<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>ebeed8d4 - tracing/probes: Move finding func-proto API and getting func-param API to trace_btf</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#ebeed8d4</link>
        <description>tracing/probes: Move finding func-proto API and getting func-param API to trace_btfMove generic function-proto find API and getting function parameter APIto BTF library code from trace_probe.c. This will avoid redundant effortson different feature.Link: https://lore.kernel.org/all/169272155255.160970.719426926348706349.stgit@devnote2/Signed-off-by: Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;Acked-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 22 Aug 2023 16:25:52 +0000</pubDate>
        <dc:creator>Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>334e5519 - tracing/probes: Add fprobe events for tracing function entry and exit.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#334e5519</link>
        <description>tracing/probes: Add fprobe events for tracing function entry and exit.Add fprobe events for tracing function entry and exit instead of kprobeevents. With this change, we can continue to trace function entry/exiteven if the CONFIG_KPROBES_ON_FTRACE is not available. SinceCONFIG_KPROBES_ON_FTRACE requires the CONFIG_DYNAMIC_FTRACE_WITH_REGS,it is not available if the architecture only supportsCONFIG_DYNAMIC_FTRACE_WITH_ARGS. And that means kprobe events can notprobe function entry/exit effectively on such architecture.But this can be solved if the dynamic events supports fprobe events.The fprobe event is a new dynamic events which is only for the function(symbol) entry and exit. This event accepts non register fetch argumentsso that user can trace the function arguments and return values.The fprobe events syntax is here; f[:[GRP/][EVENT]] FUNCTION [FETCHARGS] f[MAXACTIVE][:[GRP/][EVENT]] FUNCTION%return [FETCHARGS]E.g. # echo &apos;f vfs_read $arg1&apos;  &gt;&gt; dynamic_events # echo &apos;f vfs_read%return $retval&apos;  &gt;&gt; dynamic_events # cat dynamic_events f:fprobes/vfs_read__entry vfs_read arg1=$arg1 f:fprobes/vfs_read__exit vfs_read%return arg1=$retval # echo 1 &gt; events/fprobes/enable # head -n 20 trace | tail #           TASK-PID     CPU#  |||||  TIMESTAMP  FUNCTION #              | |         |   |||||     |         |              sh-142     [005] ...1.   448.386420: vfs_read__entry: (vfs_read+0x4/0x340) arg1=0xffff888007f7c540              sh-142     [005] .....   448.386436: vfs_read__exit: (ksys_read+0x75/0x100 &lt;- vfs_read) arg1=0x1              sh-142     [005] ...1.   448.386451: vfs_read__entry: (vfs_read+0x4/0x340) arg1=0xffff888007f7c540              sh-142     [005] .....   448.386458: vfs_read__exit: (ksys_read+0x75/0x100 &lt;- vfs_read) arg1=0x1              sh-142     [005] ...1.   448.386469: vfs_read__entry: (vfs_read+0x4/0x340) arg1=0xffff888007f7c540              sh-142     [005] .....   448.386476: vfs_read__exit: (ksys_read+0x75/0x100 &lt;- vfs_read) arg1=0x1              sh-142     [005] ...1.   448.602073: vfs_read__entry: (vfs_read+0x4/0x340) arg1=0xffff888007f7c540              sh-142     [005] .....   448.602089: vfs_read__exit: (ksys_read+0x75/0x100 &lt;- vfs_read) arg1=0x1Link: https://lore.kernel.org/all/168507469754.913472.6112857614708350210.stgit@mhiramat.roam.corp.google.com/Reported-by: kernel test robot &lt;lkp@intel.com&gt;Link: https://lore.kernel.org/all/202302011530.7vm4O8Ro-lkp@intel.com/Signed-off-by: Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 06 Jun 2023 12:39:55 +0000</pubDate>
        <dc:creator>Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>102227b9 - rv: Add Runtime Verification (RV) interface</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#102227b9</link>
        <description>rv: Add Runtime Verification (RV) interfaceRV is a lightweight (yet rigorous) method that complements classicalexhaustive verification techniques (such as model checking andtheorem proving) with a more practical approach to complex systems.RV works by analyzing the trace of the system&apos;s actual execution,comparing it against a formal specification of the system behavior.RV can give precise information on the runtime behavior of themonitored system while enabling the reaction for unexpectedevents, avoiding, for example, the propagation of a failure onsafety-critical systems.The development of this interface roots in the development of thepaper:De Oliveira, Daniel Bristot; Cucinotta, Tommaso; De Oliveira, RomuloSilva. Efficient formal verification for the Linux kernel. In:International Conference on Software Engineering and Formal Methods.Springer, Cham, 2019. p. 315-332.And:De Oliveira, Daniel Bristot. Automata-based formal analysisand verification of the real-time Linux kernel. PhD Thesis, 2020.The RV interface resembles the tracing/ interface on purpose. The currentpath for the RV interface is /sys/kernel/tracing/rv/.It presents these files: &quot;available_monitors&quot;   - List the available monitors, one per line.   For example:     # cat available_monitors     wip     wwnr &quot;enabled_monitors&quot;   - Lists the enabled monitors, one per line;   - Writing to it enables a given monitor;   - Writing a monitor name with a &apos;!&apos; prefix disables it;   - Truncating the file disables all enabled monitors.   For example:     # cat enabled_monitors     # echo wip &gt; enabled_monitors     # echo wwnr &gt;&gt; enabled_monitors     # cat enabled_monitors     wip     wwnr     # echo &apos;!wip&apos; &gt;&gt; enabled_monitors     # cat enabled_monitors     wwnr     # echo &gt; enabled_monitors     # cat enabled_monitors     #   Note that more than one monitor can be enabled concurrently. &quot;monitoring_on&quot;   - It is an on/off general switcher for monitoring. Note   that it does not disable enabled monitors or detach events,   but stop the per-entity monitors of monitoring the events   received from the system. It resembles the &quot;tracing_on&quot; switcher. &quot;monitors/&quot;   Each monitor will have its one directory inside &quot;monitors/&quot;. There   the monitor specific files will be presented.   The &quot;monitors/&quot; directory resembles the &quot;events&quot; directory on   tracefs.   For example:     # cd monitors/wip/     # ls     desc  enable     # cat desc     wakeup in preemptive per-cpu testing monitor.     # cat enable     0For further information, see the comments in the header ofkernel/trace/rv/rv.c from this patch.Link: https://lkml.kernel.org/r/a4bfe038f50cb047bfb343ad0e12b0e646ab308b.1659052063.git.bristot@kernel.orgCc: Wim Van Sebroeck &lt;wim@linux-watchdog.org&gt;Cc: Guenter Roeck &lt;linux@roeck-us.net&gt;Cc: Jonathan Corbet &lt;corbet@lwn.net&gt;Cc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;Cc: Will Deacon &lt;will@kernel.org&gt;Cc: Catalin Marinas &lt;catalin.marinas@arm.com&gt;Cc: Marco Elver &lt;elver@google.com&gt;Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt;Cc: &quot;Paul E. McKenney&quot; &lt;paulmck@kernel.org&gt;Cc: Shuah Khan &lt;skhan@linuxfoundation.org&gt;Cc: Gabriele Paoloni &lt;gpaoloni@redhat.com&gt;Cc: Juri Lelli &lt;juri.lelli@redhat.com&gt;Cc: Clark Williams &lt;williams@redhat.com&gt;Cc: Tao Zhou &lt;tao.zhou@linux.dev&gt;Cc: Randy Dunlap &lt;rdunlap@infradead.org&gt;Cc: linux-doc@vger.kernel.orgCc: linux-kernel@vger.kernel.orgCc: linux-trace-devel@vger.kernel.orgSigned-off-by: Daniel Bristot de Oliveira &lt;bristot@kernel.org&gt;Signed-off-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 29 Jul 2022 09:38:40 +0000</pubDate>
        <dc:creator>Daniel Bristot de Oliveira &lt;bristot@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>bb5eb8f3 - tracing: Disable kcov on trace_preemptirq.c</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#bb5eb8f3</link>
        <description>tracing: Disable kcov on trace_preemptirq.cFunctions in trace_preemptirq.c could be invoked from early interruptcode that bypasses kcov trace function&apos;s in_task() check. Disable kcovon this file to reduce random code coverage.Link: https://lkml.kernel.org/r/20220523063033.1778974-1-liu3101@purdue.eduAcked-by: Dmitry Vyukov &lt;dvyukov@google.com&gt;Signed-off-by: Congyu Liu &lt;liu3101@purdue.edu&gt;Signed-off-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Mon, 23 May 2022 06:30:33 +0000</pubDate>
        <dc:creator>Congyu Liu &lt;liu3101@purdue.edu&gt;</dc:creator>
    </item>
<item>
        <title>54ecbe6f - rethook: Add a generic return hook</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#54ecbe6f</link>
        <description>rethook: Add a generic return hookAdd a return hook framework which hooks the function return. Most of thelogic came from the kretprobe, but this is independent from kretprobe.Note that this is expected to be used with other function entry hookingfeature, like ftrace, fprobe, adn kprobes. Eventually this will replacethe kretprobe (e.g. kprobe + rethook = kretprobe), but at this moment,this is just an additional hook.Signed-off-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;Tested-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;Link: https://lore.kernel.org/bpf/164735285066.1084943.9259661137330166643.stgit@devnote2

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 15 Mar 2022 14:00:50 +0000</pubDate>
        <dc:creator>Masami Hiramatsu &lt;mhiramat@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cad9931f - fprobe: Add ftrace based probe APIs</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#cad9931f</link>
        <description>fprobe: Add ftrace based probe APIsThe fprobe is a wrapper API for ftrace function tracer.Unlike kprobes, this probes only supports the function entry, but thiscan probe multiple functions by one fprobe. The usage is similar, userwill set their callback to fprobe::entry_handler and callregister_fprobe*() with probed functions.There are 3 registration interfaces, - register_fprobe() takes filtering patterns of the functin names. - register_fprobe_ips() takes an array of ftrace-location addresses. - register_fprobe_syms() takes an array of function names.The registered fprobes can be unregistered with unregister_fprobe().e.g.struct fprobe fp = { .entry_handler = user_handler };const char *targets[] = { &quot;func1&quot;, &quot;func2&quot;, &quot;func3&quot;};...ret = register_fprobe_syms(&amp;fp, targets, ARRAY_SIZE(targets));...unregister_fprobe(&amp;fp);Signed-off-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;Tested-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;Link: https://lore.kernel.org/bpf/164735283857.1084943.1154436951479395551.stgit@devnote2

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 15 Mar 2022 14:00:38 +0000</pubDate>
        <dc:creator>Masami Hiramatsu &lt;mhiramat@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>7f5a08c7 - user_events: Add minimal support for trace_event into ftrace</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#7f5a08c7</link>
        <description>user_events: Add minimal support for trace_event into ftraceMinimal support for interacting with dynamic events, trace_event andftrace. Core outline of flow between user process, ioctl and trace_eventAPIs.User mode processes that wish to use trace events to get data intoftrace, perf, eBPF, etc are limited to uprobes today. The user eventsfeatures enables an ABI for user mode processes to create and write totrace events that are isolated from kernel level trace events. Thisenables a faster path for tracing from user mode data as well as opensmanaged code to participate in trace events, where stub locations aredynamic.User processes often want to trace only when it&apos;s useful. To enable thisa set of pages are mapped into the user process space that indicate thecurrent state of the user events that have been registered. Userprocesses can check if their event is hooked to a trace/probe, and if itis, emit the event data out via the write() syscall.Two new files are introduced into tracefs to accomplish this:user_events_status - This file is mmap&apos;d into participating user modeprocesses to indicate event status.user_events_data - This file is opened and register/delete ioctl&apos;s areissued to create/open/delete trace events that can be used for tracing.The typical scenario is on process start to mmap user_events_status. Processesthen register the events they plan to use via the REG ioctl. The ioctl readsand updates the passed in user_reg struct. The status_index of the struct isused to know the byte in the status page to check for that event. Thewrite_index of the struct is used to describe that event when writing out tothe fd that was used for the ioctl call. The data must always include thisindex first when writing out data for an event. Data can be written either bywrite() or by writev().For example, in memory:int index;char data[];Psuedo code example of typical usage:struct user_reg reg;int page_fd = open(&quot;user_events_status&quot;, O_RDWR);char *page_data = mmap(NULL, PAGE_SIZE, PROT_READ, MAP_SHARED, page_fd, 0);close(page_fd);int data_fd = open(&quot;user_events_data&quot;, O_RDWR);reg.size = sizeof(reg);reg.name_args = (__u64)&quot;test&quot;;ioctl(data_fd, DIAG_IOCSREG, &amp;reg);int status_id = reg.status_index;int write_id = reg.write_index;struct iovec io[2];io[0].iov_base = &amp;write_id;io[0].iov_len = sizeof(write_id);io[1].iov_base = payload;io[1].iov_len = sizeof(payload);if (page_data[status_id])	writev(data_fd, io, 2);User events are also exposed via the dynamic_events tracefs file forboth create and delete. Current status is exposed via the user_events_statustracefs file.Simple example to register a user event via dynamic_events:	echo u:test &gt;&gt; dynamic_events	cat dynamic_events	u:testIf an event is hooked to a probe, the probe hooked shows up:	echo 1 &gt; events/user_events/test/enable	cat user_events_status	1:test # Used by ftrace	Active: 1	Busy: 1	Max: 4096If an event is not hooked to a probe, no probe status shows up:	echo 0 &gt; events/user_events/test/enable	cat user_events_status	1:test	Active: 1	Busy: 0	Max: 4096Users can describe the trace event format via the following format:	name[:FLAG1[,FLAG2...] [field1[;field2...]]Each field has the following format:	type nameExample for char array with a size of 20 named msg:	echo &apos;u:detailed char[20] msg&apos; &gt;&gt; dynamic_events	cat dynamic_events	u:detailed char[20] msgData offsets are based on the data written out via write() and will beupdated to reflect the correct offset in the trace_event fields. For dynamicdata it is recommended to use the new __rel_loc data type. This type will bethe same as __data_loc, but the offset is relative to this entry. This allowsuser_events to not worry about what common fields are being inserted beforethe data.The above format is valid for both the ioctl and the dynamic_events file.Link: https://lkml.kernel.org/r/20220118204326.2169-2-beaub@linux.microsoft.comAcked-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Beau Belgrave &lt;beaub@linux.microsoft.com&gt;Signed-off-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 18 Jan 2022 20:43:15 +0000</pubDate>
        <dc:creator>Beau Belgrave &lt;beaub@linux.microsoft.com&gt;</dc:creator>
    </item>
<item>
        <title>6954e415 - tracing: Place trace_pid_list logic into abstract functions</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#6954e415</link>
        <description>tracing: Place trace_pid_list logic into abstract functionsInstead of having the logic that does trace_pid_list open coded, wrap it inabstract functions. This will allow a rewrite of the logic that implementsthe trace_pid_list without affecting the users.Note, this causes a change in behavior. Every time a pid is written intothe set_*_pid file, it creates a new list and uses RCU to update it. Ifpid_max is lowered, but there was a pid currently in the list that washigher than pid_max, those pids will now be removed on updating the list.The old behavior kept that from happening.The rewrite of the pid_list logic will no longer depend on pid_max,and will return the old behavior.Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 24 Sep 2021 01:03:49 +0000</pubDate>
        <dc:creator>Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;</dc:creator>
    </item>
<item>
        <title>7491e2c4 - tracing: Add a probe that attaches to trace events</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#7491e2c4</link>
        <description>tracing: Add a probe that attaches to trace eventsA new dynamic event is introduced: event probe. The event is attachedto an existing tracepoint and uses its fields as arguments. The usercan specify custom format string of the new event, select what tracepointarguments will be printed and how to print them.An event probe is created by writing configuration string in&apos;dynamic_events&apos; ftrace file: e[:[SNAME/]ENAME] SYSTEM/EVENT [FETCHARGS]	- Set an event probe -:SNAME/ENAME					- Delete an event probeWhere: SNAME	- System name, if omitted &apos;eprobes&apos; is used. ENAME	- Name of the new event in SNAME, if omitted the SYSTEM_EVENT is used. SYSTEM	- Name of the system, where the tracepoint is defined, mandatory. EVENT	- Name of the tracepoint event in SYSTEM, mandatory. FETCHARGS - Arguments:  &lt;name&gt;=$&lt;field&gt;[:TYPE] - Fetch given filed of the tracepoint and print			   it as given TYPE with given name. Supported			   types are:	                    (u8/u16/u32/u64/s8/s16/s32/s64), basic type        	            (x8/x16/x32/x64), hexadecimal types			    &quot;string&quot;, &quot;ustring&quot; and bitfield.Example, attach an event probe on openat system call and print name of thefile that will be opened: echo &quot;e:esys/eopen syscalls/sys_enter_openat file=\$filename:string&quot; &gt;&gt; dynamic_eventsA new dynamic event is created in events/esys/eopen/ directory. Itcan be deleted with: echo &quot;-:esys/eopen&quot; &gt;&gt; dynamic_eventsFilters, triggers and histograms can be attached to the new event, it canbe matched in synthetic events. There is one limitation - an event probecan not be attached to kprobe, uprobe or another event probe.Link: https://lkml.kernel.org/r/20210812145805.2292326-1-tz.stoyanov@gmail.comLink: https://lkml.kernel.org/r/20210819152825.142428383@goodmis.orgAcked-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Co-developed-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;Signed-off-by: Tzvetomir Stoyanov (VMware) &lt;tz.stoyanov@gmail.com&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Thu, 19 Aug 2021 15:26:06 +0000</pubDate>
        <dc:creator>Tzvetomir Stoyanov (VMware) &lt;tz.stoyanov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>bce29ac9 - trace: Add osnoise tracer</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#bce29ac9</link>
        <description>trace: Add osnoise tracerIn the context of high-performance computing (HPC), the Operating SystemNoise (*osnoise*) refers to the interference experienced by an applicationdue to activities inside the operating system. In the context of Linux,NMIs, IRQs, SoftIRQs, and any other system thread can cause noise to thesystem. Moreover, hardware-related jobs can also cause noise, for example,via SMIs.The osnoise tracer leverages the hwlat_detector by running a similarloop with preemption, SoftIRQs and IRQs enabled, thus allowing allthe sources of *osnoise* during its execution. Using the same approachof hwlat, osnoise takes note of the entry and exit point of anysource of interferences, increasing a per-cpu interference counter. Theosnoise tracer also saves an interference counter for each source ofinterference. The interference counter for NMI, IRQs, SoftIRQs, andthreads is increased anytime the tool observes these interferences&apos; entryevents. When a noise happens without any interference from the operatingsystem level, the hardware noise counter increases, pointing to ahardware-related noise. In this way, osnoise can account for anysource of interference. At the end of the period, the osnoise tracerprints the sum of all noise, the max single noise, the percentage of CPUavailable for the thread, and the counters for the noise sources.UsageWrite the ASCII text &quot;osnoise&quot; into the current_tracer file of thetracing system (generally mounted at /sys/kernel/tracing).For example::        [root@f32 ~]# cd /sys/kernel/tracing/        [root@f32 tracing]# echo osnoise &gt; current_tracerIt is possible to follow the trace by reading the trace trace file::        [root@f32 tracing]# cat trace        # tracer: osnoise        #        #                                _-----=&gt; irqs-off        #                               / _----=&gt; need-resched        #                              | / _---=&gt; hardirq/softirq        #                              || / _--=&gt; preempt-depth                            MAX        #                              || /                                             SINGLE     Interference counters:        #                              ||||               RUNTIME      NOISE   % OF CPU  NOISE    +-----------------------------+        #           TASK-PID      CPU# ||||   TIMESTAMP    IN US       IN US  AVAILABLE  IN US     HW    NMI    IRQ   SIRQ THREAD        #              | |         |   ||||      |           |             |    |            |      |      |      |      |      |                   &lt;...&gt;-859     [000] ....    81.637220: 1000000        190  99.98100       9     18      0   1007     18      1                   &lt;...&gt;-860     [001] ....    81.638154: 1000000        656  99.93440      74     23      0   1006     16      3                   &lt;...&gt;-861     [002] ....    81.638193: 1000000       5675  99.43250     202      6      0   1013     25     21                   &lt;...&gt;-862     [003] ....    81.638242: 1000000        125  99.98750      45      1      0   1011     23      0                   &lt;...&gt;-863     [004] ....    81.638260: 1000000       1721  99.82790     168      7      0   1002     49     41                   &lt;...&gt;-864     [005] ....    81.638286: 1000000        263  99.97370      57      6      0   1006     26      2                   &lt;...&gt;-865     [006] ....    81.638302: 1000000        109  99.98910      21      3      0   1006     18      1                   &lt;...&gt;-866     [007] ....    81.638326: 1000000       7816  99.21840     107      8      0   1016     39     19In addition to the regular trace fields (from TASK-PID to TIMESTAMP), thetracer prints a message at the end of each period for each CPU that isrunning an osnoise/CPU thread. The osnoise specific fields report: - The RUNTIME IN USE reports the amount of time in microseconds that   the osnoise thread kept looping reading the time. - The NOISE IN US reports the sum of noise in microseconds observed   by the osnoise tracer during the associated runtime. - The % OF CPU AVAILABLE reports the percentage of CPU available for   the osnoise thread during the runtime window. - The MAX SINGLE NOISE IN US reports the maximum single noise observed   during the runtime window. - The Interference counters display how many each of the respective   interference happened during the runtime window.Note that the example above shows a high number of HW noise samples.The reason being is that this sample was taken on a virtual machine,and the host interference is detected as a hardware interference.Tracer optionsThe tracer has a set of options inside the osnoise directory, they are: - osnoise/cpus: CPUs at which a osnoise thread will execute. - osnoise/period_us: the period of the osnoise thread. - osnoise/runtime_us: how long an osnoise thread will look for noise. - osnoise/stop_tracing_us: stop the system tracing if a single noise   higher than the configured value happens. Writing 0 disables this   option. - osnoise/stop_tracing_total_us: stop the system tracing if total noise   higher than the configured value happens. Writing 0 disables this   option. - tracing_threshold: the minimum delta between two time() reads to be   considered as noise, in us. When set to 0, the default value will   be used, which is currently 5 us.Additional TracingIn addition to the tracer, a set of tracepoints were added tofacilitate the identification of the osnoise source. - osnoise:sample_threshold: printed anytime a noise is higher than   the configurable tolerance_ns. - osnoise:nmi_noise: noise from NMI, including the duration. - osnoise:irq_noise: noise from an IRQ, including the duration. - osnoise:softirq_noise: noise from a SoftIRQ, including the   duration. - osnoise:thread_noise: noise from a thread, including the duration.Note that all the values are *net values*. For example, if while osnoiseis running, another thread preempts the osnoise thread, it will start athread_noise duration at the start. Then, an IRQ takes place, preemptingthe thread_noise, starting a irq_noise. When the IRQ ends its execution,it will compute its duration, and this duration will be subtracted fromthe thread_noise, in such a way as to avoid the double accounting of theIRQ execution. This logic is valid for all sources of noise.Here is one example of the usage of these tracepoints::       osnoise/8-961     [008] d.h.  5789.857532: irq_noise: local_timer:236 start 5789.857529929 duration 1845 ns       osnoise/8-961     [008] dNh.  5789.858408: irq_noise: local_timer:236 start 5789.858404871 duration 2848 ns     migration/8-54      [008] d...  5789.858413: thread_noise: migration/8:54 start 5789.858409300 duration 3068 ns       osnoise/8-961     [008] ....  5789.858413: sample_threshold: start 5789.858404555 duration 8723 ns interferences 2In this example, a noise sample of 8 microseconds was reported in the lastline, pointing to two interferences. Looking backward in the trace, thetwo previous entries were about the migration thread running after atimer IRQ execution. The first event is not part of the noise becauseit took place one millisecond before.It is worth noticing that the sum of the duration reported in thetracepoints is smaller than eight us reported in the sample_threshold.The reason roots in the overhead of the entry and exit code that happensbefore and after any interference execution. This justifies the dualapproach: measuring thread and tracing.Link: https://lkml.kernel.org/r/e649467042d60e7b62714c9c6751a56299d15119.1624372313.git.bristot@redhat.comCc: Phil Auld &lt;pauld@redhat.com&gt;Cc: Sebastian Andrzej Siewior &lt;bigeasy@linutronix.de&gt;Cc: Kate Carcia &lt;kcarcia@redhat.com&gt;Cc: Jonathan Corbet &lt;corbet@lwn.net&gt;Cc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Cc: Alexandre Chartre &lt;alexandre.chartre@oracle.com&gt;Cc: Clark Willaims &lt;williams@redhat.com&gt;Cc: John Kacur &lt;jkacur@redhat.com&gt;Cc: Juri Lelli &lt;juri.lelli@redhat.com&gt;Cc: Borislav Petkov &lt;bp@alien8.de&gt;Cc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt;Cc: x86@kernel.orgCc: linux-doc@vger.kernel.orgCc: linux-kernel@vger.kernel.orgSigned-off-by: Daniel Bristot de Oliveira &lt;bristot@redhat.com&gt;[  Made the following functions static:   trace_irqentry_callback()   trace_irqexit_callback()   trace_intel_irqentry_callback()   trace_intel_irqexit_callback()  Added to include/trace.h:   osnoise_arch_register()   osnoise_arch_unregister()  Fixed define logic for LATENCY_FS_NOTIFY  Reported-by: kernel test robot &lt;lkp@intel.com&gt;]Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 22 Jun 2021 14:42:27 +0000</pubDate>
        <dc:creator>Daniel Bristot de Oliveira &lt;bristot@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>9c0dee54 - tracing: add error_report_end trace point</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#9c0dee54</link>
        <description>tracing: add error_report_end trace pointPatch series &quot;Add error_report_end tracepoint to KFENCE and KASAN&quot;, v3.This patchset adds a tracepoint, error_repor_end, that is to be used byKFENCE, KASAN, and potentially other bug detection tools, when they printan error report.  One of the possible use cases is userspace collection ofkernel error reports: interested parties can subscribe to the tracingevent via tracefs, and get notified when an error report occurs.This patch (of 3):Introduce error_report_end tracepoint.  It can be used in debugging toolslike KASAN, KFENCE, etc.  to provide extensions to the error reportingmechanisms (e.g.  allow tests hook into error reporting, ease error reportcollection from production kernels).  Another benefit would be making useof ftrace for debugging or benchmarking the tools themselves.Should we need it, the tracepoint name leaves us with the possibility tointroduce a complementary error_report_start tracepoint in the future.Link: https://lkml.kernel.org/r/20210121131915.1331302-1-glider@google.comLink: https://lkml.kernel.org/r/20210121131915.1331302-2-glider@google.comSigned-off-by: Alexander Potapenko &lt;glider@google.com&gt;Suggested-by: Marco Elver &lt;elver@google.com&gt;Cc: Andrey Konovalov &lt;andreyknvl@google.com&gt;Cc: Dmitry Vyukov &lt;dvyukov@google.com&gt;Cc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: Petr Mladek &lt;pmladek@suse.com&gt;Cc: Steven Rostedt &lt;rostedt@goodmis.org&gt;Cc: Sergey Senozhatsky &lt;sergey.senozhatsky@gmail.com&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Cc: Vlastimil Babka &lt;vbabka@suse.cz&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 26 Feb 2021 01:19:44 +0000</pubDate>
        <dc:creator>Alexander Potapenko &lt;glider@google.com&gt;</dc:creator>
    </item>
<item>
        <title>773c1670 - ftrace: Add recording of functions that caused recursion</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#773c1670</link>
        <description>ftrace: Add recording of functions that caused recursionThis adds CONFIG_FTRACE_RECORD_RECURSION that will record to a file&quot;recursed_functions&quot; all the functions that caused recursion while acallback to the function tracer was running.Link: https://lkml.kernel.org/r/20201106023548.102375687@goodmis.orgCc: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Cc: Andrew Morton &lt;akpm@linux-foundation.org&gt;Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;Cc: Ingo Molnar &lt;mingo@kernel.org&gt;Cc: Jonathan Corbet &lt;corbet@lwn.net&gt;Cc: Guo Ren &lt;guoren@kernel.org&gt;Cc: &quot;James E.J. Bottomley&quot; &lt;James.Bottomley@HansenPartnership.com&gt;Cc: Helge Deller &lt;deller@gmx.de&gt;Cc: Michael Ellerman &lt;mpe@ellerman.id.au&gt;Cc: Benjamin Herrenschmidt &lt;benh@kernel.crashing.org&gt;Cc: Paul Mackerras &lt;paulus@samba.org&gt;Cc: Heiko Carstens &lt;hca@linux.ibm.com&gt;Cc: Vasily Gorbik &lt;gor@linux.ibm.com&gt;Cc: Christian Borntraeger &lt;borntraeger@de.ibm.com&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Cc: Borislav Petkov &lt;bp@alien8.de&gt;Cc: x86@kernel.orgCc: &quot;H. Peter Anvin&quot; &lt;hpa@zytor.com&gt;Cc: Kees Cook &lt;keescook@chromium.org&gt;Cc: Anton Vorontsov &lt;anton@enomsg.org&gt;Cc: Colin Cross &lt;ccross@android.com&gt;Cc: Tony Luck &lt;tony.luck@intel.com&gt;Cc: Josh Poimboeuf &lt;jpoimboe@redhat.com&gt;Cc: Jiri Kosina &lt;jikos@kernel.org&gt;Cc: Miroslav Benes &lt;mbenes@suse.cz&gt;Cc: Petr Mladek &lt;pmladek@suse.com&gt;Cc: Joe Lawrence &lt;joe.lawrence@redhat.com&gt;Cc: Kamalesh Babulal &lt;kamalesh@linux.vnet.ibm.com&gt;Cc: Mauro Carvalho Chehab &lt;mchehab+huawei@kernel.org&gt;Cc: Sebastian Andrzej Siewior &lt;bigeasy@linutronix.de&gt;Cc: linux-doc@vger.kernel.orgCc: linux-kernel@vger.kernel.orgCc: linux-csky@vger.kernel.orgCc: linux-parisc@vger.kernel.orgCc: linuxppc-dev@lists.ozlabs.orgCc: linux-s390@vger.kernel.orgCc: live-patching@vger.kernel.orgSigned-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 06 Nov 2020 02:32:46 +0000</pubDate>
        <dc:creator>Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;</dc:creator>
    </item>
<item>
        <title>15d5761a - kbuild: introduce ccflags-remove-y and asflags-remove-y</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#15d5761a</link>
        <description>kbuild: introduce ccflags-remove-y and asflags-remove-yCFLAGS_REMOVE_&lt;file&gt;.o filters out flags when compiling a particularobject, but there is no convenient way to do that for every object ina directory.Add ccflags-remove-y and asflags-remove-y to make it easily.Use ccflags-remove-y to clean up some Makefiles.The add/remove order works as follows: [1] KBUILD_CFLAGS specifies compiler flags used globally [2] ccflags-y adds compiler flags for all objects in the     current Makefile [3] ccflags-remove-y removes compiler flags for all objects in the     current Makefile (New feature) [4] CFLAGS_&lt;file&gt; adds compiler flags per file. [5] CFLAGS_REMOVE_&lt;file&gt; removes compiler flags per file.Having [3] before [4] allows us to remove flags from most (but not all)objects in the current Makefile.For example, kernel/trace/Makefile removes $(CC_FLAGS_FTRACE)from all objects in the directory, then adds it back totrace_selftest_dynamic.o and CFLAGS_trace_kprobe_selftest.oThe same applies to lib/livepatch/Makefile.Please note ccflags-remove-y has no effect to the sub-directories.In contrast, the previous notation got rid of compiler flags also fromall the sub-directories.The following are not affected because they have no sub-directories:  arch/arm/boot/compressed/  arch/powerpc/xmon/  arch/sh/  kernel/trace/However, lib/ has several sub-directories.To keep the behavior, I added ccflags-remove-y to all Makefilesin subdirectories of lib/, except the following:  lib/vdso/Makefile        - Kbuild does not descend into this Makefile  lib/raid/test/Makefile   - This is not used for the kernel buildI think commit 2464a609ded0 (&quot;ftrace: do not trace library functions&quot;)excluded too much. In the next commit, I will remove ccflags-remove-yfrom the sub-directories of lib/.Suggested-by: Sami Tolvanen &lt;samitolvanen@google.com&gt;Signed-off-by: Masahiro Yamada &lt;masahiroy@kernel.org&gt;Acked-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;Acked-by: Michael Ellerman &lt;mpe@ellerman.id.au&gt; (powerpc)Acked-by: Brendan Higgins &lt;brendanhiggins@google.com&gt; (KUnit)Tested-by: Anders Roxell &lt;anders.roxell@linaro.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Tue, 07 Jul 2020 09:21:16 +0000</pubDate>
        <dc:creator>Masahiro Yamada &lt;masahiroy@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>ac5a72ea - bpf: Use dedicated bpf_trace_printk event instead of trace_printk()</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#ac5a72ea</link>
        <description>bpf: Use dedicated bpf_trace_printk event instead of trace_printk()The bpf helper bpf_trace_printk() uses trace_printk() under the hood.This leads to an alarming warning message originating from tracebuffer allocation which occurs the first time a program usingbpf_trace_printk() is loaded.We can instead create a trace event for bpf_trace_printk() and enableit in-kernel when/if we encounter a program using thebpf_trace_printk() helper.  With this approach, trace_printk()is not used directly and no warning message appears.This work was started by Steven (see Link) and finished by Alan; addedSteven&apos;s Signed-off-by with his permission.Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;Signed-off-by: Alan Maguire &lt;alan.maguire@oracle.com&gt;Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;Acked-by: Andrii Nakryiko &lt;andriin@fb.com&gt;Link: https://lore.kernel.org/r/20200628194334.6238b933@oasis.local.homeLink: https://lore.kernel.org/bpf/1594641154-18897-2-git-send-email-alan.maguire@oracle.com

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Mon, 13 Jul 2020 11:52:33 +0000</pubDate>
        <dc:creator>Alan Maguire &lt;alan.maguire@oracle.com&gt;</dc:creator>
    </item>
<item>
        <title>726721a5 - tracing: Move synthetic events to a separate file</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#726721a5</link>
        <description>tracing: Move synthetic events to a separate fileWith the addition of the in-kernel synthetic event API, syntheticevents are no longer specifically tied to the histogram triggers.The synthetic event code is also making trace_event_hist.c verybloated, so for those reasons, move it to a separate file,trace_events_synth.c, along with a new trace_synth.h header file.Because synthetic events are now independent from hist triggers, add anew CONFIG_SYNTH_EVENTS config option, and have CONFIG_HIST_TRIGGERSselect it, and have CONFIG_SYNTH_EVENT_GEN_TEST depend on it.Link: http://lkml.kernel.org/r/4d1fa1f85ed5982706ac44844ac92451dcb04715.1590693308.git.zanussi@kernel.orgSigned-off-by: Tom Zanussi &lt;zanussi@kernel.org&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Thu, 28 May 2020 19:32:37 +0000</pubDate>
        <dc:creator>Tom Zanussi &lt;zanussi@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>f5d2313b - kcsan, trace: Make KCSAN compatible with tracing</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#f5d2313b</link>
        <description>kcsan, trace: Make KCSAN compatible with tracingPreviously the system would lock up if ftrace was enabled together withKCSAN. This is due to recursion on reporting if the tracer code isinstrumented with KCSAN.To avoid this for all types of tracing, disable KCSAN instrumentationfor all of kernel/trace.Furthermore, since KCSAN relies on udelay() to introduce delay, we haveto disable ftrace for udelay() (currently done for x86) in case KCSAN isused together with lockdep and ftrace. The reason is that it may corruptlockdep IRQ flags tracing state due to a peculiar case of recursion(details in Makefile comment).Reported-by: Qian Cai &lt;cai@lca.pw&gt;Tested-by: Qian Cai &lt;cai@lca.pw&gt;Acked-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;Signed-off-by: Marco Elver &lt;elver@google.com&gt;Signed-off-by: Paul E. McKenney &lt;paulmck@kernel.org&gt;Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 14 Feb 2020 21:10:35 +0000</pubDate>
        <dc:creator>Marco Elver &lt;elver@google.com&gt;</dc:creator>
    </item>
<item>
        <title>64836248 - tracing: Add kprobe event command generation test module</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#64836248</link>
        <description>tracing: Add kprobe event command generation test moduleAdd a test module that checks the basic functionality of the in-kernelkprobe event command generation API by creating kprobe events from amodule.Link: http://lkml.kernel.org/r/97e502b204f9dba948e3fa3a4315448298218787.1580323897.git.zanussi@kernel.orgAcked-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Tom Zanussi &lt;zanussi@kernel.org&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Wed, 29 Jan 2020 18:59:31 +0000</pubDate>
        <dc:creator>Tom Zanussi &lt;zanussi@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>9fe41efa - tracing: Add synth event generation test module</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#9fe41efa</link>
        <description>tracing: Add synth event generation test moduleAdd a test module that checks the basic functionality of the in-kernelsynthetic event generation API by generating and tracing syntheticevents from a module.Link: http://lkml.kernel.org/r/fcb4dd9eb9eefb70ab20538d3529d51642389664.1580323897.git.zanussi@kernel.orgAcked-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Tom Zanussi &lt;zanussi@kernel.org&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Wed, 29 Jan 2020 18:59:28 +0000</pubDate>
        <dc:creator>Tom Zanussi &lt;zanussi@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>9c5b9d3d - tracing/boot: Add boot-time tracing</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#9c5b9d3d</link>
        <description>tracing/boot: Add boot-time tracingSetup tracing options via extra boot config in addition to kernelcommand line.This adds following commands support. These are applied tothe global trace instance. - ftrace.options = OPT1[,OPT2...]   Enable given ftrace options. - ftrace.trace_clock = CLOCK   Set given CLOCK to ftrace&apos;s trace_clock. - ftrace.buffer_size = SIZE   Configure ftrace buffer size to SIZE. You can use &quot;KB&quot; or &quot;MB&quot;   for that SIZE. - ftrace.events = EVENT[, EVENT2...]   Enable given events on boot. You can use a wild card in EVENT. - ftrace.tracer = TRACER   Set TRACER to current tracer on boot. (e.g. function)Note that this is NOT replacing the kernel parameters, becausethis boot config based setting is later than that. If you want totrace earlier boot events, you still need kernel parameters.Link: http://lkml.kernel.org/r/157867237723.17873.17494943526320587488.stgit@devnote2Signed-off-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Fri, 10 Jan 2020 16:06:17 +0000</pubDate>
        <dc:creator>Masami Hiramatsu &lt;mhiramat@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>6c3edaf9 - tracing: Introduce trace event injection</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/kernel/trace/Makefile#6c3edaf9</link>
        <description>tracing: Introduce trace event injectionWe have been trying to use rasdaemon to monitor hardware errors likecorrectable memory errors. rasdaemon uses trace events to monitorvarious hardware errors. In order to test it, we have to inject somehardware errors, unfortunately not all of them provide errorinjections. MCE does provide a way to inject MCE errors, but errorslike PCI error and devlink error don&apos;t, it is not easy to add errorinjection to each of them. Instead, it is relatively easier to justallow users to inject trace events in a generic way so that all traceevents can be injected.This patch introduces trace event injection, where a new &apos;inject&apos; isadded to each tracepoint directory. Users could write into this filewith key=value pairs to specify the value of each fields of the traceevent, all unspecified fields are set to zero values by default.For example, for the net/net_dev_queue tracepoint, we can inject:  INJECT=/sys/kernel/debug/tracing/events/net/net_dev_queue/inject  echo &quot;&quot; &gt; $INJECT  echo &quot;name=&apos;test&apos;&quot; &gt; $INJECT  echo &quot;name=&apos;test&apos; len=1024&quot; &gt; $INJECT  cat /sys/kernel/debug/tracing/trace  ...   &lt;...&gt;-614   [000] ....    36.571483: net_dev_queue: dev= skbaddr=00000000fbf338c2 len=0   &lt;...&gt;-614   [001] ....   136.588252: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=0   &lt;...&gt;-614   [001] .N..   208.431878: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=1024Triggers could be triggered as usual too:  echo &quot;stacktrace if len == 1025&quot; &gt; /sys/kernel/debug/tracing/events/net/net_dev_queue/trigger  echo &quot;len=1025&quot; &gt; $INJECT  cat /sys/kernel/debug/tracing/trace  ...      bash-614   [000] ....    36.571483: net_dev_queue: dev= skbaddr=00000000fbf338c2 len=0      bash-614   [001] ....   136.588252: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=0      bash-614   [001] .N..   208.431878: net_dev_queue: dev=test skbaddr=00000000fbf338c2 len=1024      bash-614   [001] .N.1   284.236349: &lt;stack trace&gt; =&gt; event_inject_write =&gt; vfs_write =&gt; ksys_write =&gt; do_syscall_64 =&gt; entry_SYSCALL_64_after_hwframeThe only thing that can&apos;t be injected is string pointers as theyrequire constant string pointers, this can&apos;t be done at run time.Link: http://lkml.kernel.org/r/20191130045218.18979-1-xiyou.wangcong@gmail.comCc: Ingo Molnar &lt;mingo@redhat.com&gt;Signed-off-by: Cong Wang &lt;xiyou.wangcong@gmail.com&gt;Signed-off-by: Steven Rostedt (VMware) &lt;rostedt@goodmis.org&gt;

            List of files:
            /linux-6.15/kernel/trace/Makefile</description>
        <pubDate>Sat, 30 Nov 2019 04:52:18 +0000</pubDate>
        <dc:creator>Cong Wang &lt;xiyou.wangcong@gmail.com&gt;</dc:creator>
    </item>
</channel>
</rss>
