| /linux/arch/arm64/kernel/ |
| H A D | patching.c | 105 typedef void text_poke_f(void *dst, void *src, size_t patched, size_t len); 110 size_t patched = 0; in __text_poke() local 117 while (patched < len) { in __text_poke() 118 ptr = addr + patched; in __text_poke() 120 len - patched); in __text_poke() 123 func(waddr, src, patched, size); in __text_poke() 126 patched += size; in __text_poke() 135 static void text_poke_memcpy(void *dst, void *src, size_t patched, size_t len) in text_poke_memcpy() argument 137 copy_to_kernel_nofault(dst, src + patched, len); in text_poke_memcpy() 140 static void text_poke_memset(void *dst, void *src, size_t patched, size_t len) in text_poke_memset() argument
|
| /linux/kernel/livepatch/ |
| H A D | patch.c | 131 if (WARN_ON(!func->patched)) in klp_unpatch_func() 157 func->patched = false; in klp_unpatch_func() 168 if (WARN_ON(func->patched)) in klp_patch_func() 219 func->patched = true; in klp_patch_func() 238 if (func->patched) in __klp_unpatch_object() 243 obj->patched = false; in __klp_unpatch_object() 257 if (WARN_ON(obj->patched)) in klp_patch_object() 267 obj->patched = true; in klp_patch_object() 277 if (obj->patched) in __klp_unpatch_objects()
|
| H A D | core.c | 502 return sysfs_emit(buf, "%d\n", obj->patched); in patched_show() 505 static struct kobj_attribute patched_kobj_attr = __ATTR_RO(patched); 816 func->patched = false; in klp_init_func() 923 obj->patched = false; in klp_init_object() 1021 if (obj->patched) in __klp_disable_patch()
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-livepatch | 17 object (vmlinux or a module) in which it patched functions. 24 A writable attribute that indicates whether the patched 44 the patched or unpatched state. Administrator should not 73 that is patched within the object. 75 What: /sys/kernel/livepatch/<patch>/<object>/patched 81 patched. 89 properties and state of the patched function. 91 The directory name contains the patched function name and a 93 name in kallsyms for the patched object.
|
| /linux/Documentation/livepatch/ |
| H A D | livepatch.rst | 85 transition state where tasks are converging to the patched state. 88 the patched state to the unpatched state. 90 An interrupt handler inherits the patched state of the task it 92 patched state of the parent. 99 the task is patched. In most cases this will patch most or all of 110 force it to exit the kernel and be patched. 112 then it will get patched the next time it gets interrupted by an 117 allows them to be patched before the CPU enters the idle state. 145 unpatched and 1 to indicate it's patched. Otherwise, if no patch is in 148 patched state. This may be harmful to the system though. Sending a fake signal [all …]
|
| H A D | callbacks.rst | 6 to execute callback functions when a kernel object is (un)patched. They 28 - A module notifier can't stop a to-be-patched module from loading. 32 be patched, irrespective of the target klp_object's current state. 40 - before a klp_object is patched 43 - after a klp_object has been patched and is active 47 - before a klp_object is unpatched (ie, patched code is 52 - after a klp_object has been patched, all code has 53 been restored and no tasks are running patched code,
|
| H A D | module-elf-format.rst | 38 A typical livepatch module contains patched versions of functions that can 191 These are symbols accessed from new versions of functions for patched 194 resolves exported syms, and not every symbol referenced by the new patched
|
| /linux/tools/objtool/ |
| H A D | klp-diff.c | 27 struct elf *orig, *patched, *out; member 369 file2_sym = first_file_symbol(e->patched); in correlate_symbols() 383 for_each_sym(e->patched, sym2) { in correlate_symbols() 401 file2_sym = next_file_symbol(e->patched, file2_sym)) { in correlate_symbols() 434 for_each_sym_continue(e->patched, sym2) { in correlate_symbols() 456 sym2 = find_global_symbol_by_name(e->patched, sym1->name); in correlate_symbols() 693 for_each_sym(e->patched, patched_sym) { in mark_changed_functions() 705 for_each_sym(e->patched, patched_sym) { in mark_changed_functions() 717 for_each_sym(e->patched, patched_sym) { in clone_included_functions() 1168 if (convert_reloc_sym(e->patched, patched_reloc)) { in clone_sym_relocs() [all …]
|
| /linux/arch/sparc/kernel/ |
| H A D | etrap_32.S | 113 sll %t_wim, 0x7, %t_wim ! patched on 7 window Sparcs 116 and %g2, 0xff, %g2 ! patched on 7 window Sparcs 189 and %g2, 0xff, %g2 ! patched on 7win Sparcs 203 and %g1, 0xff, %g1 ! patched on 7win Sparcs, mask 206 sll %t_wim, 0x7, %t_wim ! patched on 7win Sparcs 209 and %g2, 0xff, %g2 ! patched on 7win Sparcs
|
| H A D | wof.S | 234 spnwin_patch3: and %twin_tmp, 0xff, %twin_tmp ! patched on 7win Sparcs
|
| /linux/drivers/bluetooth/ |
| H A D | hci_ag6xx.c | 159 bool patched = false; in ag6xx_setup() local 223 patched = true; in ag6xx_setup() 259 patched = true; in ag6xx_setup() 287 err = btintel_exit_mfg(hdev, true, patched); in ag6xx_setup()
|
| H A D | btintel.h | 250 int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched); 294 static inline int btintel_exit_mfg(struct hci_dev *hdev, bool reset, bool patched) in btintel_exit_mfg() argument
|
| /linux/include/linux/ |
| H A D | livepatch.h | 77 bool patched; member 106 bool patched; member
|
| /linux/Documentation/sound/codecs/ |
| H A D | cs35l56.rst | 166 [ 7.939279] cs35l56 sdw:0:0:01fa:3556:01:0: Cirrus Logic CS35L56 Rev B0 OTP3 fw:3.4.4 (patched=0) 182 …75] cs35l56-hda i2c-CSC3556:00-cs35l56-hda.0: Cirrus Logic CS35L56 Rev B0 OTP3 fw:3.4.4 (patched=0) 193 Cirrus Logic CS35L56 Rev B0 OTP3 fw:3.4.4 (patched=0) 199 * (patched=0) is normal, and indicates that the amplifier has been hard 201 * (patched=1) means that something has previously downloaded firmware 242 * The amplifier has already been patched with firmware by something 246 string in the kernel log shows "(patched=1)"
|
| /linux/arch/x86/kernel/ |
| H A D | alternative.c | 2686 size_t patched = 0; in text_poke_copy_locked() local 2691 while (patched < len) { in text_poke_copy_locked() 2692 unsigned long ptr = start + patched; in text_poke_copy_locked() 2695 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_copy_locked() 2697 __text_poke(text_poke_memcpy, (void *)ptr, opcode + patched, s); in text_poke_copy_locked() 2698 patched += s; in text_poke_copy_locked() 2735 size_t patched = 0; in text_poke_set() local 2741 while (patched < len) { in text_poke_set() 2742 unsigned long ptr = start + patched; in text_poke_set() 2745 s = min_t(size_t, PAGE_SIZE * 2 - offset_in_page(ptr), len - patched); in text_poke_set() [all …]
|
| /linux/drivers/nfc/fdp/ |
| H A D | fdp.c | 462 u8 patched = 0; in fdp_nci_setup() local 483 patched = 1; in fdp_nci_setup() 491 patched = 1; in fdp_nci_setup() 498 if (patched) { in fdp_nci_setup()
|
| /linux/Documentation/features/debug/optprobes/ |
| H A D | arch-support.txt | 4 # description: arch supports live patched optprobes
|
| /linux/Documentation/features/debug/uprobes/ |
| H A D | arch-support.txt | 4 # description: arch supports live patched user probes
|
| /linux/Documentation/features/debug/kprobes/ |
| H A D | arch-support.txt | 4 # description: arch supports live patched kernel probe
|
| /linux/Documentation/features/core/jump-labels/ |
| H A D | arch-support.txt | 4 # description: arch supports live patched, high efficiency branches
|
| /linux/scripts/livepatch/ |
| H A D | klp-build | 127 2|patched Build patched kernel 193 2 | patched) SHORT_CIRCUIT=2; ;;
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | indirect-target-selection.rst | 62 compilers. ITS-vulnerable retpoline sites are runtime patched to point to newly 64 second half of the cacheline. Not all retpoline sites are patched to thunks, if
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 69 4. Get into rpmbuild/SPECS directory and build policy packages from patched sources: 88 update with the patched rpms above:
|
| /linux/Documentation/arch/x86/ |
| H A D | microcode.rst | 130 Any other instruction that's being patched and gets concurrently 175 an instruction being patched. Plus OS has no way to stop SMIs from
|
| /linux/Documentation/admin-guide/ |
| H A D | tainted-kernels.rst | 100 15 _/K 32768 kernel has been live patched 178 15) ``K`` if the kernel has been live patched.
|