From: Thomas Gleixner <[email protected]>

commit 65fd4cb65b2dad97feb8330b6690445910b56d6a upstream.

Move L!TF to a separate directory so the MDS stuff can be added at the
side. Otherwise the all hardware vulnerabilites have their own top level
entry. Should have done that right away.

Signed-off-by: Thomas Gleixner <[email protected]>
Reviewed-by: Greg Kroah-Hartman <[email protected]>
Reviewed-by: Jon Masters <[email protected]>
[bwh: Backported to 4.4: we never added the documentation, so just update
 the log message]
Signed-off-by: Ben Hutchings <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
 arch/x86/kernel/cpu/bugs.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -1063,7 +1063,7 @@ static void __init l1tf_select_mitigatio
                pr_info("You may make it effective by booting the kernel with 
mem=%llu parameter.\n",
                                half_pa);
                pr_info("However, doing so will make a part of your RAM 
unusable.\n");
-               pr_info("Reading 
https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html might help you 
decide.\n");
+               pr_info("Reading 
https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html might help 
you decide.\n");
                return;
        }
 


Reply via email to