summaryrefslogtreecommitdiff
path: root/5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-10-12 04:00:49 +0000
committerCoprDistGit <infra@openeuler.org>2023-10-12 04:00:49 +0000
commitc22f60e6e55f1bf300dd76d2222a93911f3b2bb2 (patch)
treeef665e7018377f53612ac2751dcaea35a1c587b6 /5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch
parent39a4763249cd6289e5019acfe0c98dbb169f5f2e (diff)
automatic import of xenopeneuler22.03_LTS
Diffstat (limited to '5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch')
-rw-r--r--5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch43
1 files changed, 43 insertions, 0 deletions
diff --git a/5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch b/5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch
new file mode 100644
index 0000000..2d5bc64
--- /dev/null
+++ b/5ee24d0e-x86-spec-ctrl-document-SRBDS-workaround.patch
@@ -0,0 +1,43 @@
+# Commit 7028534d8482d25860c4d1aa8e45f0b911abfc5a
+# Date 2020-06-11 16:26:06 +0100
+# Author Andrew Cooper <andrew.cooper3@citrix.com>
+# Committer Andrew Cooper <andrew.cooper3@citrix.com>
+x86/spec-ctrl: Update docs with SRBDS workaround
+
+RDRAND/RDSEED can be hidden using cpuid= to mitigate SRBDS if microcode
+isn't available.
+
+This is part of XSA-320 / CVE-2020-0543.
+
+Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
+Acked-by: Julien Grall <jgrall@amazon.com>
+
+--- a/docs/misc/xen-command-line.pandoc
++++ b/docs/misc/xen-command-line.pandoc
+@@ -481,16 +481,21 @@ choice of `dom0-kernel` is deprecated an
+ This option allows for fine tuning of the facilities Xen will use, after
+ accounting for hardware capabilities as enumerated via CPUID.
+
++Unless otherwise noted, options only have any effect in their negative form,
++to hide the named feature(s). Ignoring a feature using this mechanism will
++cause Xen not to use the feature, nor offer them as usable to guests.
++
+ Currently accepted:
+
+ The Speculation Control hardware features `srbds-ctrl`, `md-clear`, `ibrsb`,
+ `stibp`, `ibpb`, `l1d-flush` and `ssbd` are used by default if available and
+-applicable. They can be ignored, e.g. `no-ibrsb`, at which point Xen won't
+-use them itself, and won't offer them to guests.
++applicable. They can all be ignored.
+
+-`rdrand` can be used to override the default disabling of the feature on certain
+-AMD systems. Its negative form can of course also be used to suppress use and
+-exposure of the feature.
++`rdrand` and `rdseed` can be ignored, as a mitigation to XSA-320 /
++CVE-2020-0543. The RDRAND feature is disabled by default on certain AMD
++systems, due to possible malfunctions after ACPI S3 suspend/resume. `rdrand`
++may be used in its positive form to override Xen's default behaviour on these
++systems, and make the feature fully usable.
+
+ ### cpuid_mask_cpu
+ > `= fam_0f_rev_[cdefg] | fam_10_rev_[bc] | fam_11_rev_b`