Description: hw: cpu: L1 terminal fault (L1TF) [for attack vector against the operating system (Kernel)] References: https://bugzilla.redhat.com/show_bug.cgi?id=1585005 https://git.kernel.org/linus/958f338e96f874a0d29442396d6adf9c1e17aa2d https://access.redhat.com/security/vulnerabilities/L1TF https://foreshadowattack.eu/ https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault https://access.redhat.com/articles/3562741 https://xenbits.xen.org/xsa/advisory-273.html Notes: carnil> Will be adressed in 4.18.1, 4.17.15, 4.14.63, 4.9.120, and 4.4.148. bwh> Additional fixes needed: bwh> 792adb90fa724 x86/init: fix build with CONFIG_SWAP=n bwh> 56563f53d3066 x86/bugs: Move the l1tf function and define pr_fmt properly bwh> 9df9516940a61 x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() ... bwh> b0a182f875689 x86/speculation/l1tf: Fix off-by-one error when warning ... bwh> f19f5c49bbc3f x86/speculation/l1tf: Exempt zeroed PTEs from inversion bwh> 0768f91530ff4 x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert bwh> 958f79b9ee55d x86/mm/pat: Make set_memory_np() L1TF safe bwh> 1063711b57393 x86/mm/kmmio: Make the tracer robust against L1TF bwh> 6a012288d6906 x86/speculation/l1tf: Suggest what to do on systems ... Bugs: upstream: released (4.19-rc1) [781fca5b104693bc9242199cc47c690dcaf6a4cb..07d981ad4cf1e78361c6db1c28ee5ba105f96cc1] 4.9-upstream-stable: released (4.9.120) [329d815667373e858497b5947ad0484194d8c3e2..7f5d090ffe9e7603265e7991aacec64d86cf70ab] 3.16-upstream-stable: released (3.16.59) [x86-speculation-l1tf-increase-32bit-pae-__physical_page_shift.patch, x86-speculation-l1tf-change-order-of-offset-type-in-swap-entry.patch, x86-speculation-l1tf-protect-swap-entries-against-l1tf.patch, x86-speculation-l1tf-protect-prot_none-ptes-against-speculation.patch, x86-speculation-l1tf-make-sure-the-first-page-is-always-reserved.patch, x86-speculation-l1tf-add-sysfs-reporting-for-l1tf.patch, x86-speculation-l1tf-disallow-non-privileged-high-mmio-prot_none.patch, x86-speculation-l1tf-limit-swap-file-size-to-max_pa-2.patch, x86-bugs-move-the-l1tf-function-and-define-pr_fmt-properly.patch, x86-speculation-l1tf-extend-64bit-swap-file-size-limit.patch, x86-speculation-l1tf-protect-pae-swap-entries-against-l1tf.patch, x86-speculation-l1tf-fix-up-pte-pfn-conversion-for-pae.patch, x86-speculation-l1tf-unbreak-__have_arch_pfn_modify_allowed.patch, x86-speculation-l1tf-invert-all-not-present-mappings.patch, x86-speculation-l1tf-protect-numa-balance-entries-against-l1tf.patch, x86-speculation-l1tf-make-pmd-pud_mknotpresent-invert.patch, x86-mm-pat-make-set_memory_np-l1tf-safe.patch, x86-mm-kmmio-make-the-tracer-robust-against-l1tf.patch] sid: released (4.17.15-1) 4.9-stretch-security: released (4.9.110-3+deb9u3) 3.16-jessie-security: released (3.16.59-1)