [<ffffffff8176dba6>] ? int_very_careful+0x5/0xd
958cb3
     [<ffffffff81032b8f>] do_notify_resume+0x5f/0xb0
958cb3
     [<ffffffff8176dbfd>] int_signal+0x12/0x17
958cb3
    Code:  Bad RIP value.
958cb3
    RIP  [<ffffffffa0570877>] 0xffffffffa0570876
958cb3
     RSP <ffff880eaf2e7d78>
958cb3
    CR2: ffffffffa0570877
958cb3
    ---[ end trace 1cdf8e5b522b246e ]---
958cb3
958cb3
diff --git a/runtime/linux/task_finder2.c b/runtime/linux/task_finder2.c
958cb3
index 4e0b68f7c..ecf1f77fd 100644
958cb3
--- a/runtime/linux/task_finder2.c
958cb3
+++ b/runtime/linux/task_finder2.c
958cb3
@@ -226,10 +226,22 @@ static void __stp_tf_cancel_all_task_work(void)
958cb3
 	// Cancel all remaining requests.
958cb3
 	stp_spin_lock_irqsave(&__stp_tf_task_work_list_lock, flags);
958cb3
 	list_for_each_entry_safe(node, tmp, &__stp_tf_task_work_list, list) {
958cb3
-		if (stp_task_work_cancel(node->task, node->work.func)) {
958cb3
-			list_del(&node->list);
958cb3
-			_stp_kfree(node);
958cb3
-		}
958cb3
+		struct __stp_tf_task_work *tf_work;
958cb3
+		struct task_work *work;
958cb3
+
958cb3
+		work = stp_task_work_cancel(node->task, node->work.func);
958cb3
+		if (!work)
958cb3
+			continue;
958cb3
+
958cb3
+		/*
958cb3
+		 * There can be multiple queued task workers with the same
958cb3
+		 * worker func, so there's no guarantee that tf_work == node.
958cb3
+		 * Therefore, we can only free what stp_task_work_cancel() just
958cb3
+		 * gave us; freeing 'node' would be unsafe.
958cb3
+		 */
958cb3
+		tf_work = container_of(work, typeof(*tf_work), work);
958cb3
+		list_del(&tf_work->list);
958cb3
+		_stp_kfree(tf_work);
958cb3
 	}
958cb3
 	stp_spin_unlock_irqrestore(&__stp_tf_task_work_list_lock, flags);
958cb3
 }
958cb3
commit 96470399a5a6fba864b90afd15eda43cdc8c8ac4
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 30 15:42:11 2020 -0800
958cb3
958cb3
    task_finder2: fix list corruption in __stp_tf_cancel_all_task_work()
958cb3
    
958cb3
    The previous commit (b26b4e2c2 "task_finder2: fix panics due to broken
958cb3
    task work cancellation") made it possible for the next node in the task
958cb3
    work list to be free, which would made list_for_each_entry_safe() not so
958cb3
    safe anymore. Using list_for_each_entry_safe() is still the fastest
958cb3
    approach here, so when the next node in the list happens to be freed, we
958cb3
    should just restart iteration on the list.
958cb3
958cb3
diff --git a/runtime/linux/task_finder2.c b/runtime/linux/task_finder2.c
958cb3
index ecf1f77fd..83fc17b5e 100644
958cb3
--- a/runtime/linux/task_finder2.c
958cb3
+++ b/runtime/linux/task_finder2.c
958cb3
@@ -225,6 +225,7 @@ static void __stp_tf_cancel_all_task_work(void)
958cb3
 
958cb3
 	// Cancel all remaining requests.
958cb3
 	stp_spin_lock_irqsave(&__stp_tf_task_work_list_lock, flags);
958cb3
+restart:
958cb3
 	list_for_each_entry_safe(node, tmp, &__stp_tf_task_work_list, list) {
958cb3
 		struct __stp_tf_task_work *tf_work;
958cb3
 		struct task_work *work;
958cb3
@@ -242,6 +243,21 @@ static void __stp_tf_cancel_all_task_work(void)
958cb3
 		tf_work = container_of(work, typeof(*tf_work), work);
958cb3
 		list_del(&tf_work->list);
958cb3
 		_stp_kfree(tf_work);
958cb3
+
958cb3
+		/*
958cb3
+		 * If the tf_work we just freed was the next node in the list,
958cb3
+		 * then we need to restart the list iteration because
958cb3
+		 * list_for_each_entry_safe() can't cope with the next node
958cb3
+		 * being freed. We still need to use list_for_each_entry_safe()
958cb3
+		 * because we need to get through one successful pass through
958cb3
+		 * the entire list, since it's not guaranteed that this list
958cb3
+		 * will be empty when this function exits, as there can still be
958cb3
+		 * active task workers running, which is fine since the
958cb3
+		 * stp_task_work API will wait for all task workers to finish
958cb3
+		 * before allowing the module to unload.
958cb3
+		 */
958cb3
+		if (tf_work == tmp)
958cb3
+			goto restart;
958cb3
 	}
958cb3
 	stp_spin_unlock_irqrestore(&__stp_tf_task_work_list_lock, flags);
958cb3
 }
958cb3
commit 6cb54128e005d1220a7b064ee42b9f72561c28e7
958cb3
Author: Sultan Alsawaf <sultan@openresty.com>
958cb3
Date:   Wed Dec 30 15:47:58 2020 -0800
958cb3
958cb3
    task_finder2: fix task worker race on module unload
958cb3
    
958cb3
    Unfortunately, __stp_tf_cancel_all_task_work() does not guarantee that
958cb3
    all of the task finder's task workers will be finished executing when it
958cb3
    returns. In this case, we rely on the stp_task_work API to prevent the
958cb3
    module from being unloaded while there are task workers in-flight, which
958cb3
    works, but the stp_task_work API is notified of a task worker finishing
958cb3
    before it actually finishes. Inside __stp_tf_task_worker_fn(), the
958cb3
    call to the task worker's function (tf_work->func) is where the final
958cb3
    refcount in the stp_task_work API could be put, but there will still be
958cb3
    instructions left in the task worker that will be executing for a short
958cb3
    time after that. In that short time, there can be a race where the
958cb3
    module is unloaded before the task worker finishes executing all of its
958cb3
    instructions, especially if the task worker gets preempted during this
958cb3
    time on a PREEMPT kernel.
958cb3
    
958cb3
    To remedy this, we must ensure that the last instruction in
958cb3
    __stp_tf_task_worker_fn() is where the stp_task_work API is notified of
958cb3
    a task worker finishing.
958cb3
958cb3
diff --git a/runtime/linux/task_finder2.c b/runtime/linux/task_finder2.c
958cb3
index 83fc17b5e..2bab19295 100644
958cb3
--- a/runtime/linux/task_finder2.c
958cb3
+++ b/runtime/linux/task_finder2.c
958cb3
@@ -150,6 +150,7 @@ __stp_tf_task_worker_fn(struct task_work *work)
958cb3
 	 * workers for this task.
958cb3
 	 */
958cb3
 	__stp_tf_task_work_free(work);
958cb3
+	stp_task_work_func_done();
958cb3
 }
958cb3
 
958cb3
 static void
958cb3
@@ -1066,11 +1067,8 @@ __stp_tf_clone_worker(struct task_work *work)
958cb3
 
958cb3
 	might_sleep();
958cb3
 	if (atomic_read(&__stp_task_finder_state) != __STP_TF_RUNNING
958cb3
-	    || current->flags & PF_EXITING) {
958cb3
-		/* Remember that this task_work_func is finished. */
958cb3
-		stp_task_work_func_done();
958cb3
+	    || current->flags & PF_EXITING)
958cb3
 		return;
958cb3
-	}
958cb3
 
958cb3
 	__stp_tf_handler_start();
958cb3
 
958cb3
@@ -1085,10 +1083,6 @@ __stp_tf_clone_worker(struct task_work *work)
958cb3
 	}
958cb3
 
958cb3
 	__stp_tf_handler_end();
958cb3
-
958cb3
-	/* Remember that this task_work_func is finished. */
958cb3
-	stp_task_work_func_done();
958cb3
-	return;
958cb3
 }
958cb3
 
958cb3
 
958cb3
@@ -1392,11 +1386,8 @@ __stp_tf_quiesce_worker(struct task_work *work)
958cb3
 
958cb3
 	might_sleep();
958cb3
 	if (atomic_read(&__stp_task_finder_state) != __STP_TF_RUNNING
958cb3
-	    || current->flags & PF_EXITING) {
958cb3
-		/* Remember that this task_work_func is finished. */
958cb3
-		stp_task_work_func_done();
958cb3
+	    || current->flags & PF_EXITING)
958cb3
 		return;
958cb3
-	}
958cb3
 
958cb3
         /* If we had a build-id based executable probe (so we have a
958cb3
          * tgt->build_id) set, we could not check it back in
958cb3
@@ -1420,8 +1411,6 @@ __stp_tf_quiesce_worker(struct task_work *work)
958cb3
                           (long) current->tgid, ok);
958cb3
                 if (!ok) {
958cb3
                         // stap_utrace_detach (current, & tgt->ops);
958cb3
-                        /* Remember that this task_work_func is finished. */
958cb3
-                        stp_task_work_func_done();
958cb3
                         return;
958cb3
                 }
958cb3
         } 
958cb3
@@ -1444,10 +1433,6 @@ __stp_tf_quiesce_worker(struct task_work *work)
958cb3
 	__stp_call_callbacks(tgt, current, 1, (current->pid == current->tgid));
958cb3
 
958cb3
 	__stp_tf_handler_end();
958cb3
-
958cb3
-	/* Remember that this task_work_func is finished. */
958cb3
-	stp_task_work_func_done();
958cb3
-	return;
958cb3
 }
958cb3
 
958cb3
 static u32
958cb3
@@ -1614,18 +1599,12 @@ __stp_tf_mmap_worker(struct task_work *work)
958cb3
 
958cb3
 	// See if we can find saved syscall info.
958cb3
 	entry = __stp_tf_get_map_entry(current);
958cb3
-	if (entry == NULL) {
958cb3
-		/* Remember that this task_work_func is finished. */
958cb3
-		stp_task_work_func_done();
958cb3
+	if (entry == NULL)
958cb3
 		return;
958cb3
-	}
958cb3
 
958cb3
 	if (atomic_read(&__stp_task_finder_state) != __STP_TF_RUNNING
958cb3
 	    || current->flags & PF_EXITING) {
958cb3
 		__stp_tf_remove_map_entry(entry);
958cb3
-
958cb3
-		/* Remember that this task_work_func is finished. */
958cb3
-		stp_task_work_func_done();
958cb3
 		return;
958cb3
 	}
958cb3
 
958cb3
@@ -1650,10 +1629,6 @@ __stp_tf_mmap_worker(struct task_work *work)
958cb3
 	__stp_tf_remove_map_entry(entry);
958cb3
 
958cb3
 	__stp_tf_handler_end();
958cb3
-
958cb3
-	/* Remember that this task_work_func is finished. */
958cb3
-	stp_task_work_func_done();
958cb3
-	return;
958cb3
 }
958cb3
 
958cb3
 static u32