]> git.baikalelectronics.ru Git - kernel.git/commit
x86/pti: Don't report XenPV as vulnerable
authorJiri Kosina <jkosina@suse.cz>
Mon, 18 Jun 2018 07:59:54 +0000 (09:59 +0200)
committerIngo Molnar <mingo@kernel.org>
Thu, 21 Jun 2018 12:14:52 +0000 (14:14 +0200)
commitdc464bfa7b6187e4f1ff2812374589e1b0e2f2c7
treea524a6eb1d1c5b215ab27ee26a65d34baa3187ea
parent3491f70e435adc5138f174d308b5551f5b84f9bb
x86/pti: Don't report XenPV as vulnerable

Xen PV domain kernel is not by design affected by meltdown as it's
enforcing split CR3 itself. Let's not report such systems as "Vulnerable"
in sysfs (we're also already forcing PTI to off in X86_HYPER_XEN_PV cases);
the security of the system ultimately depends on presence of mitigation in
the Hypervisor, which can't be easily detected from DomU; let's report
that.

Reported-and-tested-by: Mike Latimer <mlatimer@suse.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Juergen Gross <jgross@suse.com>
Cc: Borislav Petkov <bp@suse.de>
Link: https://lkml.kernel.org/r/nycvar.YFH.7.76.1806180959080.6203@cbobk.fhfr.pm
[ Merge the user-visible string into a single line. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
arch/x86/kernel/cpu/bugs.c