From 993b3ff632c420b06ee2c9964fae75e883118367 Mon Sep 17 00:00:00 2001 From: "N. Le Roux" Date: Thu, 8 Aug 2024 11:54:27 +0200 Subject: [PATCH] fix(bare-metal): mention ghostwrite attack on EM-RV1 --- .../reference-content/elastic-metal-rv1-guidelines.mdx | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/bare-metal/elastic-metal/reference-content/elastic-metal-rv1-guidelines.mdx b/bare-metal/elastic-metal/reference-content/elastic-metal-rv1-guidelines.mdx index 8bdfd50b8b..d8b4f3a312 100644 --- a/bare-metal/elastic-metal/reference-content/elastic-metal-rv1-guidelines.mdx +++ b/bare-metal/elastic-metal/reference-content/elastic-metal-rv1-guidelines.mdx @@ -123,8 +123,10 @@ custom upgrade channel. Follow the steps below to update your kernel: Although we do not recommend it, you can also enable support for vector instructions with the `--enable-vector` flag. Be aware that this feature - implements an unratified version of RISC-V vector instructions (RVV 0.7.1) - which requires specific development efforts. + makes your system vulnerable to the + [GhostWrite](https://ghostwriteattack.com/) attack and implements an + unratified version of RISC-V vector instructions (RVV 0.7.1) which requires + specific development efforts. For a comprehensive list of options, refer to `rv1 update-kernel --help`. @@ -133,7 +135,8 @@ custom upgrade channel. Follow the steps below to update your kernel: If you are updating from kernel version `5.10.113-scw0` or lower, note that -newer kernels disable vector instructions by default. Refer to the process above if you still wish to keep them enabled. +newer kernels disable vector instructions by default. Refer to the process +above if you still wish to keep them enabled.