[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <162885586748.2317031.9018391947607622770.b4-ty@ellerman.id.au>
Date: Fri, 13 Aug 2021 21:57:47 +1000
From: Michael Ellerman <patch-notifications@...erman.id.au>
To: mpe@...erman.id.au, benh@...nel.crashing.org, paulus@...ba.org,
Laurent Dufour <ldufour@...ux.ibm.com>
Cc: linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org,
stable@...r.kernel.org
Subject: Re: [PATCH] powerpc/pseries: Fix update of LPAR security flavor after LPM
On Thu, 5 Aug 2021 17:23:08 +0200, Laurent Dufour wrote:
> After LPM, when migrating from a system with security mitigation enabled to
> a system with mitigation disabled, the security flavor exposed in /proc is
> not correctly set back to 0.
>
> Do not assume the value of the security flavor is set to 0 when entering
> init_cpu_char_feature_flags(), so when called after a LPM, the value is set
> correctly even if the mitigation are not turned off.
>
> [...]
Applied to powerpc/fixes.
[1/1] powerpc/pseries: Fix update of LPAR security flavor after LPM
https://git.kernel.org/powerpc/c/c18956e6e0b95f78dad2773ecc8c61a9e41f6405
cheers
Powered by blists - more mailing lists