From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 53621C46477 for ; Mon, 17 Jun 2019 22:16:05 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 344B12089E for ; Mon, 17 Jun 2019 22:16:05 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728729AbfFQWQD (ORCPT ); Mon, 17 Jun 2019 18:16:03 -0400 Received: from ms.lwn.net ([45.79.88.28]:45402 "EHLO ms.lwn.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726116AbfFQWQD (ORCPT ); Mon, 17 Jun 2019 18:16:03 -0400 Received: from lwn.net (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id B3B20A4D; Mon, 17 Jun 2019 22:16:01 +0000 (UTC) Date: Mon, 17 Jun 2019 16:16:00 -0600 From: Jonathan Corbet To: Thomas Gleixner Cc: Tim Chen , Alexei Starovoitov , Greg Kroah-Hartman , Ben Greear , stable@vger.kernel.org, Andi Kleen , Dave Hansen , Jun Nakajima , Jiri Kosina , Linus Torvalds , Tom Lendacky , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , David Woodhouse , Asit Mallick , Arjan van de Ven , Jon Masters , Waiman Long , Borislav Petkov , Mark Gross , LKML , x86@kernel.org Subject: Re: [PATCH v3] Documentation: Add section about CPU vulnerabilities for Spectre Message-ID: <20190617161600.77f5f5eb@lwn.net> In-Reply-To: References: Organization: LWN.net MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 17 Jun 2019 22:21:51 +0200 (CEST) Thomas Gleixner wrote: > > +Spectre variant 1 attacks take advantage of speculative execution of > > +conditional branches, while Spectre variant 2 attacks use speculative > > +execution of indirect branches to leak privileged memory. See [1] [5] > > +[7] [10] [11]. > > It would be great to actually link these [N] to the actual http link at the > bottom. No idea what's the best way to do that. > > Jonathan? Append an underscore to the link text, so: See [1_] [5_] ... Then, when adding the links: .. _1: https://.../ There are other ways; see http://docutils.sourceforge.net/docs/user/rst/quickref.html#external-hyperlink-targets for the list. > The below renders horribly when converted to HTML > > You probably want to wrap these into a table > > > + nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2 > > + (indirect branch prediction) vulnerability. System may > > + allow data leaks with this option, which is equivalent > > + to spectre_v2=off. > > + > > + > > + spectre_v2= [X86] Control mitigation of Spectre variant 2 > > + (indirect branch speculation) vulnerability. > > + The default operation protects the kernel from > > + user space attacks. > > Maybe Jonathan has a better idea. The easiest thing is probably a definition list: nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2 (indirect branch prediction) ... spectrev2= ... i.e. just move the descriptive text into an indented block below the term of interest. jon