linux/arch/powerpc/platforms/pseries
Laurent Dufour c18956e6e0 powerpc/pseries: Fix update of LPAR security flavor after LPM
After LPM, when migrating from a system with security mitigation enabled
to a system with mitigation disabled, the security flavor exposed in
/proc is not correctly set back to 0.

Do not assume the value of the security flavor is set to 0 when entering
init_cpu_char_feature_flags(), so when called after a LPM, the value is
set correctly even if the mitigation are not turned off.

Fixes: 6ce56e1ac3 ("powerpc/pseries: export LPAR security flavor in lparcfg")
Cc: stable@vger.kernel.org # v5.13+
Signed-off-by: Laurent Dufour <ldufour@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20210805152308.33988-1-ldufour@linux.ibm.com
2021-08-07 08:53:59 +10:00
..
Kconfig
Makefile
cmm.c
dlpar.c
dtl.c
eeh_pseries.c
event_sources.c
firmware.c
hotplug-cpu.c
hotplug-memory.c
hvCall.S
hvCall_inst.c
hvconsole.c
hvcserver.c
ibmebus.c
io_event_irq.c
iommu.c
kexec.c
lpar.c
lparcfg.c
mobility.c
msi.c
nvram.c
of_helpers.c
of_helpers.h
papr_scm.c
pci.c
pci_dlpar.c
pmem.c
power.c
pseries.h
pseries_energy.c
ras.c
reconfig.c
rng.c
rtas-fadump.c
rtas-fadump.h
scanlog.c
setup.c powerpc/pseries: Fix update of LPAR security flavor after LPM 2021-08-07 08:53:59 +10:00
smp.c
suspend.c
svm.c
vas.c
vas.h
vio.c
vphn.c