]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/blame - queue-4.9/0062-Documentation-Move-L1TF-to-separate-directory.patch
4.9-stable patches
[thirdparty/kernel/stable-queue.git] / queue-4.9 / 0062-Documentation-Move-L1TF-to-separate-directory.patch
CommitLineData
6fa88700
GKH
1From e90c34a39c8e38a4489fdc0cfd46d3e9224df04c Mon Sep 17 00:00:00 2001
2From: Thomas Gleixner <tglx@linutronix.de>
3Date: Tue, 19 Feb 2019 11:10:49 +0100
4Subject: [PATCH 62/76] Documentation: Move L1TF to separate directory
5
6commit 65fd4cb65b2dad97feb8330b6690445910b56d6a upstream.
7
8Move L!TF to a separate directory so the MDS stuff can be added at the
9side. Otherwise the all hardware vulnerabilites have their own top level
10entry. Should have done that right away.
11
12Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
13Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
14Reviewed-by: Jon Masters <jcm@redhat.com>
15[bwh: Backported to 4.9: adjust filenames, context]
16Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
17Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
18---
19 Documentation/ABI/testing/sysfs-devices-system-cpu | 2 +-
20 Documentation/hw-vuln/index.rst | 12 ++++++++++++
21 Documentation/{ => hw-vuln}/l1tf.rst | 0
22 Documentation/index.rst | 8 +++++++-
23 Documentation/kernel-parameters.txt | 2 +-
24 arch/x86/kernel/cpu/bugs.c | 2 +-
25 arch/x86/kvm/vmx.c | 4 ++--
26 7 files changed, 24 insertions(+), 6 deletions(-)
27 create mode 100644 Documentation/hw-vuln/index.rst
28 rename Documentation/{ => hw-vuln}/l1tf.rst (100%)
29
30diff --git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu
31index b4ba4f1ad610..1f5d22bbf766 100644
32--- a/Documentation/ABI/testing/sysfs-devices-system-cpu
33+++ b/Documentation/ABI/testing/sysfs-devices-system-cpu
34@@ -371,7 +371,7 @@ Description: Information about CPU vulnerabilities
35 "Mitigation: $M" CPU is affected and mitigation $M is in effect
36
37 Details about the l1tf file can be found in
38- Documentation/admin-guide/l1tf.rst
39+ Documentation/hw-vuln/l1tf.rst
40
41 What: /sys/devices/system/cpu/smt
42 /sys/devices/system/cpu/smt/active
43diff --git a/Documentation/hw-vuln/index.rst b/Documentation/hw-vuln/index.rst
44new file mode 100644
45index 000000000000..8ce2009f1981
46--- /dev/null
47+++ b/Documentation/hw-vuln/index.rst
48@@ -0,0 +1,12 @@
49+========================
50+Hardware vulnerabilities
51+========================
52+
53+This section describes CPU vulnerabilities and provides an overview of the
54+possible mitigations along with guidance for selecting mitigations if they
55+are configurable at compile, boot or run time.
56+
57+.. toctree::
58+ :maxdepth: 1
59+
60+ l1tf
61diff --git a/Documentation/l1tf.rst b/Documentation/hw-vuln/l1tf.rst
62similarity index 100%
63rename from Documentation/l1tf.rst
64rename to Documentation/hw-vuln/l1tf.rst
65diff --git a/Documentation/index.rst b/Documentation/index.rst
66index 18b2484d19ef..f95c58dbbbc3 100644
67--- a/Documentation/index.rst
68+++ b/Documentation/index.rst
69@@ -12,7 +12,6 @@ Contents:
70 :maxdepth: 2
71
72 kernel-documentation
73- l1tf
74 development-process/index
75 dev-tools/tools
76 driver-api/index
77@@ -20,6 +19,13 @@ Contents:
78 gpu/index
79 80211/index
80
81+This section describes CPU vulnerabilities and their mitigations.
82+
83+.. toctree::
84+ :maxdepth: 1
85+
86+ hw-vuln/index
87+
88 Architecture-specific documentation
89 -----------------------------------
90
91diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt
92index 3dcc0af5e441..12c33e542163 100644
93--- a/Documentation/kernel-parameters.txt
94+++ b/Documentation/kernel-parameters.txt
95@@ -2082,7 +2082,7 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
96
97 Default is 'flush'.
98
99- For details see: Documentation/admin-guide/l1tf.rst
100+ For details see: Documentation/hw-vuln/l1tf.rst
101
102 l2cr= [PPC]
103
104diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c
105index 1d6b7e9f0411..e0c77a46c55a 100644
106--- a/arch/x86/kernel/cpu/bugs.c
107+++ b/arch/x86/kernel/cpu/bugs.c
108@@ -1097,7 +1097,7 @@ static void __init l1tf_select_mitigation(void)
109 pr_info("You may make it effective by booting the kernel with mem=%llu parameter.\n",
110 half_pa);
111 pr_info("However, doing so will make a part of your RAM unusable.\n");
112- pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html might help you decide.\n");
113+ pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide.\n");
114 return;
115 }
116
117diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
118index 5e44c255de6b..8feb4f7e2e59 100644
119--- a/arch/x86/kvm/vmx.c
120+++ b/arch/x86/kvm/vmx.c
121@@ -9569,8 +9569,8 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id)
122 return ERR_PTR(err);
123 }
124
125-#define L1TF_MSG_SMT "L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.\n"
126-#define L1TF_MSG_L1D "L1TF CPU bug present and virtualization mitigation disabled, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.\n"
127+#define L1TF_MSG_SMT "L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n"
128+#define L1TF_MSG_L1D "L1TF CPU bug present and virtualization mitigation disabled, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n"
129
130 static int vmx_vm_init(struct kvm *kvm)
131 {
132--
1332.21.0
134