* [PATCH 0/2] Disable ftrace during kvm guest entry/exit @ 2018-03-19 9:12 Naveen N. Rao 2018-03-19 9:13 ` [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths Naveen N. Rao 2018-03-19 9:13 ` [PATCH 2/2] powerpc64/ftrace: Disable ftrace during kvm guest entry/exit Naveen N. Rao 0 siblings, 2 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-19 9:12 UTC (permalink / raw) To: Steven Rostedt, Michael Ellerman, Paul Mackerras Cc: linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, Nicholas Piggin, sathnaga This is a follow on from the RFC posted at: https://www.mail-archive.com/linuxppc-dev@lists.ozlabs.org/msg130047.html This series implements a new field in paca called 'ftrace_disabled' to be set whenever we want to skip function tracing. This is currently only used by KVM guest entry/exit and as such, it is guarded in CONFIG_KVM as suggested by Steven Rostedt. This has had some minimal testing, and I will continue to test it this week and report back if I see any issues. - Naveen Naveen N. Rao (2): powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths powerpc64/ftrace: Disable ftrace during kvm guest entry/exit arch/powerpc/include/asm/paca.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kernel/trace/ftrace_64_mprofile.S | 13 +++++++++++++ arch/powerpc/kernel/trace/ftrace_64_pg.S | 6 ++++++ arch/powerpc/kvm/book3s_hv_rmhandlers.S | 8 ++++++++ 5 files changed, 29 insertions(+) -- 2.16.2 ^ permalink raw reply [flat|nested] 10+ messages in thread
* [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 9:12 [PATCH 0/2] Disable ftrace during kvm guest entry/exit Naveen N. Rao @ 2018-03-19 9:13 ` Naveen N. Rao 2018-03-19 10:40 ` Nicholas Piggin 2018-03-19 14:13 ` Steven Rostedt 2018-03-19 9:13 ` [PATCH 2/2] powerpc64/ftrace: Disable ftrace during kvm guest entry/exit Naveen N. Rao 1 sibling, 2 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-19 9:13 UTC (permalink / raw) To: Steven Rostedt, Michael Ellerman, Paul Mackerras Cc: linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, Nicholas Piggin, sathnaga We have some C code that we call into from real mode where we cannot take any exceptions. Though the C functions themselves are mostly safe, if these functions are traced, there is a possibility that we may take an exception. For instance, in certain conditions, the ftrace code uses WARN(), which uses a 'trap' to do its job. For such scenarios, introduce a new field in paca 'ftrace_disabled', which is checked on ftrace entry before continuing. This field can then be set to a non-zero value to disable/pause ftrace, and reset to zero to resume ftrace. Since KVM is the only user for this currently, we guard the ftrace/mcount checks within CONFIG_KVM. This can later be removed if/when there are other users. Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com> --- arch/powerpc/include/asm/paca.h | 1 + arch/powerpc/kernel/asm-offsets.c | 1 + arch/powerpc/kernel/trace/ftrace_64_mprofile.S | 13 +++++++++++++ arch/powerpc/kernel/trace/ftrace_64_pg.S | 6 ++++++ 4 files changed, 21 insertions(+) diff --git a/arch/powerpc/include/asm/paca.h b/arch/powerpc/include/asm/paca.h index d2bf71dddbef..4f47adc2a408 100644 --- a/arch/powerpc/include/asm/paca.h +++ b/arch/powerpc/include/asm/paca.h @@ -211,6 +211,7 @@ struct paca_struct { u16 in_mce; u8 hmi_event_available; /* HMI event is available */ u8 hmi_p9_special_emu; /* HMI P9 special emulation */ + u8 ftrace_disabled; #endif /* Stuff for accurate time accounting */ diff --git a/arch/powerpc/kernel/asm-offsets.c b/arch/powerpc/kernel/asm-offsets.c index ea5eb91b836e..8e4fc96ff6bc 100644 --- a/arch/powerpc/kernel/asm-offsets.c +++ b/arch/powerpc/kernel/asm-offsets.c @@ -240,6 +240,7 @@ int main(void) OFFSET(PACA_RFI_FLUSH_FALLBACK_AREA, paca_struct, rfi_flush_fallback_area); OFFSET(PACA_EXRFI, paca_struct, exrfi); OFFSET(PACA_L1D_FLUSH_SIZE, paca_struct, l1d_flush_size); + OFFSET(PACA_FTRACE_DISABLED, paca_struct, ftrace_disabled); #endif OFFSET(PACAHWCPUID, paca_struct, hw_cpu_id); diff --git a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S b/arch/powerpc/kernel/trace/ftrace_64_mprofile.S index 3f3e81852422..fdf702b4df25 100644 --- a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S +++ b/arch/powerpc/kernel/trace/ftrace_64_mprofile.S @@ -60,6 +60,19 @@ _GLOBAL(ftrace_caller) mfxer r10 mfcr r11 +#ifdef CONFIG_KVM + lbz r3, PACA_FTRACE_DISABLED(r13) + cmpdi r3, 0 + beq 1f + mflr r3 + mtctr r3 + REST_GPR(3, r1) + addi r1, r1, SWITCH_FRAME_SIZE + mtlr r0 + bctr +1: +#endif + /* Get the _mcount() call site out of LR */ mflr r7 /* Save it as pt_regs->nip */ diff --git a/arch/powerpc/kernel/trace/ftrace_64_pg.S b/arch/powerpc/kernel/trace/ftrace_64_pg.S index f095358da96e..5b2a99129322 100644 --- a/arch/powerpc/kernel/trace/ftrace_64_pg.S +++ b/arch/powerpc/kernel/trace/ftrace_64_pg.S @@ -16,6 +16,12 @@ #ifdef CONFIG_DYNAMIC_FTRACE _GLOBAL_TOC(ftrace_caller) +#ifdef CONFIG_KVM + lbz r3, PACA_FTRACE_DISABLED(r13) + cmpdi r3, 0 + bnelr +#endif + /* Taken from output of objdump from lib64/glibc */ mflr r3 ld r11, 0(r1) -- 2.16.2 ^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 9:13 ` [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths Naveen N. Rao @ 2018-03-19 10:40 ` Nicholas Piggin 2018-03-19 18:53 ` Naveen N. Rao 2018-03-19 22:34 ` Michael Ellerman 2018-03-19 14:13 ` Steven Rostedt 1 sibling, 2 replies; 10+ messages in thread From: Nicholas Piggin @ 2018-03-19 10:40 UTC (permalink / raw) To: Naveen N. Rao Cc: Steven Rostedt, Michael Ellerman, Paul Mackerras, linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, sathnaga On Mon, 19 Mar 2018 14:43:00 +0530 "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: > We have some C code that we call into from real mode where we cannot > take any exceptions. Though the C functions themselves are mostly safe, > if these functions are traced, there is a possibility that we may take > an exception. For instance, in certain conditions, the ftrace code uses > WARN(), which uses a 'trap' to do its job. > > For such scenarios, introduce a new field in paca 'ftrace_disabled', > which is checked on ftrace entry before continuing. This field can then > be set to a non-zero value to disable/pause ftrace, and reset to zero to > resume ftrace. > > Since KVM is the only user for this currently, we guard the > ftrace/mcount checks within CONFIG_KVM. This can later be removed > if/when there are other users. Why not test HSTATE_IN_GUEST then? Add ftrace_disabled if non-KVM users come along. Thanks, Nick ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 10:40 ` Nicholas Piggin @ 2018-03-19 18:53 ` Naveen N. Rao 2018-03-19 22:34 ` Michael Ellerman 1 sibling, 0 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-19 18:53 UTC (permalink / raw) To: Nicholas Piggin Cc: Anton Blanchard, Benjamin Herrenschmidt, linuxppc-dev, Michael Ellerman, Paul Mackerras, Steven Rostedt, sathnaga Nicholas Piggin wrote: > On Mon, 19 Mar 2018 14:43:00 +0530 > "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: >=20 >> We have some C code that we call into from real mode where we cannot >> take any exceptions. Though the C functions themselves are mostly safe, >> if these functions are traced, there is a possibility that we may take >> an exception. For instance, in certain conditions, the ftrace code uses >> WARN(), which uses a 'trap' to do its job. >>=20 >> For such scenarios, introduce a new field in paca 'ftrace_disabled', >> which is checked on ftrace entry before continuing. This field can then >> be set to a non-zero value to disable/pause ftrace, and reset to zero to >> resume ftrace. >>=20 >> Since KVM is the only user for this currently, we guard the >> ftrace/mcount checks within CONFIG_KVM. This can later be removed >> if/when there are other users. >=20 > Why not test HSTATE_IN_GUEST then? Add ftrace_disabled if non-KVM users > come along. That's indeed simpler -- thanks for the suggestion! - Naveen = ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 10:40 ` Nicholas Piggin 2018-03-19 18:53 ` Naveen N. Rao @ 2018-03-19 22:34 ` Michael Ellerman 2018-03-20 0:05 ` Nicholas Piggin 2018-03-20 11:02 ` Naveen N. Rao 1 sibling, 2 replies; 10+ messages in thread From: Michael Ellerman @ 2018-03-19 22:34 UTC (permalink / raw) To: Nicholas Piggin, Naveen N. Rao Cc: Steven Rostedt, Paul Mackerras, linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, sathnaga Nicholas Piggin <npiggin@gmail.com> writes: > On Mon, 19 Mar 2018 14:43:00 +0530 > "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: > >> We have some C code that we call into from real mode where we cannot >> take any exceptions. Though the C functions themselves are mostly safe, >> if these functions are traced, there is a possibility that we may take >> an exception. For instance, in certain conditions, the ftrace code uses >> WARN(), which uses a 'trap' to do its job. >> >> For such scenarios, introduce a new field in paca 'ftrace_disabled', >> which is checked on ftrace entry before continuing. This field can then >> be set to a non-zero value to disable/pause ftrace, and reset to zero to >> resume ftrace. >> >> Since KVM is the only user for this currently, we guard the >> ftrace/mcount checks within CONFIG_KVM. This can later be removed >> if/when there are other users. > > Why not test HSTATE_IN_GUEST then? Add ftrace_disabled if non-KVM users > come along. We want to use it for the kexec down path, we've already had bugs there. So please keep the separate flag and pull it out of #ifdef KVM. If we're worried about space usage in the paca we can probably consolidate this and some other things into a flags word. cheers ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 22:34 ` Michael Ellerman @ 2018-03-20 0:05 ` Nicholas Piggin 2018-03-20 11:02 ` Naveen N. Rao 1 sibling, 0 replies; 10+ messages in thread From: Nicholas Piggin @ 2018-03-20 0:05 UTC (permalink / raw) To: Michael Ellerman Cc: Naveen N. Rao, Steven Rostedt, Paul Mackerras, linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, sathnaga On Tue, 20 Mar 2018 09:34:43 +1100 Michael Ellerman <mpe@ellerman.id.au> wrote: > Nicholas Piggin <npiggin@gmail.com> writes: > > > On Mon, 19 Mar 2018 14:43:00 +0530 > > "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: > > > >> We have some C code that we call into from real mode where we cannot > >> take any exceptions. Though the C functions themselves are mostly safe, > >> if these functions are traced, there is a possibility that we may take > >> an exception. For instance, in certain conditions, the ftrace code uses > >> WARN(), which uses a 'trap' to do its job. > >> > >> For such scenarios, introduce a new field in paca 'ftrace_disabled', > >> which is checked on ftrace entry before continuing. This field can then > >> be set to a non-zero value to disable/pause ftrace, and reset to zero to > >> resume ftrace. > >> > >> Since KVM is the only user for this currently, we guard the > >> ftrace/mcount checks within CONFIG_KVM. This can later be removed > >> if/when there are other users. > > > > Why not test HSTATE_IN_GUEST then? Add ftrace_disabled if non-KVM users > > come along. > > We want to use it for the kexec down path, we've already had bugs there. > > So please keep the separate flag and pull it out of #ifdef KVM. Okay that's fine. > If we're worried about space usage in the paca we can probably > consolidate this and some other things into a flags word. I'm not too concerned about some more u8 flags. Thanks, Nick ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 22:34 ` Michael Ellerman 2018-03-20 0:05 ` Nicholas Piggin @ 2018-03-20 11:02 ` Naveen N. Rao 1 sibling, 0 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-20 11:02 UTC (permalink / raw) To: Michael Ellerman, Nicholas Piggin Cc: Anton Blanchard, Benjamin Herrenschmidt, linuxppc-dev, Paul Mackerras, Steven Rostedt, sathnaga Michael Ellerman wrote: > Nicholas Piggin <npiggin@gmail.com> writes: >=20 >> On Mon, 19 Mar 2018 14:43:00 +0530 >> "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: >> >>> We have some C code that we call into from real mode where we cannot >>> take any exceptions. Though the C functions themselves are mostly safe, >>> if these functions are traced, there is a possibility that we may take >>> an exception. For instance, in certain conditions, the ftrace code uses >>> WARN(), which uses a 'trap' to do its job. >>>=20 >>> For such scenarios, introduce a new field in paca 'ftrace_disabled', >>> which is checked on ftrace entry before continuing. This field can then >>> be set to a non-zero value to disable/pause ftrace, and reset to zero t= o >>> resume ftrace. >>>=20 >>> Since KVM is the only user for this currently, we guard the >>> ftrace/mcount checks within CONFIG_KVM. This can later be removed >>> if/when there are other users. >> >> Why not test HSTATE_IN_GUEST then? Add ftrace_disabled if non-KVM users >> come along. >=20 > We want to use it for the kexec down path, we've already had bugs there. I had looked at kexec and we seem to be disabling ftrace in=20 machine_kexec(). Has that been problematic? I didn't actually realize that you wanted to use this in kexec path as=20 well. >=20 > So please keep the separate flag and pull it out of #ifdef KVM. Sure. - Naveen = ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 9:13 ` [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths Naveen N. Rao 2018-03-19 10:40 ` Nicholas Piggin @ 2018-03-19 14:13 ` Steven Rostedt 2018-03-19 18:54 ` Naveen N. Rao 1 sibling, 1 reply; 10+ messages in thread From: Steven Rostedt @ 2018-03-19 14:13 UTC (permalink / raw) To: Naveen N. Rao Cc: Michael Ellerman, Paul Mackerras, linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, Nicholas Piggin, sathnaga On Mon, 19 Mar 2018 14:43:00 +0530 "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: > diff --git a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S b/arch/powerpc/kernel/trace/ftrace_64_mprofile.S > index 3f3e81852422..fdf702b4df25 100644 > --- a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S > +++ b/arch/powerpc/kernel/trace/ftrace_64_mprofile.S > @@ -60,6 +60,19 @@ _GLOBAL(ftrace_caller) > mfxer r10 > mfcr r11 > > +#ifdef CONFIG_KVM > + lbz r3, PACA_FTRACE_DISABLED(r13) > + cmpdi r3, 0 > + beq 1f > + mflr r3 > + mtctr r3 > + REST_GPR(3, r1) > + addi r1, r1, SWITCH_FRAME_SIZE > + mtlr r0 > + bctr > +1: > +#endif I wonder if we should try to move the return out of the fast path (for cache reasons), as most of the time the above compare will be true. That is: #ifdef CONFIG_KVM lbz r3, PACA_FTRACE_DISABLED(r13) cmpdi r3, 0 bne no_trace #endif /* rest of ftrace_caller code */ /* after ftrace_caller... */ bctr /* jump after _mcount site */ #ifdef CONFIG_KVM no_trace: mflr r3 mtctr r3 REST_GPR(3, r1) addi r1, r1, SWITCH_FRAME_SIZE mtlr r0 bctr #endif -- Steve > + > /* Get the _mcount() call site out of LR */ > mflr r7 > /* Save it as pt_regs->nip */ ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths 2018-03-19 14:13 ` Steven Rostedt @ 2018-03-19 18:54 ` Naveen N. Rao 0 siblings, 0 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-19 18:54 UTC (permalink / raw) To: Steven Rostedt Cc: Anton Blanchard, Benjamin Herrenschmidt, linuxppc-dev, Michael Ellerman, Nicholas Piggin, Paul Mackerras, sathnaga Steven Rostedt wrote: > On Mon, 19 Mar 2018 14:43:00 +0530 > "Naveen N. Rao" <naveen.n.rao@linux.vnet.ibm.com> wrote: >=20 >> diff --git a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S b/arch/power= pc/kernel/trace/ftrace_64_mprofile.S >> index 3f3e81852422..fdf702b4df25 100644 >> --- a/arch/powerpc/kernel/trace/ftrace_64_mprofile.S >> +++ b/arch/powerpc/kernel/trace/ftrace_64_mprofile.S >> @@ -60,6 +60,19 @@ _GLOBAL(ftrace_caller) >> mfxer r10 >> mfcr r11 >> =20 >> +#ifdef CONFIG_KVM >> + lbz r3, PACA_FTRACE_DISABLED(r13) >> + cmpdi r3, 0 >> + beq 1f >> + mflr r3 >> + mtctr r3 >> + REST_GPR(3, r1) >> + addi r1, r1, SWITCH_FRAME_SIZE >> + mtlr r0 >> + bctr >> +1: >> +#endif >=20 > I wonder if we should try to move the return out of the fast path (for > cache reasons), as most of the time the above compare will be true. That > is: >=20 > #ifdef CONFIG_KVM > lbz r3, PACA_FTRACE_DISABLED(r13) > cmpdi r3, 0 > bne no_trace > #endif >=20 > /* rest of ftrace_caller code */ >=20 > /* after ftrace_caller... */ > bctr /* jump after _mcount site */ >=20 > #ifdef CONFIG_KVM > no_trace: > mflr r3 > mtctr r3 > REST_GPR(3, r1) > addi r1, r1, SWITCH_FRAME_SIZE > mtlr r0 > bctr > #endif Thanks, I'll incorporate those changes in my next version. - Naveen = ^ permalink raw reply [flat|nested] 10+ messages in thread
* [PATCH 2/2] powerpc64/ftrace: Disable ftrace during kvm guest entry/exit 2018-03-19 9:12 [PATCH 0/2] Disable ftrace during kvm guest entry/exit Naveen N. Rao 2018-03-19 9:13 ` [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths Naveen N. Rao @ 2018-03-19 9:13 ` Naveen N. Rao 1 sibling, 0 replies; 10+ messages in thread From: Naveen N. Rao @ 2018-03-19 9:13 UTC (permalink / raw) To: Steven Rostedt, Michael Ellerman, Paul Mackerras Cc: linuxppc-dev, Benjamin Herrenschmidt, Anton Blanchard, Nicholas Piggin, sathnaga During guest entry/exit, we switch over to/from the guest MMU context. While doing so, we set our state to KVM_GUEST_MODE_HOST_HV to note down the fact that we cannot take any exceptions in the hypervisor code. Since ftrace may be enabled and since it can result in us taking a trap, disable ftrace by setting paca->ftrace_disabled. Once we exit the guest and restore host MMU context, we re-enable ftrace. Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com> --- arch/powerpc/kvm/book3s_hv_rmhandlers.S | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/powerpc/kvm/book3s_hv_rmhandlers.S b/arch/powerpc/kvm/book3s_hv_rmhandlers.S index f31f357b8c5a..9292087adb68 100644 --- a/arch/powerpc/kvm/book3s_hv_rmhandlers.S +++ b/arch/powerpc/kvm/book3s_hv_rmhandlers.S @@ -600,6 +600,10 @@ kvmppc_hv_entry: /* Save R1 in the PACA */ std r1, HSTATE_HOST_R1(r13) + /* Disable ftrace since we can't take a trap any more */ + li r6, 1 + stb r6, PACA_FTRACE_DISABLED(r13) + li r6, KVM_GUEST_MODE_HOST_HV stb r6, HSTATE_IN_GUEST(r13) @@ -2048,6 +2052,8 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_RADIX) /* Unset guest mode */ li r0, KVM_GUEST_MODE_NONE stb r0, HSTATE_IN_GUEST(r13) + li r0, 0 + stb r0, PACA_FTRACE_DISABLED(r13) ld r0, SFS+PPC_LR_STKOFF(r1) addi r1, r1, SFS @@ -3379,6 +3385,8 @@ END_MMU_FTR_SECTION_IFSET(MMU_FTR_TYPE_RADIX) ld r8, KVM_HOST_LPCR(r10) mtspr SPRN_LPCR, r8 isync + li r0, 0 + stb r0, PACA_FTRACE_DISABLED(r13) li r0, KVM_GUEST_MODE_NONE stb r0, HSTATE_IN_GUEST(r13) -- 2.16.2 ^ permalink raw reply related [flat|nested] 10+ messages in thread
end of thread, other threads:[~2018-03-20 11:03 UTC | newest] Thread overview: 10+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-03-19 9:12 [PATCH 0/2] Disable ftrace during kvm guest entry/exit Naveen N. Rao 2018-03-19 9:13 ` [PATCH 1/2] powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths Naveen N. Rao 2018-03-19 10:40 ` Nicholas Piggin 2018-03-19 18:53 ` Naveen N. Rao 2018-03-19 22:34 ` Michael Ellerman 2018-03-20 0:05 ` Nicholas Piggin 2018-03-20 11:02 ` Naveen N. Rao 2018-03-19 14:13 ` Steven Rostedt 2018-03-19 18:54 ` Naveen N. Rao 2018-03-19 9:13 ` [PATCH 2/2] powerpc64/ftrace: Disable ftrace during kvm guest entry/exit Naveen N. Rao
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).