forked from ~ljy/RK356X_SDK_RELEASE

hc
2024-01-04 1543e317f1da31b75942316931e8f491a8920811
kernel/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst
....@@ -14,7 +14,7 @@
1414 to MDS attacks.
1515
1616 Affected processors
17
---------------------
17
+-------------------
1818 Core models (desktop, mobile, Xeon-E3) that implement RDRAND and/or RDSEED may
1919 be affected.
2020
....@@ -59,7 +59,7 @@
5959
6060
6161 Mitigation mechanism
62
--------------------
62
+--------------------
6363 Intel will release microcode updates that modify the RDRAND, RDSEED, and
6464 EGETKEY instructions to overwrite secret special register data in the shared
6565 staging buffer before the secret data can be accessed by another logical
....@@ -118,7 +118,7 @@
118118 ============= =============================================================
119119
120120 SRBDS System Information
121
------------------------
121
+------------------------
122122 The Linux kernel provides vulnerability status information through sysfs. For
123123 SRBDS this can be accessed by the following sysfs file:
124124 /sys/devices/system/cpu/vulnerabilities/srbds