diff options
author | Laurent Dufour <ldufour@linux.ibm.com> | 2021-08-05 17:23:08 +0200 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2021-08-07 08:53:59 +1000 |
commit | c18956e6e0b95f78dad2773ecc8c61a9e41f6405 (patch) | |
tree | 5085f6e0c2325ce02a2d132229f3bbcd9e6b54dd /arch/powerpc/kernel/kprobes.c | |
parent | 8241461536f21bbe51308a6916d1c9fb2e6b75a7 (diff) |
powerpc/pseries: Fix update of LPAR security flavor after LPM
After LPM, when migrating from a system with security mitigation enabled
to a system with mitigation disabled, the security flavor exposed in
/proc is not correctly set back to 0.
Do not assume the value of the security flavor is set to 0 when entering
init_cpu_char_feature_flags(), so when called after a LPM, the value is
set correctly even if the mitigation are not turned off.
Fixes: 6ce56e1ac380 ("powerpc/pseries: export LPAR security flavor in lparcfg")
Cc: stable@vger.kernel.org # v5.13+
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20210805152308.33988-1-ldufour@linux.ibm.com
Diffstat (limited to 'arch/powerpc/kernel/kprobes.c')
0 files changed, 0 insertions, 0 deletions