On Mon, May 15, 2023 at 11:13:09AM +0800, Ze Gao wrote: > Current fprobe and rethook has some pitfalls and may introduce kernel stack recusion, especially in > massive tracing scenario. > > For example, if (DEBUG_PREEMPT | TRACE_PREEMPT_TOGGLE) , preempt_count_{add, sub} can be traced via > ftrace, if we happens to use fprobe + rethook based on ftrace to hook on those functions, > recursion is introduced in functions like rethook_trampoline_handler and leads to kernel crash > because of stack overflow. This patch series is a bit confusing. The RISC-V list got 2 cover letters and 2 patch 4s, but not any of the rest of the series. Please at least send the whole series to the list so our patchwork automation can be run against it. And mark it as v2 while you are at it. Thanks, Conor.
Attachment:
signature.asc
Description: PGP signature