Skip to content

Commit fff6a4e

Browse files
authored
Merge pull request #1 from frank-w/4.14-main
Upstream updates
2 parents 42c6f86 + 5fd3e44 commit fff6a4e

File tree

130 files changed

+3190
-983
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+3190
-983
lines changed

.travis.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ git:
99
depth: false
1010
quiet: false
1111

12-
if: tag IS blank
12+
if: tag =~ /^[rR]elease.*$/
1313

1414
install:
15-
- git checkout $TRAVIS_BRANCH
15+
- git checkout 4.14-main
1616
- sudo apt-add-repository 'deb http://archive.ubuntu.com/ubuntu xenial main'
1717
- sudo apt-get update -qq
1818
- sudo apt-get install -qq ccache libssl-dev u-boot-tools python-mako debhelper fakeroot gcc-arm-linux-gnueabihf gcc-aarch64-linux-gnu make
@@ -25,8 +25,8 @@ script:
2525
- bash build.sh pack
2626
before_deploy:
2727
# Set up git user name and tag this commit
28-
- git config --local user.name "Ramon Smit"
29-
- git config --local user.email "rsmit@daltcore.com"
28+
- git config --local user.name "Frank Wunderlich"
29+
- git config --local user.email "frank-w@public-files.de"
3030
- git tag "CI-BUILD-$(date +'%Y%m%d%H%M%S')-$(git log --format=%h -1)"
3131
deploy:
3232
provider: releases
@@ -35,6 +35,7 @@ deploy:
3535
file:
3636
- "debian/*"
3737
- "../SD/*"
38+
name: $TRAVIS_BRANCH-$(date +'%Y%m%d%H%M%S')
3839
skip_cleanup: true
3940
on:
4041
all_branches: true

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -379,6 +379,7 @@ What: /sys/devices/system/cpu/vulnerabilities
379379
/sys/devices/system/cpu/vulnerabilities/spectre_v1
380380
/sys/devices/system/cpu/vulnerabilities/spectre_v2
381381
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
382+
/sys/devices/system/cpu/vulnerabilities/l1tf
382383
Date: January 2018
383384
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
384385
Description: Information about CPU vulnerabilities
@@ -390,3 +391,26 @@ Description: Information about CPU vulnerabilities
390391
"Not affected" CPU is not affected by the vulnerability
391392
"Vulnerable" CPU is affected and no mitigation in effect
392393
"Mitigation: $M" CPU is affected and mitigation $M is in effect
394+
395+
Details about the l1tf file can be found in
396+
Documentation/admin-guide/l1tf.rst
397+
398+
What: /sys/devices/system/cpu/smt
399+
/sys/devices/system/cpu/smt/active
400+
/sys/devices/system/cpu/smt/control
401+
Date: June 2018
402+
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
403+
Description: Control Symetric Multi Threading (SMT)
404+
405+
active: Tells whether SMT is active (enabled and siblings online)
406+
407+
control: Read/write interface to control SMT. Possible
408+
values:
409+
410+
"on" SMT is enabled
411+
"off" SMT is disabled
412+
"forceoff" SMT is force disabled. Cannot be changed.
413+
"notsupported" SMT is not supported by the CPU
414+
415+
If control status is "forceoff" or "notsupported" writes
416+
are rejected.

Documentation/admin-guide/index.rst

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,15 @@ etc.
1717
kernel-parameters
1818
devices
1919

20+
This section describes CPU vulnerabilities and provides an overview of the
21+
possible mitigations along with guidance for selecting mitigations if they
22+
are configurable at compile, boot or run time.
23+
24+
.. toctree::
25+
:maxdepth: 1
26+
27+
l1tf
28+
2029
Here is a set of documents aimed at users who are trying to track down
2130
problems and bugs in particular.
2231

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1888,10 +1888,84 @@
18881888
(virtualized real and unpaged mode) on capable
18891889
Intel chips. Default is 1 (enabled)
18901890

1891+
kvm-intel.vmentry_l1d_flush=[KVM,Intel] Mitigation for L1 Terminal Fault
1892+
CVE-2018-3620.
1893+
1894+
Valid arguments: never, cond, always
1895+
1896+
always: L1D cache flush on every VMENTER.
1897+
cond: Flush L1D on VMENTER only when the code between
1898+
VMEXIT and VMENTER can leak host memory.
1899+
never: Disables the mitigation
1900+
1901+
Default is cond (do L1 cache flush in specific instances)
1902+
18911903
kvm-intel.vpid= [KVM,Intel] Disable Virtual Processor Identification
18921904
feature (tagged TLBs) on capable Intel chips.
18931905
Default is 1 (enabled)
18941906

1907+
l1tf= [X86] Control mitigation of the L1TF vulnerability on
1908+
affected CPUs
1909+
1910+
The kernel PTE inversion protection is unconditionally
1911+
enabled and cannot be disabled.
1912+
1913+
full
1914+
Provides all available mitigations for the
1915+
L1TF vulnerability. Disables SMT and
1916+
enables all mitigations in the
1917+
hypervisors, i.e. unconditional L1D flush.
1918+
1919+
SMT control and L1D flush control via the
1920+
sysfs interface is still possible after
1921+
boot. Hypervisors will issue a warning
1922+
when the first VM is started in a
1923+
potentially insecure configuration,
1924+
i.e. SMT enabled or L1D flush disabled.
1925+
1926+
full,force
1927+
Same as 'full', but disables SMT and L1D
1928+
flush runtime control. Implies the
1929+
'nosmt=force' command line option.
1930+
(i.e. sysfs control of SMT is disabled.)
1931+
1932+
flush
1933+
Leaves SMT enabled and enables the default
1934+
hypervisor mitigation, i.e. conditional
1935+
L1D flush.
1936+
1937+
SMT control and L1D flush control via the
1938+
sysfs interface is still possible after
1939+
boot. Hypervisors will issue a warning
1940+
when the first VM is started in a
1941+
potentially insecure configuration,
1942+
i.e. SMT enabled or L1D flush disabled.
1943+
1944+
flush,nosmt
1945+
1946+
Disables SMT and enables the default
1947+
hypervisor mitigation.
1948+
1949+
SMT control and L1D flush control via the
1950+
sysfs interface is still possible after
1951+
boot. Hypervisors will issue a warning
1952+
when the first VM is started in a
1953+
potentially insecure configuration,
1954+
i.e. SMT enabled or L1D flush disabled.
1955+
1956+
flush,nowarn
1957+
Same as 'flush', but hypervisors will not
1958+
warn when a VM is started in a potentially
1959+
insecure configuration.
1960+
1961+
off
1962+
Disables hypervisor mitigations and doesn't
1963+
emit any warnings.
1964+
1965+
Default is 'flush'.
1966+
1967+
For details see: Documentation/admin-guide/l1tf.rst
1968+
18951969
l2cr= [PPC]
18961970

18971971
l3cr= [PPC]
@@ -2595,6 +2669,10 @@
25952669
nosmt [KNL,S390] Disable symmetric multithreading (SMT).
25962670
Equivalent to smt=1.
25972671

2672+
[KNL,x86] Disable symmetric multithreading (SMT).
2673+
nosmt=force: Force disable SMT, cannot be undone
2674+
via the sysfs control file.
2675+
25982676
nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2
25992677
(indirect branch prediction) vulnerability. System may
26002678
allow data leaks with this option, which is equivalent

0 commit comments

Comments
 (0)