kpatch/kmod/patch
Seth Jennings 2e93c5e1e3 support forced patching
Some functions in the kernel are always on the stack of some thread
in the system.  Attempts to patch these function will currently always
fail the activeness safety check.

However, through human inspection, it can be determined that, for a
particular function, consistency is maintained even if the old and new
versions of the function run concurrently.

This commit introduces a KPATCH_FORCE_UNSAFE() macro to define patched
functions that such be exempted from the activeness safety check.

Signed-off-by: Seth Jennings <sjenning@redhat.com>
2014-07-02 14:06:33 -05:00
..
kpatch-macros.h support forced patching 2014-07-02 14:06:33 -05:00
kpatch-patch-hook.c support forced patching 2014-07-02 14:06:33 -05:00
kpatch-patch.h fixup review comments 2014-07-01 12:22:16 -05:00
kpatch.h build and install core module with make 2014-02-18 07:44:33 -06:00
kpatch.lds support forced patching 2014-07-02 14:06:33 -05:00
Makefile build and install core module with make 2014-02-18 07:44:33 -06:00