Re: [PATCH 0/3] x86_64/ftrace: Emulate calls from int3 when patching functions

From: Nicolai Stange
Date: Wed May 08 2019 - 05:42:30 EST


Steven Rostedt <rostedt@xxxxxxxxxxx> writes:

> [
> This is the non-RFC version.
>
> It went through and passed all my tests. If there's no objections
> I'm going to include this in my pull request. I still have patches
> in my INBOX that may still be included, so I need to run those through
> my tests as well, so a pull request wont be immediate.
> ]

<snip />

> Josh Poimboeuf (1):
> x86_64: Add gap to int3 to allow for call emulation
>
> Peter Zijlstra (2):
> x86_64: Allow breakpoints to emulate call instructions
> ftrace/x86_64: Emulate call function while updating in breakpoint handler

Reviewed-and-tested-by: Nicolai Stange <nstange@xxxxxxx>

for the whole series. Many, many thanks to everybody involved!

I'll resend that live patching selftest once this fix here has been
merged.

Nicolai

--
SUSE Linux GmbH, GF: Felix ImendÃrffer, Mary Higgins, Sri Rasiah, HRB
21284 (AG NÃrnberg)