/Linux-v6.6/arch/riscv/kernel/ |
D | patch.c | 149 size_t patched = 0; in patch_insn_set() local 157 while (patched < len && !ret) { in patch_insn_set() 158 size = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(addr + patched), len - patched); in patch_insn_set() 159 ret = __patch_insn_set(addr + patched, c, size); in patch_insn_set() 161 patched += size; in patch_insn_set() 184 size_t patched = 0; in patch_insn_write() local 192 while (patched < len && !ret) { in patch_insn_write() 193 size = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(addr + patched), len - patched); in patch_insn_write() 194 ret = __patch_insn_write(addr + patched, insn + patched, size); in patch_insn_write() 196 patched += size; in patch_insn_write()
|
/Linux-v6.6/kernel/livepatch/ |
D | patch.c | 131 if (WARN_ON(!func->patched)) in klp_unpatch_func() 157 func->patched = false; in klp_unpatch_func() 168 if (WARN_ON(func->patched)) in klp_patch_func() 219 func->patched = true; in klp_patch_func() 238 if (func->patched) in __klp_unpatch_object() 243 obj->patched = false; in __klp_unpatch_object() 257 if (WARN_ON(obj->patched)) in klp_patch_object() 267 obj->patched = true; in klp_patch_object() 277 if (obj->patched) in __klp_unpatch_objects()
|
D | Kconfig | 19 a patch, causing calls to patched functions to be redirected
|
D | core.c | 463 return sysfs_emit(buf, "%d\n", obj->patched); in patched_show() 466 static struct kobj_attribute patched_kobj_attr = __ATTR_RO(patched); 774 func->patched = false; in klp_init_func() 881 obj->patched = false; in klp_init_object() 979 if (obj->patched) in __klp_disable_patch()
|
D | transition.c | 279 if (!obj->patched) in klp_check_stack()
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | sysfs-kernel-livepatch | 17 object (vmlinux or a module) in which it patched functions. 24 A writable attribute that indicates whether the patched 44 the patched or unpatched state. Administrator should not 56 that is patched within the object. 58 What: /sys/kernel/livepatch/<patch>/<object>/patched 64 patched. 72 properties and state of the patched function. 74 The directory name contains the patched function name and a 76 name in kallsyms for the patched object.
|
/Linux-v6.6/Documentation/livepatch/ |
D | livepatch.rst | 85 transition state where tasks are converging to the patched state. 88 the patched state to the unpatched state. 90 An interrupt handler inherits the patched state of the task it 92 patched state of the parent. 99 the task is patched. In most cases this will patch most or all of 110 force it to exit the kernel and be patched. 112 then it will get patched the next time it gets interrupted by an 117 allows them to be patched before the CPU enters the idle state. 145 unpatched and 1 to indicate it's patched. Otherwise, if no patch is in 148 patched state. This may be harmful to the system though. Sending a fake signal [all …]
|
D | callbacks.rst | 6 to execute callback functions when a kernel object is (un)patched. They 28 - A module notifier can't stop a to-be-patched module from loading. 32 be patched, irrespective of the target klp_object's current state. 40 - before a klp_object is patched 43 - after a klp_object has been patched and is active 47 - before a klp_object is unpatched (ie, patched code is 52 - after a klp_object has been patched, all code has 53 been restored and no tasks are running patched code,
|
D | module-elf-format.rst | 38 A typical livepatch module contains patched versions of functions that can 191 These are symbols accessed from new versions of functions for patched 194 resolves exported syms, and not every symbol referenced by the new patched
|
D | cumulative-patches.rst | 56 for functions that are no longer patched.
|
/Linux-v6.6/arch/sparc/kernel/ |
D | etrap_32.S | 113 sll %t_wim, 0x7, %t_wim ! patched on 7 window Sparcs 116 and %g2, 0xff, %g2 ! patched on 7 window Sparcs 189 and %g2, 0xff, %g2 ! patched on 7win Sparcs 203 and %g1, 0xff, %g1 ! patched on 7win Sparcs, mask 206 sll %t_wim, 0x7, %t_wim ! patched on 7win Sparcs 209 and %g2, 0xff, %g2 ! patched on 7win Sparcs
|
D | wof.S | 234 spnwin_patch3: and %twin_tmp, 0xff, %twin_tmp ! patched on 7win Sparcs
|
/Linux-v6.6/drivers/bluetooth/ |
D | hci_ag6xx.c | 159 bool patched = false; in ag6xx_setup() local 223 patched = true; in ag6xx_setup() 259 patched = true; in ag6xx_setup() 287 err = btintel_exit_mfg(hdev, true, patched); in ag6xx_setup()
|
D | btintel.h | 208 int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched); 241 static inline int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched) in btintel_exit_mfg() argument
|
/Linux-v6.6/include/linux/ |
D | livepatch.h | 76 bool patched; member 129 bool patched; member
|
/Linux-v6.6/arch/x86/kernel/ |
D | alternative.c | 1931 size_t patched = 0; in text_poke_copy_locked() local 1936 while (patched < len) { in text_poke_copy_locked() 1937 unsigned long ptr = start + patched; in text_poke_copy_locked() 1940 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_copy_locked() 1942 __text_poke(text_poke_memcpy, (void *)ptr, opcode + patched, s); in text_poke_copy_locked() 1943 patched += s; in text_poke_copy_locked() 1980 size_t patched = 0; in text_poke_set() local 1986 while (patched < len) { in text_poke_set() 1987 unsigned long ptr = start + patched; in text_poke_set() 1990 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_set() [all …]
|
/Linux-v6.6/Documentation/features/debug/optprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched optprobes
|
/Linux-v6.6/Documentation/features/debug/kprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched kernel probe
|
/Linux-v6.6/Documentation/features/debug/uprobes/ |
D | arch-support.txt | 4 # description: arch supports live patched user probes
|
/Linux-v6.6/Documentation/features/core/jump-labels/ |
D | arch-support.txt | 4 # description: arch supports live patched, high efficiency branches
|
/Linux-v6.6/drivers/nfc/fdp/ |
D | fdp.c | 462 u8 patched = 0; in fdp_nci_setup() local 483 patched = 1; in fdp_nci_setup() 491 patched = 1; in fdp_nci_setup() 498 if (patched) { in fdp_nci_setup()
|
/Linux-v6.6/drivers/mfd/ |
D | cs42l43.c | 715 bool patched, shadow; in cs42l43_mcu_update_step() local 745 patched = mcu_rev >= CS42L43_MCU_SUPPORTED_REV || in cs42l43_mcu_update_step() 761 if (!patched && cs42l43->hw_lock) { in cs42l43_mcu_update_step() 771 if (!patched) { in cs42l43_mcu_update_step() 791 if (patched) in cs42l43_mcu_update_step()
|
/Linux-v6.6/tools/perf/Documentation/ |
D | security.txt | 69 4. Get into rpmbuild/SPECS directory and build policy packages from patched sources: 88 update with the patched rpms above:
|
/Linux-v6.6/Documentation/arch/x86/ |
D | microcode.rst | 130 Any other instruction that's being patched and gets concurrently 175 an instruction being patched. Plus OS has no way to stop SMIs from
|
/Linux-v6.6/Documentation/admin-guide/ |
D | tainted-kernels.rst | 100 15 _/K 32768 kernel has been live patched 177 15) ``K`` if the kernel has been live patched.
|