Searched refs:patch (Results 1 – 5 of 5) sorted by relevance
| /kernel/livepatch/ |
| D | core.c | 121 static bool klp_is_patch_registered(struct klp_patch *patch) in klp_is_patch_registered() argument 126 if (mypatch == patch) in klp_is_patch_registered() 482 static int __klp_disable_patch(struct klp_patch *patch) in __klp_disable_patch() argument 487 if (!list_is_last(&patch->list, &klp_patches) && in __klp_disable_patch() 488 list_next_entry(patch, list)->state == KLP_ENABLED) in __klp_disable_patch() 491 pr_notice("disabling patch '%s'\n", patch->mod->name); in __klp_disable_patch() 493 klp_for_each_object(patch, obj) { in __klp_disable_patch() 498 patch->state = KLP_DISABLED; in __klp_disable_patch() 511 int klp_disable_patch(struct klp_patch *patch) in klp_disable_patch() argument 517 if (!klp_is_patch_registered(patch)) { in klp_disable_patch() [all …]
|
| D | Kconfig | 15 This option has no runtime impact until a kernel "patch" 17 a patch, causing calls to patched functions to be redirected 18 to new function code contained in the patch module.
|
| /kernel/bpf/ |
| D | core.c | 167 const struct bpf_insn *patch, u32 len) in bpf_patch_insn_single() argument 174 memcpy(prog->insnsi + off, patch, sizeof(*patch)); in bpf_patch_insn_single() 202 sizeof(*patch) * insn_rest); in bpf_patch_insn_single() 203 memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len); in bpf_patch_insn_single()
|
| D | verifier.c | 3298 const struct bpf_insn *patch, u32 len) in bpf_patch_insn_data() argument 3302 new_prog = bpf_patch_insn_single(env->prog, off, patch, len); in bpf_patch_insn_data()
|
| /kernel/trace/ |
| D | Kconfig | 497 dynamically (will patch them out of the binary image and
|