
From: Zheng Yejian <zhengyejian1@huawei.com> hulk inclusion category: feature bugzilla: https://gitee.com/openeuler/kernel/issues/I60N44 CVE: NA -------------------------------- Misspelling of 'CONFIG_PREEMPTION' may cause old function not being checked, which results in a running function being livepatched. Fixes: 20106abf1e74 ("livepatch: Check whole stack when CONFIG_PREEMPT is set") Signed-off-by: Zheng Yejian <zhengyejian1@huawei.com> Reviewed-by: Kuohai Xu <xukuohai@huawei.com> Signed-off-by: Zheng Zengkai <zhengzengkai@huawei.com> --- arch/powerpc/kernel/livepatch_64.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/kernel/livepatch_64.c b/arch/powerpc/kernel/livepatch_64.c index 416f9f03d747..a2ec7c8c1bad 100644 --- a/arch/powerpc/kernel/livepatch_64.c +++ b/arch/powerpc/kernel/livepatch_64.c @@ -174,7 +174,7 @@ static int klp_check_activeness_func(struct klp_patch *patch, int enable, * excution of instructions to be repalced is * complete. */ - if (IS_ENABLED(CONFIG_PREEMTION) || + if (IS_ENABLED(CONFIG_PREEMPTION) || (func->force == KLP_NORMAL_FORCE) || check_jump_insn(func_addr)) { ret = add_func_to_list(check_funcs, &pcheck, -- 2.20.1