]>
Commit | Line | Data |
---|---|---|
6fa88700 GKH |
1 | From e90c34a39c8e38a4489fdc0cfd46d3e9224df04c Mon Sep 17 00:00:00 2001 |
2 | From: Thomas Gleixner <tglx@linutronix.de> | |
3 | Date: Tue, 19 Feb 2019 11:10:49 +0100 | |
4 | Subject: [PATCH 62/76] Documentation: Move L1TF to separate directory | |
5 | ||
6 | commit 65fd4cb65b2dad97feb8330b6690445910b56d6a upstream. | |
7 | ||
8 | Move L!TF to a separate directory so the MDS stuff can be added at the | |
9 | side. Otherwise the all hardware vulnerabilites have their own top level | |
10 | entry. Should have done that right away. | |
11 | ||
12 | Signed-off-by: Thomas Gleixner <tglx@linutronix.de> | |
13 | Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> | |
14 | Reviewed-by: Jon Masters <jcm@redhat.com> | |
15 | [bwh: Backported to 4.9: adjust filenames, context] | |
16 | Signed-off-by: Ben Hutchings <ben@decadent.org.uk> | |
17 | Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> | |
18 | --- | |
19 | Documentation/ABI/testing/sysfs-devices-system-cpu | 2 +- | |
20 | Documentation/hw-vuln/index.rst | 12 ++++++++++++ | |
21 | Documentation/{ => hw-vuln}/l1tf.rst | 0 | |
22 | Documentation/index.rst | 8 +++++++- | |
23 | Documentation/kernel-parameters.txt | 2 +- | |
24 | arch/x86/kernel/cpu/bugs.c | 2 +- | |
25 | arch/x86/kvm/vmx.c | 4 ++-- | |
26 | 7 files changed, 24 insertions(+), 6 deletions(-) | |
27 | create mode 100644 Documentation/hw-vuln/index.rst | |
28 | rename Documentation/{ => hw-vuln}/l1tf.rst (100%) | |
29 | ||
30 | diff --git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu | |
31 | index b4ba4f1ad610..1f5d22bbf766 100644 | |
32 | --- a/Documentation/ABI/testing/sysfs-devices-system-cpu | |
33 | +++ b/Documentation/ABI/testing/sysfs-devices-system-cpu | |
34 | @@ -371,7 +371,7 @@ Description: Information about CPU vulnerabilities | |
35 | "Mitigation: $M" CPU is affected and mitigation $M is in effect | |
36 | ||
37 | Details about the l1tf file can be found in | |
38 | - Documentation/admin-guide/l1tf.rst | |
39 | + Documentation/hw-vuln/l1tf.rst | |
40 | ||
41 | What: /sys/devices/system/cpu/smt | |
42 | /sys/devices/system/cpu/smt/active | |
43 | diff --git a/Documentation/hw-vuln/index.rst b/Documentation/hw-vuln/index.rst | |
44 | new file mode 100644 | |
45 | index 000000000000..8ce2009f1981 | |
46 | --- /dev/null | |
47 | +++ b/Documentation/hw-vuln/index.rst | |
48 | @@ -0,0 +1,12 @@ | |
49 | +======================== | |
50 | +Hardware vulnerabilities | |
51 | +======================== | |
52 | + | |
53 | +This section describes CPU vulnerabilities and provides an overview of the | |
54 | +possible mitigations along with guidance for selecting mitigations if they | |
55 | +are configurable at compile, boot or run time. | |
56 | + | |
57 | +.. toctree:: | |
58 | + :maxdepth: 1 | |
59 | + | |
60 | + l1tf | |
61 | diff --git a/Documentation/l1tf.rst b/Documentation/hw-vuln/l1tf.rst | |
62 | similarity index 100% | |
63 | rename from Documentation/l1tf.rst | |
64 | rename to Documentation/hw-vuln/l1tf.rst | |
65 | diff --git a/Documentation/index.rst b/Documentation/index.rst | |
66 | index 18b2484d19ef..f95c58dbbbc3 100644 | |
67 | --- a/Documentation/index.rst | |
68 | +++ b/Documentation/index.rst | |
69 | @@ -12,7 +12,6 @@ Contents: | |
70 | :maxdepth: 2 | |
71 | ||
72 | kernel-documentation | |
73 | - l1tf | |
74 | development-process/index | |
75 | dev-tools/tools | |
76 | driver-api/index | |
77 | @@ -20,6 +19,13 @@ Contents: | |
78 | gpu/index | |
79 | 80211/index | |
80 | ||
81 | +This section describes CPU vulnerabilities and their mitigations. | |
82 | + | |
83 | +.. toctree:: | |
84 | + :maxdepth: 1 | |
85 | + | |
86 | + hw-vuln/index | |
87 | + | |
88 | Architecture-specific documentation | |
89 | ----------------------------------- | |
90 | ||
91 | diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt | |
92 | index 3dcc0af5e441..12c33e542163 100644 | |
93 | --- a/Documentation/kernel-parameters.txt | |
94 | +++ b/Documentation/kernel-parameters.txt | |
95 | @@ -2082,7 +2082,7 @@ bytes respectively. Such letter suffixes can also be entirely omitted. | |
96 | ||
97 | Default is 'flush'. | |
98 | ||
99 | - For details see: Documentation/admin-guide/l1tf.rst | |
100 | + For details see: Documentation/hw-vuln/l1tf.rst | |
101 | ||
102 | l2cr= [PPC] | |
103 | ||
104 | diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c | |
105 | index 1d6b7e9f0411..e0c77a46c55a 100644 | |
106 | --- a/arch/x86/kernel/cpu/bugs.c | |
107 | +++ b/arch/x86/kernel/cpu/bugs.c | |
108 | @@ -1097,7 +1097,7 @@ static void __init l1tf_select_mitigation(void) | |
109 | pr_info("You may make it effective by booting the kernel with mem=%llu parameter.\n", | |
110 | half_pa); | |
111 | pr_info("However, doing so will make a part of your RAM unusable.\n"); | |
112 | - pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html might help you decide.\n"); | |
113 | + pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help you decide.\n"); | |
114 | return; | |
115 | } | |
116 | ||
117 | diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c | |
118 | index 5e44c255de6b..8feb4f7e2e59 100644 | |
119 | --- a/arch/x86/kvm/vmx.c | |
120 | +++ b/arch/x86/kvm/vmx.c | |
121 | @@ -9569,8 +9569,8 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id) | |
122 | return ERR_PTR(err); | |
123 | } | |
124 | ||
125 | -#define L1TF_MSG_SMT "L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.\n" | |
126 | -#define L1TF_MSG_L1D "L1TF CPU bug present and virtualization mitigation disabled, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.\n" | |
127 | +#define L1TF_MSG_SMT "L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n" | |
128 | +#define L1TF_MSG_L1D "L1TF CPU bug present and virtualization mitigation disabled, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.\n" | |
129 | ||
130 | static int vmx_vm_init(struct kvm *kvm) | |
131 | { | |
132 | -- | |
133 | 2.21.0 | |
134 |