![]() Special register +accesses are accesses to off core registers. +++ -0,0 +1,149 SPDX-License-Identifier: GPL-2.0 + +SRBDS - Special Register Buffer Data Sampling += + +SRBDS is a hardware vulnerability that allows MDS :doc:`mds` techniques to +infer values returned from special register accesses. +++ -14,3 +14,4 tsx_async_abort multihit.rst + special-register-buffer-data-sampling.rst diff -git a/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst b/Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst ![]() a/Documentation/admin-guide/hw-vuln/index.rst +++ -381,6 +381,7 /sys/devices/system/cpu/vulnerabilities/l1tf /sys/devices/system/cpu/vulnerabilities/mds + /sys/devices/system/cpu/vulnerabilities/srbds /sys/devices/system/cpu/vulnerabilities/tsx_async_abort /sys/devices/system/cpu/vulnerabilities/itlb_multihit Date: January 2018 diff -git a/Documentation/admin-guide/hw-vuln/index.rst b/Documentation/admin-guide/hw-vuln/index.rst a/Documentation/ABI/testing/sysfs-devices-system-cpu Merge branch 'android-msm-floral-4.14-rvc' into android-msm-floral-4.14-rvc-qpr1Ĭhange-Id: I4d4c4408a928a0b9c9bbbedad9b7346d80a81af9 diff -git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |