Home
last modified time | relevance | path

Searched refs:patch (Results 1 – 5 of 5) sorted by relevance

/kernel/livepatch/
Dcore.c121 static bool klp_is_patch_registered(struct klp_patch *patch) in klp_is_patch_registered() argument
126 if (mypatch == patch) in klp_is_patch_registered()
482 static int __klp_disable_patch(struct klp_patch *patch) in __klp_disable_patch() argument
487 if (!list_is_last(&patch->list, &klp_patches) && in __klp_disable_patch()
488 list_next_entry(patch, list)->state == KLP_ENABLED) in __klp_disable_patch()
491 pr_notice("disabling patch '%s'\n", patch->mod->name); in __klp_disable_patch()
493 klp_for_each_object(patch, obj) { in __klp_disable_patch()
498 patch->state = KLP_DISABLED; in __klp_disable_patch()
511 int klp_disable_patch(struct klp_patch *patch) in klp_disable_patch() argument
517 if (!klp_is_patch_registered(patch)) { in klp_disable_patch()
[all …]
DKconfig15 This option has no runtime impact until a kernel "patch"
17 a patch, causing calls to patched functions to be redirected
18 to new function code contained in the patch module.
/kernel/bpf/
Dcore.c167 const struct bpf_insn *patch, u32 len) in bpf_patch_insn_single() argument
174 memcpy(prog->insnsi + off, patch, sizeof(*patch)); in bpf_patch_insn_single()
202 sizeof(*patch) * insn_rest); in bpf_patch_insn_single()
203 memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len); in bpf_patch_insn_single()
Dverifier.c3298 const struct bpf_insn *patch, u32 len) in bpf_patch_insn_data() argument
3302 new_prog = bpf_patch_insn_single(env->prog, off, patch, len); in bpf_patch_insn_data()
/kernel/trace/
DKconfig497 dynamically (will patch them out of the binary image and