All of lore.kernel.org
 help / color / mirror / Atom feed
* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
@ 2014-04-16  4:38 Victor Kamensky
  2014-04-16  4:38 ` Victor Kamensky
  0 siblings, 1 reply; 10+ messages in thread
From: Victor Kamensky @ 2014-04-16  4:38 UTC (permalink / raw)
  To: linux-arm-kernel

Hi,

As it was discussed on [1] today, here is potential ARM specific
fix for uprobes dcache/icache flush problem. I am aware that
other options are still under discussion. This patch is provided for
reference only as one of possible solutions.

The xol slot flush code shares code with ARM backend of
copy_to_user_page - flush_ptrace_access function. But code and new 
implementation of flush_uprobe_xol_access modified in such way that
xol flush does need vma.

Changes since V2 [2] version:

x) address Dave Long's comment about passing checkpatch

x) addressed Oleg's comment and instead of arch_uprobe_flush_xol_access
function use arch_uprobe_copy_ixol function that maps kernel pages, 
copies, and flush caches

x) removed FLAG_UA_BROADCAST, during discussion on [1] it was
elaborated that task executing xol single step could be 
migrated to another CPU, so we need to take care of remote
icaches if CPU does not support remote snooping. I.e
flush_uprobe_xol_access will check cache_ops_need_broadcast()
and perform smp_call_function on SMP CPUs that do not
support remote snooping.

x) added preempt_disable/preempt_enable in arch_uprobe_copy_ixol as
copy_to_user_page does. I admit that I have some guesses, but I 
don't completely understand why copy_to_user_page does that, so 
playing on safe side - added it similar to copy_to_user_page code.

Thanks,
Victor

[1] http://lists.infradead.org/pipermail/linux-arm-kernel/2014-April/247611.html

[2] http://lists.infradead.org/pipermail/linux-arm-kernel/2014-April/245743.html

Victor Kamensky (1):
  ARM: uprobes need icache flush after xol write

 arch/arm/include/asm/cacheflush.h |  2 ++
 arch/arm/kernel/uprobes.c         | 22 ++++++++++++++++++++++
 arch/arm/mm/flush.c               | 33 ++++++++++++++++++++++++++++-----
 include/linux/uprobes.h           |  3 +++
 kernel/events/uprobes.c           | 25 +++++++++++++++++--------
 5 files changed, 72 insertions(+), 13 deletions(-)

-- 
1.8.1.4

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16  4:38 [RFC PATCH v3] ARM: uprobes need icache flush after xol write Victor Kamensky
@ 2014-04-16  4:38 ` Victor Kamensky
  2014-04-16 15:06   ` Oleg Nesterov
  0 siblings, 1 reply; 10+ messages in thread
From: Victor Kamensky @ 2014-04-16  4:38 UTC (permalink / raw)
  To: linux-arm-kernel

After instruction write into xol area, on ARM V7
architecture code need to flush dcache and icache to sync
them up for given set of addresses. Having just
'flush_dcache_page(page)' call is not enough - it is
possible to have stale instruction sitting in icache
for given xol area slot address.

Introduce arch_uprobe_ixol_copy weak function
that by default calls uprobes copy_to_page function and
than flush_dcache_page function and on ARM define new one
that handles xol slot copy in ARM specific way

flush_uprobe_xol_access function shares/reuses implementation
with/of flush_ptrace_access function and takes care of writing
instruction to user land address space on given variety of
different cache types on ARM CPUs. Because
flush_uprobe_xol_access does not have vma around
flush_ptrace_access was split into two parts. First that
retrieves set of condition from vma and common that receives
those conditions as flags.

Note ARM cache flush function need kernel address
through which instruction write happened, so instead
of using uprobes copy_to_page function changed
code to explicitly map page and do memcpy.

Note arch_uprobe_copy_ixol function, in similar way as
copy_to_user_page function, has preempt_disable/preempt_enable
in case of CONFIG_SMP.

Signed-off-by: Victor Kamensky <victor.kamensky@linaro.org>
---
 arch/arm/include/asm/cacheflush.h |  2 ++
 arch/arm/kernel/uprobes.c         | 22 ++++++++++++++++++++++
 arch/arm/mm/flush.c               | 33 ++++++++++++++++++++++++++++-----
 include/linux/uprobes.h           |  3 +++
 kernel/events/uprobes.c           | 25 +++++++++++++++++--------
 5 files changed, 72 insertions(+), 13 deletions(-)

diff --git a/arch/arm/include/asm/cacheflush.h b/arch/arm/include/asm/cacheflush.h
index 8b8b616..e02712a 100644
--- a/arch/arm/include/asm/cacheflush.h
+++ b/arch/arm/include/asm/cacheflush.h
@@ -487,4 +487,6 @@ int set_memory_rw(unsigned long addr, int numpages);
 int set_memory_x(unsigned long addr, int numpages);
 int set_memory_nx(unsigned long addr, int numpages);
 
+void flush_uprobe_xol_access(struct page *page, unsigned long uaddr,
+			     void *kaddr, unsigned long len);
 #endif
diff --git a/arch/arm/kernel/uprobes.c b/arch/arm/kernel/uprobes.c
index f9bacee..e840be2 100644
--- a/arch/arm/kernel/uprobes.c
+++ b/arch/arm/kernel/uprobes.c
@@ -113,6 +113,28 @@ int arch_uprobe_analyze_insn(struct arch_uprobe *auprobe, struct mm_struct *mm,
 	return 0;
 }
 
+void arch_uprobe_copy_ixol(struct page *page, unsigned long vaddr,
+			   void *src, unsigned long len)
+{
+	void *xol_page_kaddr = kmap_atomic(page);
+	void *dst = xol_page_kaddr + (vaddr & ~PAGE_MASK);
+
+#ifdef CONFIG_SMP
+	preempt_disable();
+#endif
+	/* Initialize the slot */
+	memcpy(dst, src, len);
+
+	/* flush caches (dcache/icache) */
+	flush_uprobe_xol_access(page, vaddr, dst, len);
+
+#ifdef CONFIG_SMP
+	preempt_enable();
+#endif
+	kunmap_atomic(xol_page_kaddr);
+}
+
+
 int arch_uprobe_pre_xol(struct arch_uprobe *auprobe, struct pt_regs *regs)
 {
 	struct uprobe_task *utask = current->utask;
diff --git a/arch/arm/mm/flush.c b/arch/arm/mm/flush.c
index 3387e60..43d54f5 100644
--- a/arch/arm/mm/flush.c
+++ b/arch/arm/mm/flush.c
@@ -104,17 +104,20 @@ void flush_cache_page(struct vm_area_struct *vma, unsigned long user_addr, unsig
 #define flush_icache_alias(pfn,vaddr,len)	do { } while (0)
 #endif
 
+#define FLAG_PA_IS_EXEC 1
+#define FLAG_PA_CORE_IN_MM 2
+
 static void flush_ptrace_access_other(void *args)
 {
 	__flush_icache_all();
 }
 
-static
-void flush_ptrace_access(struct vm_area_struct *vma, struct page *page,
-			 unsigned long uaddr, void *kaddr, unsigned long len)
+static inline
+void __flush_ptrace_access(struct page *page, unsigned long uaddr, void *kaddr,
+			   unsigned long len, unsigned int flags)
 {
 	if (cache_is_vivt()) {
-		if (cpumask_test_cpu(smp_processor_id(), mm_cpumask(vma->vm_mm))) {
+		if (flags & FLAG_PA_CORE_IN_MM) {
 			unsigned long addr = (unsigned long)kaddr;
 			__cpuc_coherent_kern_range(addr, addr + len);
 		}
@@ -128,7 +131,7 @@ void flush_ptrace_access(struct vm_area_struct *vma, struct page *page,
 	}
 
 	/* VIPT non-aliasing D-cache */
-	if (vma->vm_flags & VM_EXEC) {
+	if (flags & FLAG_PA_IS_EXEC) {
 		unsigned long addr = (unsigned long)kaddr;
 		if (icache_is_vipt_aliasing())
 			flush_icache_alias(page_to_pfn(page), uaddr, len);
@@ -140,6 +143,26 @@ void flush_ptrace_access(struct vm_area_struct *vma, struct page *page,
 	}
 }
 
+static
+void flush_ptrace_access(struct vm_area_struct *vma, struct page *page,
+			 unsigned long uaddr, void *kaddr, unsigned long len)
+{
+	unsigned int flags = 0;
+	if (cpumask_test_cpu(smp_processor_id(), mm_cpumask(vma->vm_mm)))
+		flags |= FLAG_PA_CORE_IN_MM;
+	if (vma->vm_flags & VM_EXEC)
+		flags |= FLAG_PA_IS_EXEC;
+	__flush_ptrace_access(page, uaddr, kaddr, len, flags);
+}
+
+void flush_uprobe_xol_access(struct page *page, unsigned long uaddr,
+			     void *kaddr, unsigned long len)
+{
+	unsigned int flags = FLAG_PA_CORE_IN_MM|FLAG_PA_IS_EXEC;
+
+	__flush_ptrace_access(page, uaddr, kaddr, len, flags);
+}
+
 /*
  * Copy user data from/to a page which is mapped into a different
  * processes address space.  Really, we want to allow our "user
diff --git a/include/linux/uprobes.h b/include/linux/uprobes.h
index edff2b9..c52f827 100644
--- a/include/linux/uprobes.h
+++ b/include/linux/uprobes.h
@@ -32,6 +32,7 @@ struct vm_area_struct;
 struct mm_struct;
 struct inode;
 struct notifier_block;
+struct page;
 
 #define UPROBE_HANDLER_REMOVE		1
 #define UPROBE_HANDLER_MASK		1
@@ -127,6 +128,8 @@ extern int  arch_uprobe_exception_notify(struct notifier_block *self, unsigned l
 extern void arch_uprobe_abort_xol(struct arch_uprobe *aup, struct pt_regs *regs);
 extern unsigned long arch_uretprobe_hijack_return_addr(unsigned long trampoline_vaddr, struct pt_regs *regs);
 extern bool __weak arch_uprobe_ignore(struct arch_uprobe *aup, struct pt_regs *regs);
+extern void __weak arch_uprobe_copy_ixol(struct page *page, unsigned long vaddr,
+					 void *src, unsigned long len);
 #else /* !CONFIG_UPROBES */
 struct uprobes_state {
 };
diff --git a/kernel/events/uprobes.c b/kernel/events/uprobes.c
index 04709b6..4968213 100644
--- a/kernel/events/uprobes.c
+++ b/kernel/events/uprobes.c
@@ -1296,14 +1296,8 @@ static unsigned long xol_get_insn_slot(struct uprobe *uprobe)
 	if (unlikely(!xol_vaddr))
 		return 0;
 
-	/* Initialize the slot */
-	copy_to_page(area->page, xol_vaddr,
-			&uprobe->arch.ixol, sizeof(uprobe->arch.ixol));
-	/*
-	 * We probably need flush_icache_user_range() but it needs vma.
-	 * This should work on supported architectures too.
-	 */
-	flush_dcache_page(area->page);
+	arch_uprobe_copy_ixol(area->page, xol_vaddr,
+			      &uprobe->arch.ixol, sizeof(uprobe->arch.ixol));
 
 	return xol_vaddr;
 }
@@ -1346,6 +1340,21 @@ static void xol_free_insn_slot(struct task_struct *tsk)
 	}
 }
 
+void __weak arch_uprobe_copy_ixol(struct page *page, unsigned long vaddr,
+				  void *src, unsigned long len)
+{
+	/* Initialize the slot */
+	copy_to_page(page, vaddr, src, len);
+
+	/*
+	 * We probably need flush_icache_user_range() but it needs vma.
+	 * This should work on most of architectures by default. If
+	 * architecture needs to do something different it can define
+	 * its own version of the function.
+	 */
+	flush_dcache_page(page);
+}
+
 /**
  * uprobe_get_swbp_addr - compute address of swbp given post-swbp regs
  * @regs: Reflects the saved state of the task after it has hit a breakpoint
-- 
1.8.1.4

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16  4:38 ` Victor Kamensky
@ 2014-04-16 15:06   ` Oleg Nesterov
  2014-04-16 15:10     ` David Miller
  0 siblings, 1 reply; 10+ messages in thread
From: Oleg Nesterov @ 2014-04-16 15:06 UTC (permalink / raw)
  To: linux-arm-kernel

On 04/15, Victor Kamensky wrote:
>
>  arch/arm/include/asm/cacheflush.h |  2 ++
>  arch/arm/kernel/uprobes.c         | 22 ++++++++++++++++++++++
>  arch/arm/mm/flush.c               | 33 ++++++++++++++++++++++++++++-----
>  include/linux/uprobes.h           |  3 +++
>  kernel/events/uprobes.c           | 25 +++++++++++++++++--------

Obviously I can't comment the changes in arm/ ;)

But I'd vote for this patch.



Off-topic, I am just curious... can't someone explain why flush_pfn_alias()
or flush_icache_alias() can't race with itself ? I have no idea what they do,
but what if another thread calls the same function with the same CACHE_COLOUR()
right after set_pte_ext?

Oleg.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16 15:06   ` Oleg Nesterov
@ 2014-04-16 15:10     ` David Miller
       [not found]       ` <20140416152946.GA13564@redhat.com>
  0 siblings, 1 reply; 10+ messages in thread
From: David Miller @ 2014-04-16 15:10 UTC (permalink / raw)
  To: linux-arm-kernel

From: Oleg Nesterov <oleg@redhat.com>
Date: Wed, 16 Apr 2014 17:06:46 +0200

> Off-topic, I am just curious... can't someone explain why flush_pfn_alias()
> or flush_icache_alias() can't race with itself ? I have no idea what they do,
> but what if another thread calls the same function with the same CACHE_COLOUR()
> right after set_pte_ext?

PTE modifications are supposed to run with the page table lock held.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
       [not found]       ` <20140416152946.GA13564@redhat.com>
@ 2014-04-16 15:47         ` David Miller
  2014-04-16 16:53           ` Oleg Nesterov
  2014-04-16 20:22           ` Russell King - ARM Linux
  0 siblings, 2 replies; 10+ messages in thread
From: David Miller @ 2014-04-16 15:47 UTC (permalink / raw)
  To: linux-arm-kernel

From: Oleg Nesterov <oleg@redhat.com>
Date: Wed, 16 Apr 2014 17:29:46 +0200

> On 04/16, David Miller wrote:
>>
>> From: Oleg Nesterov <oleg@redhat.com>
>> Date: Wed, 16 Apr 2014 17:06:46 +0200
>>
>> > Off-topic, I am just curious... can't someone explain why flush_pfn_alias()
>> > or flush_icache_alias() can't race with itself ? I have no idea what they do,
>> > but what if another thread calls the same function with the same CACHE_COLOUR()
>> > right after set_pte_ext?
>>
>> PTE modifications are supposed to run with the page table lock held.
> 
> OK, but __access_remote_vm() doesn't take ptl?
> 
> And on arm copy_to_user_page()->flush_ptrace_access()->flush_pfn_alias()
> does this.

Well, for one thing, PTE's can't gain permissions except under mmap_sem
which __access_remote_vm() does hold.

But I see what you're saying, flush_pfn_alias() is doing something
different.  It's not making user mappings, but kernel ones in order
to implement the cache flush.

On sparc64 we handle this situation by hand-loading the mappings into
the TLB, doing the operation using the mappings, then flushing it out
of the TLB, all with interrupts disabled.

Furthermore, in ARMs case, the code explicitly states that these
mappings are not used on SMP.  See the comment above the FLUSH_ALIAS_START
definition in arch/arm/mm/mm.h

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16 15:47         ` David Miller
@ 2014-04-16 16:53           ` Oleg Nesterov
  2014-04-16 20:22           ` Russell King - ARM Linux
  1 sibling, 0 replies; 10+ messages in thread
From: Oleg Nesterov @ 2014-04-16 16:53 UTC (permalink / raw)
  To: linux-arm-kernel

On 04/16, David Miller wrote:
>
> From: Oleg Nesterov <oleg@redhat.com>
> Date: Wed, 16 Apr 2014 17:29:46 +0200
>
> > On 04/16, David Miller wrote:
> >>
> >> From: Oleg Nesterov <oleg@redhat.com>
> >> Date: Wed, 16 Apr 2014 17:06:46 +0200
> >>
> >> > Off-topic, I am just curious... can't someone explain why flush_pfn_alias()
> >> > or flush_icache_alias() can't race with itself ? I have no idea what they do,
> >> > but what if another thread calls the same function with the same CACHE_COLOUR()
> >> > right after set_pte_ext?
> >>
> >> PTE modifications are supposed to run with the page table lock held.
> >
> > OK, but __access_remote_vm() doesn't take ptl?
> >
> > And on arm copy_to_user_page()->flush_ptrace_access()->flush_pfn_alias()
> > does this.
>
> Well, for one thing, PTE's can't gain permissions except under mmap_sem
> which __access_remote_vm() does hold.
>
> But I see what you're saying, flush_pfn_alias() is doing something
> different.  It's not making user mappings, but kernel ones in order
> to implement the cache flush.

Yees, this is what I was able to understand, to some degree.

> Furthermore, in ARMs case, the code explicitly states that these
> mappings are not used on SMP.  See the comment above the FLUSH_ALIAS_START
> definition in arch/arm/mm/mm.h

Ah, and this is what I missed, despite the fact the comment is close to
set_top_pte().

Thanks!

Oleg.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16 15:47         ` David Miller
  2014-04-16 16:53           ` Oleg Nesterov
@ 2014-04-16 20:22           ` Russell King - ARM Linux
  2014-04-16 21:13             ` David Miller
  1 sibling, 1 reply; 10+ messages in thread
From: Russell King - ARM Linux @ 2014-04-16 20:22 UTC (permalink / raw)
  To: linux-arm-kernel

On Wed, Apr 16, 2014 at 11:47:40AM -0400, David Miller wrote:
> From: Oleg Nesterov <oleg@redhat.com>
> Date: Wed, 16 Apr 2014 17:29:46 +0200
> 
> > On 04/16, David Miller wrote:
> >>
> >> From: Oleg Nesterov <oleg@redhat.com>
> >> Date: Wed, 16 Apr 2014 17:06:46 +0200
> >>
> >> > Off-topic, I am just curious... can't someone explain why flush_pfn_alias()
> >> > or flush_icache_alias() can't race with itself ? I have no idea what they do,
> >> > but what if another thread calls the same function with the same CACHE_COLOUR()
> >> > right after set_pte_ext?
> >>
> >> PTE modifications are supposed to run with the page table lock held.
> > 
> > OK, but __access_remote_vm() doesn't take ptl?
> > 
> > And on arm copy_to_user_page()->flush_ptrace_access()->flush_pfn_alias()
> > does this.
> 
> Well, for one thing, PTE's can't gain permissions except under mmap_sem
> which __access_remote_vm() does hold.
> 
> But I see what you're saying, flush_pfn_alias() is doing something
> different.  It's not making user mappings, but kernel ones in order
> to implement the cache flush.
> 
> On sparc64 we handle this situation by hand-loading the mappings into
> the TLB, doing the operation using the mappings, then flushing it out
> of the TLB, all with interrupts disabled.
> 
> Furthermore, in ARMs case, the code explicitly states that these
> mappings are not used on SMP.  See the comment above the FLUSH_ALIAS_START
> definition in arch/arm/mm/mm.h

Yes, thankfully SMP on ARM requires non-aliasing data caches... and now
you've got me wondering whether that stuff is safe on preempt UP...

I'm thinking that both flush_icache_alias() and flush_pfn_alias() want
at least a preemption disabled around each so that we don't end up with
two threads being preempted here.

Thankfully, there's not many ARM CPUs with VIPT aliasing caches, which
is probably why no one has noticed.

-- 
FTTC broadband for 0.8mile line: now at 9.7Mbps down 460kbps up... slowly
improving, and getting towards what was expected from it.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16 20:22           ` Russell King - ARM Linux
@ 2014-04-16 21:13             ` David Miller
  2014-04-25 20:16               ` David Long
  0 siblings, 1 reply; 10+ messages in thread
From: David Miller @ 2014-04-16 21:13 UTC (permalink / raw)
  To: linux-arm-kernel

From: Russell King - ARM Linux <linux@arm.linux.org.uk>
Date: Wed, 16 Apr 2014 21:22:43 +0100

> I'm thinking that both flush_icache_alias() and flush_pfn_alias() want
> at least a preemption disabled around each so that we don't end up with
> two threads being preempted here.

Yes, you would need to disable preemption to keep another thread of
control from potentially using the same flush slot.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-16 21:13             ` David Miller
@ 2014-04-25 20:16               ` David Long
  2014-04-25 20:37                 ` Victor Kamensky
  0 siblings, 1 reply; 10+ messages in thread
From: David Long @ 2014-04-25 20:16 UTC (permalink / raw)
  To: linux-arm-kernel

On 04/16/14 17:13, David Miller wrote:
> From: Russell King - ARM Linux <linux@arm.linux.org.uk>
> Date: Wed, 16 Apr 2014 21:22:43 +0100
>
>> I'm thinking that both flush_icache_alias() and flush_pfn_alias() want
>> at least a preemption disabled around each so that we don't end up with
>> two threads being preempted here.
>
> Yes, you would need to disable preemption to keep another thread of
> control from potentially using the same flush slot.
>

Sorry for the delay in replying.

I guess the above potential problem is largely independent of the 
uprobes caching issue.

I spent a while reading up on ARM cache operations and MMFR3 register 
contents.  I don't pretend to understand all the details but, based on 
what I do, it looks to me like Victor's v3 patch addresses all the 
issues that we think it needs to.  I also see now why the 
dcache_flush_page() is needed rather than a call to the lower-level 
clean_dcache_line() function.

Victor, maybe you could remove the "#ifdef CONFIG_SMP"s from it and send 
it out as an official (non-RFC) uprobes patch?  It would be really nice 
to get this into V3.15, if at all possible.

-dl

^ permalink raw reply	[flat|nested] 10+ messages in thread

* [RFC PATCH v3] ARM: uprobes need icache flush after xol write
  2014-04-25 20:16               ` David Long
@ 2014-04-25 20:37                 ` Victor Kamensky
  0 siblings, 0 replies; 10+ messages in thread
From: Victor Kamensky @ 2014-04-25 20:37 UTC (permalink / raw)
  To: linux-arm-kernel

On 25 April 2014 13:16, David Long <dave.long@linaro.org> wrote:
> On 04/16/14 17:13, David Miller wrote:
>>
>> From: Russell King - ARM Linux <linux@arm.linux.org.uk>
>> Date: Wed, 16 Apr 2014 21:22:43 +0100
>>
>>> I'm thinking that both flush_icache_alias() and flush_pfn_alias() want
>>> at least a preemption disabled around each so that we don't end up with
>>> two threads being preempted here.
>>
>>
>> Yes, you would need to disable preemption to keep another thread of
>> control from potentially using the same flush slot.
>>
>
> Sorry for the delay in replying.
>
> I guess the above potential problem is largely independent of the uprobes
> caching issue.
>
> I spent a while reading up on ARM cache operations and MMFR3 register
> contents.  I don't pretend to understand all the details but, based on what
> I do, it looks to me like Victor's v3 patch addresses all the issues that we
> think it needs to.  I also see now why the dcache_flush_page() is needed
> rather than a call to the lower-level clean_dcache_line() function.
>
> Victor, maybe you could remove the "#ifdef CONFIG_SMP"s from it and send it
> out as an official (non-RFC) uprobes patch?  It would be really nice to get
> this into V3.15, if at all possible.

I'll send it by the end of today (PST).

Thanks,
Victor

> -dl
>

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2014-04-25 20:37 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-04-16  4:38 [RFC PATCH v3] ARM: uprobes need icache flush after xol write Victor Kamensky
2014-04-16  4:38 ` Victor Kamensky
2014-04-16 15:06   ` Oleg Nesterov
2014-04-16 15:10     ` David Miller
     [not found]       ` <20140416152946.GA13564@redhat.com>
2014-04-16 15:47         ` David Miller
2014-04-16 16:53           ` Oleg Nesterov
2014-04-16 20:22           ` Russell King - ARM Linux
2014-04-16 21:13             ` David Miller
2014-04-25 20:16               ` David Long
2014-04-25 20:37                 ` Victor Kamensky

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.