Re: [PATCH 0/3] x86_64/ftrace: Emulate calls from int3 when patching functions
From: Nicolai Stange
Date: Wed May 08 2019 - 05:42:30 EST
Steven Rostedt <rostedt@xxxxxxxxxxx> writes:
> This is the non-RFC version.
> It went through and passed all my tests. If there's no objections
> I'm going to include this in my pull request. I still have patches
> in my INBOX that may still be included, so I need to run those through
> my tests as well, so a pull request wont be immediate.
> Josh Poimboeuf (1):
> x86_64: Add gap to int3 to allow for call emulation
> Peter Zijlstra (2):
> x86_64: Allow breakpoints to emulate call instructions
> ftrace/x86_64: Emulate call function while updating in breakpoint handler
Reviewed-and-tested-by: Nicolai Stange <nstange@xxxxxxx>
for the whole series. Many, many thanks to everybody involved!
I'll resend that live patching selftest once this fix here has been
SUSE Linux GmbH, GF: Felix ImendÃrffer, Mary Higgins, Sri Rasiah, HRB
21284 (AG NÃrnberg)