From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A56B2C432C0 for ; Wed, 20 Nov 2019 19:09:23 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 79CCE20721 for ; Wed, 20 Nov 2019 19:09:23 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="khmFOPD2" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727646AbfKTTJW (ORCPT ); Wed, 20 Nov 2019 14:09:22 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:38058 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726440AbfKTTJV (ORCPT ); Wed, 20 Nov 2019 14:09:21 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xAKJ8sQr015097; Wed, 20 Nov 2019 19:08:54 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2019-08-05; bh=zZM70zWr/cNS5g36KbUDB9wJ4qEwqc77UoUJfnYZspI=; b=khmFOPD2lzuwS3qP0mWh4DKRrmeEiGYka+VNABoAM8x0bpU58k8rddxUI3Zk71p94oWH jNngPeX9tKV4RGaW9Nbu0i0NbHtl9Y56XAzu25bK9T07vodKcr5Pgr1KJsDRe2jB6E8g ZqnUeOgZ4SkhTQumoINdTh5XHRbu4lt0Sc/2n7U3G4+WNAjDw8MxAriQp3WsEF4+Uy1z aIG2iQyNfegXrhDVUGggUAoUM+E1aItp3QAzaJKib5KnLMUbMT2FUYHsOq9aZ9WR2wAc XUL1eU/uHmQPJca+bwG+GKwGnGD82DaYweRiz4rYqOXczgiQTWG3EmAb2MjbUjRzbEgx ig== Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79]) by userp2120.oracle.com with ESMTP id 2wa9rqqh8n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 20 Nov 2019 19:08:53 +0000 Received: from pps.filterd (userp3020.oracle.com [127.0.0.1]) by userp3020.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xAKJ4HKu031934; Wed, 20 Nov 2019 19:08:49 GMT Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userp3020.oracle.com with ESMTP id 2wd46wxaag-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 20 Nov 2019 19:08:49 +0000 Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id xAKJ8mP6026004; Wed, 20 Nov 2019 19:08:49 GMT Received: from ca-common-hq.us.oracle.com (/10.211.9.209) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 20 Nov 2019 11:08:48 -0800 From: Divya Indi To: Steven Rostedt , linux-kernel@vger.kernel.org Cc: Divya Indi , Joe Jin , Srinivas Eeda , Aruna Ramakrishna , Manjunath Patil Subject: [RFC v5] Kernel access to Ftrace instances. Date: Wed, 20 Nov 2019 11:08:37 -0800 Message-Id: <1574276919-11119-1-git-send-email-divya.indi@oracle.com> X-Mailer: git-send-email 1.8.3.1 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9447 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1911140001 definitions=main-1911200158 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9447 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1911140001 definitions=main-1911200159 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Please review the patches that follow - [PATCH 1/2] tracing: Adding new functions for kernel access to Ftrace instances [PATCH 2/2] tracing: Sample module to demonstrate kernel access to ftrace instances. This patchset addresses the possibility of deadlock introduced by v4, pointed out by Steven Rostedt. Tested with lockdep enabled to ensure the issue has been resolved. Let me know if you have any questions or feedback. Thanks, Divya