<SNIP> > > > text_poke_bp() takes care of that. > > > That's what the "_bp" suffix signifies. It's modifying live text > > > via 'bp' (breakpoint). It has a multistep process to make it safe. > > We are almost there with our next iteration, but we are stuck with a WARNING that is getting triggered when calling smp_text_poke_batch_patch which internally call smp_call_function_many_cond during a watchdog callback trigger. https://elixir.bootlin.com/linux/v6.15.1/source/kernel/smp.c#L815 Please let us know if you have any suggestions around this?