[RFC PATCH v1 4/4] arm64: Mark stack trace as unreliable if kretprobed functions are present

Mark Brown broonie at kernel.org
Thu Apr 1 18:23:37 BST 2021


On Tue, Mar 30, 2021 at 02:09:55PM -0500, madvenka at linux.microsoft.com wrote:
> From: "Madhavan T. Venkataraman" <madvenka at linux.microsoft.com>
> 
> When a kretprobe is active for a function, the function's return address
> in its stack frame is modified to point to the kretprobe trampoline. When
> the function returns, the frame is popped and control is transferred
> to the trampoline. The trampoline eventually returns to the original return
> address.

Reviewed-by: Mark Brown <broonie at kernel.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/linux-arm-kernel/attachments/20210401/b0cb30af/attachment.sig>


More information about the linux-arm-kernel mailing list