From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 12 Jul 2018 15:34:32 -0000 Received: from mail.linuxfoundation.org ([140.211.169.12]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fddby-0008Vt-Nv for speck@linutronix.de; Thu, 12 Jul 2018 17:34:31 +0200 Date: Thu, 12 Jul 2018 17:34:20 +0200 From: Greg KH Subject: [MODERATED] Re: [patch V10 01/10] Control knobs and Documentation 1 Message-ID: <20180712153420.GA14096@kroah.com> References: <20180712141902.576562442@linutronix.de> <20180712142957.031806920@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20180712142957.031806920@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Thu, Jul 12, 2018 at 04:19:03PM +0200, speck for Thomas Gleixner wrote: > +#define L1TF_DEFAULT_MSG "Mitigation: PTE Inversion" > + > +#if IS_ENABLED(CONFIG_KVM_INTEL) > +static const char *l1tf_vmx_states[] = { > + [VMENTER_L1D_FLUSH_AUTO] = "auto", > + [VMENTER_L1D_FLUSH_NEVER] = "vulnerable", > + [VMENTER_L1D_FLUSH_COND] = "conditional cache flushes", > + [VMENTER_L1D_FLUSH_ALWAYS] = "cache flushes", > +}; > + > +static ssize_t l1tf_show_state(char *buf) > +{ > + if (l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_AUTO) > + return sprintf(buf, "%s\n", L1TF_DEFAULT_MSG); > + > + return sprintf(buf, "%s; VMX: SMT %s, L1D %s\n", L1TF_DEFAULT_MSG, > + cpu_smt_control == CPU_SMT_ENABLED ? "vulnerable" : "disabled", > + l1tf_vmx_states[l1tf_vmx_mitigation]); > +} > +#else > +static ssize_t l1tf_show_state(char *buf) > +{ > + return sprintf(buf, "%s\n", L1TF_DEFAULT_MSG); > +} > +#endif I don't see any Documenatation/ABI/ update for this new sysfs file in the patch series before this, or in this one. Did I miss it? thanks, greg k-h