/linux-5.19.10/kernel/livepatch/ |
D | patch.c | 131 if (WARN_ON(!func->patched)) in klp_unpatch_func() 157 func->patched = false; in klp_unpatch_func() 168 if (WARN_ON(func->patched)) in klp_patch_func() 219 func->patched = true; in klp_patch_func() 238 if (func->patched) in __klp_unpatch_object() 243 obj->patched = false; in __klp_unpatch_object() 257 if (WARN_ON(obj->patched)) in klp_patch_object() 267 obj->patched = true; in klp_patch_object() 277 if (obj->patched) in __klp_unpatch_objects()
|
D | Kconfig | 19 a patch, causing calls to patched functions to be redirected
|
D | core.c | 734 func->patched = false; in klp_init_func() 828 obj->patched = false; in klp_init_object() 926 if (obj->patched) in __klp_disable_patch()
|
D | transition.c | 254 if (!obj->patched) in klp_check_stack()
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | sysfs-kernel-livepatch | 17 object (vmlinux or a module) in which it patched functions. 24 A writable attribute that indicates whether the patched 44 the patched or unpatched state. Administrator should not 56 that is patched within the object. 64 properties and state of the patched function. 66 The directory name contains the patched function name and a 68 name in kallsyms for the patched object.
|
/linux-5.19.10/Documentation/livepatch/ |
D | livepatch.rst | 85 transition state where tasks are converging to the patched state. 88 the patched state to the unpatched state. 90 An interrupt handler inherits the patched state of the task it 92 patched state of the parent. 99 the task is patched. In most cases this will patch most or all of 110 force it to exit the kernel and be patched. 112 then it will get patched the next time it gets interrupted by an 117 allows them to be patched before the CPU enters the idle state. 145 unpatched and 1 to indicate it's patched. Otherwise, if no patch is in 148 patched state. This may be harmful to the system though. Sending a fake signal [all …]
|
D | callbacks.rst | 6 to execute callback functions when a kernel object is (un)patched. They 28 - A module notifier can't stop a to-be-patched module from loading. 32 be patched, irrespective of the target klp_object's current state. 40 - before a klp_object is patched 43 - after a klp_object has been patched and is active 47 - before a klp_object is unpatched (ie, patched code is 52 - after a klp_object has been patched, all code has 53 been restored and no tasks are running patched code,
|
D | module-elf-format.rst | 38 A typical livepatch module contains patched versions of functions that can 191 These are symbols accessed from new versions of functions for patched 194 resolves exported syms, and not every symbol referenced by the new patched
|
D | cumulative-patches.rst | 56 for functions that are no longer patched.
|
/linux-5.19.10/arch/sparc/kernel/ |
D | etrap_32.S | 113 sll %t_wim, 0x7, %t_wim ! patched on 7 window Sparcs 116 and %g2, 0xff, %g2 ! patched on 7 window Sparcs 189 and %g2, 0xff, %g2 ! patched on 7win Sparcs 203 and %g1, 0xff, %g1 ! patched on 7win Sparcs, mask 206 sll %t_wim, 0x7, %t_wim ! patched on 7win Sparcs 209 and %g2, 0xff, %g2 ! patched on 7win Sparcs
|
D | wof.S | 234 spnwin_patch3: and %twin_tmp, 0xff, %twin_tmp ! patched on 7win Sparcs
|
/linux-5.19.10/drivers/bluetooth/ |
D | hci_ag6xx.c | 159 bool patched = false; in ag6xx_setup() local 223 patched = true; in ag6xx_setup() 259 patched = true; in ag6xx_setup() 287 err = btintel_exit_mfg(hdev, true, patched); in ag6xx_setup()
|
D | btintel.h | 194 int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched); 226 static inline int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched) in btintel_exit_mfg() argument
|
/linux-5.19.10/arch/x86/kernel/ |
D | alternative.c | 1245 size_t patched = 0; in text_poke_copy() local 1251 while (patched < len) { in text_poke_copy() 1252 unsigned long ptr = start + patched; in text_poke_copy() 1255 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_copy() 1257 __text_poke(text_poke_memcpy, (void *)ptr, opcode + patched, s); in text_poke_copy() 1258 patched += s; in text_poke_copy() 1276 size_t patched = 0; in text_poke_set() local 1282 while (patched < len) { in text_poke_set() 1283 unsigned long ptr = start + patched; in text_poke_set() 1286 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_set() [all …]
|
/linux-5.19.10/include/linux/ |
D | livepatch.h | 75 bool patched; member 128 bool patched; member
|
/linux-5.19.10/Documentation/features/debug/kprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched kernel probe
|
/linux-5.19.10/Documentation/features/debug/optprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched optprobes
|
/linux-5.19.10/Documentation/features/debug/uprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched user probes
|
/linux-5.19.10/Documentation/features/core/jump-labels/ |
D | arch-support.txt | 4 # description: arch supports live patched, high efficiency branches
|
/linux-5.19.10/drivers/nfc/fdp/ |
D | fdp.c | 454 u8 patched = 0; in fdp_nci_setup() local 475 patched = 1; in fdp_nci_setup() 483 patched = 1; in fdp_nci_setup() 490 if (patched) { in fdp_nci_setup()
|
/linux-5.19.10/tools/perf/Documentation/ |
D | security.txt | 69 4. Get into rpmbuild/SPECS directory and build policy packages from patched sources: 88 update with the patched rpms above:
|
/linux-5.19.10/Documentation/admin-guide/ |
D | tainted-kernels.rst | 100 15 _/K 32768 kernel has been live patched 170 15) ``K`` if the kernel has been live patched.
|
/linux-5.19.10/Documentation/arm64/ |
D | silicon-errata.rst | 38 These are enabled by default and patched in at runtime when an affected
|
/linux-5.19.10/Documentation/staging/ |
D | static-keys.rst | 160 patched). Calling the static key API from within a hotplug notifier is 276 vs. the jump label case just has a 'no-op' or 'jmp 0'. (The jmp 0, is patched
|
/linux-5.19.10/Documentation/hwmon/ |
D | adt7475.rst | 156 fail to find the chip until the nvidia driver is patched.
|