From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (193.142.43.55:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 05 May 2020 21:26:12 -0000 Received: from mga11.intel.com ([192.55.52.93]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jW54t-0005CJ-Op for speck@linutronix.de; Tue, 05 May 2020 23:26:12 +0200 Received: from localhost (mtg-dev.jf.intel.com [10.54.74.10]) by smtp.ostc.intel.com (Postfix) with ESMTP id 09622636E for ; Tue, 5 May 2020 21:26:08 +0000 (UTC) Date: Tue, 5 May 2020 14:26:08 -0700 From: mark gross Subject: [MODERATED] Re: [PATCH 4/4] more sampling fun 4 Message-ID: <20200505212608.GA149583@mtg-dev.jf.intel.com> Reply-To: mgross@linux.intel.com References: =?utf-8?q?=3Ca49dc?= =?utf-8?q?9722824aa7630d3cbe95d43b792b61130aa=2E158800=3D=3Futf?= =?utf-8?b?LTg/cT8xMTIyPz0uZ2l0Lm1ncm9zc0BsaW51eC5pbnRlbC5jb20+?= MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Tue, May 05, 2020 at 12:54:22AM +0100, speck for Ben Hutchings wrote: > On Thu, 2020-04-16 at 18:21 +0200, speck for Mark Gross wrote: > > From: Mark Gross > > Subject: [PATCH 4/4] x86/speculation: Add SRBDS vulnerability and mitigation > > documentation > > > > commit 7222a1b5b87417f22265c92deea76a6aecd0fb0f upstream > > > > Add documentation for the SRBDS vulnerability and its mitigation. > > > > [ bp: Massage. > > jpoimboe: sysfs table strings. ] > > > > Signed-off-by: Mark Gross > > Signed-off-by: Borislav Petkov > > Reviewed-by: Tony Luck > > Reviewed-by: Josh Poimboeuf > > --- > > .../special-register-buffer-data-sampling.rst | 148 ++++++++++++++++++ > > Documentation/hw-vuln/index.rst | 1 + > > 2 files changed, 149 insertions(+) > > create mode 100644 Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst > > > > diff --git a/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst b/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst > > new file mode 100644 > > index 000000000000..6a473da80b62 > > --- /dev/null > > +++ b/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst > [...] > > This should go under Documentation/hw-vuln as there is no admin-guide > directory on 4.9... > > > --- a/Documentation/hw-vuln/index.rst > > +++ b/Documentation/hw-vuln/index.rst > > @@ -13,3 +13,4 @@ are configurable at compile, boot or run time. > > mds > > tsx_async_abort > > multihit.rst > > + special-register-buffer-data-sampling.rst > > ...and this index will be broken. > > Ben. > > -- > Ben Hutchings > It's easier to fight for one's principles than to live up to them. > > You are correct. How's the following look? >From 67a45bf700e6ec55acaf7fabea50f2cda6c629c5 Mon Sep 17 00:00:00 2001 From: mark gross Date: Tue, 5 May 2020 14:20:40 -0700 Subject: [PATCH] backport put the documentation in the wrong directory WRT 4.9. Move special-register-buffer-data-sampling.rst to Documentation/hw-vuln Also clean up title underlining to correct a few warnings in make htlmdoc buy making them line up exactly with the text they are under. Signed-off-by: Mark Gross --- .../hw-vuln/special-register-buffer-data-sampling.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) rename Documentation/{admin-guide => }/hw-vuln/special-register-buffer-data-sampling.rst (99%) diff --git a/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst b/Documentation/hw-vuln/special-register-buffer-data-sampling.rst similarity index 99% rename from Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst rename to Documentation/hw-vuln/special-register-buffer-data-sampling.rst index 47b1b3afac99..3b1ce68d2456 100644 --- a/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst +++ b/Documentation/hw-vuln/special-register-buffer-data-sampling.rst @@ -14,7 +14,7 @@ to the core through the special register mechanism that is susceptible to MDS attacks. Affected processors --------------------- +------------------- Core models (desktop, mobile, Xeon-E3) that implement RDRAND and/or RDSEED may be affected. @@ -59,7 +59,7 @@ executed on another core or sibling thread using MDS techniques. Mitigation mechanism -------------------- +-------------------- Intel will release microcode updates that modify the RDRAND, RDSEED, and EGETKEY instructions to overwrite secret special register data in the shared staging buffer before the secret data can be accessed by another logical @@ -118,7 +118,7 @@ with the option "srbds=". The option for this is: ============= ============================================================= SRBDS System Information ------------------------ +------------------------ The Linux kernel provides vulnerability status information through sysfs. For SRBDS this can be accessed by the following sysfs file: /sys/devices/system/cpu/vulnerabilities/srbds -- 2.17.1