]> git.baikalelectronics.ru Git - kernel.git/commit
x86/pti: Don't report XenPV as vulnerable
authorJiri Kosina <jkosina@suse.cz>
Mon, 18 Jun 2018 07:59:54 +0000 (09:59 +0200)
committerIngo Molnar <mingo@kernel.org>
Thu, 21 Jun 2018 12:14:52 +0000 (14:14 +0200)
commitce80978f4ee9ba8e6ddc20b5d408480c9b18135a
treea524a6eb1d1c5b215ab27ee26a65d34baa3187ea
parent51671f6df6ac2b51eed4fc4b927f98110235f411
x86/pti: Don't report XenPV as vulnerable

Xen PV domain kernel is not by design affected by meltdown as it's
enforcing split CR3 itself. Let's not report such systems as "Vulnerable"
in sysfs (we're also already forcing PTI to off in X86_HYPER_XEN_PV cases);
the security of the system ultimately depends on presence of mitigation in
the Hypervisor, which can't be easily detected from DomU; let's report
that.

Reported-and-tested-by: Mike Latimer <mlatimer@suse.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Juergen Gross <jgross@suse.com>
Cc: Borislav Petkov <bp@suse.de>
Link: https://lkml.kernel.org/r/nycvar.YFH.7.76.1806180959080.6203@cbobk.fhfr.pm
[ Merge the user-visible string into a single line. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
arch/x86/kernel/cpu/bugs.c