(2015/01/29 13:40), Alexei Starovoitov wrote: > On Wed, Jan 28, 2015 at 4:46 PM, Namhyung Kim <namhyung@xxxxxxxxxx> wrote: >>> >>> +static int event_filter_release(struct inode *inode, struct file *filp) >>> +{ >>> + struct ftrace_event_file *file; >>> + char buf[2] = "0"; >>> + >>> + mutex_lock(&event_mutex); >>> + file = event_file_data(filp); >>> + if (file) { >>> + if (file->flags & TRACE_EVENT_FL_BPF) { >>> + /* auto-disable the filter */ >>> + ftrace_event_enable_disable(file, 0); >> >> Hmm.. what if user already enabled an event, attached a bpf filter and >> then detached the filter - I'm not sure we can always auto-disable >> it.. > > why not? > I think it makes sense auto enable/disable, since that > is cleaner user experience. Maybe, would we need a reference counter for each event? :) Actually, ftrace event is not similar to perf-event which ktap is based on, ftrace event interface is always exported via debugfs, this means users can share the event for different usage. One possible other solution is to add a instance-lock interface for each ftrace instance and lock it by bpf. Then, other users can not enable/disable the events in the instance. Thank you, -- Masami HIRAMATSU Software Platform Research Dept. Linux Technology Research Center Hitachi, Ltd., Yokohama Research Laboratory E-mail: masami.hiramatsu.pt@xxxxxxxxxxx -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html