63 lines
2.5 KiB
Diff
63 lines
2.5 KiB
Diff
From 9cd0e06f7739f9e1a15379e971b3e6c64816d36f Mon Sep 17 00:00:00 2001
|
|
From: Tyler Hicks <tyhicks@canonical.com>
|
|
Date: Mon, 6 May 2019 23:52:58 +0000
|
|
Subject: [PATCH 29/30] Documentation: Correct the possible MDS sysfs values
|
|
|
|
commit ea01668f9f43021b28b3f4d5ffad50106a1e1301 upstream
|
|
|
|
Adjust the last two rows in the table that display possible values when
|
|
MDS mitigation is enabled. They both were slightly innacurate.
|
|
|
|
In addition, convert the table of possible values and their descriptions
|
|
to a list-table. The simple table format uses the top border of equals
|
|
signs to determine cell width which resulted in the first column being
|
|
far too wide in comparison to the second column that contained the
|
|
majority of the text.
|
|
|
|
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
|
|
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
|
|
---
|
|
Documentation/admin-guide/hw-vuln/mds.rst | 29 ++++++++++-------------
|
|
1 file changed, 13 insertions(+), 16 deletions(-)
|
|
|
|
diff --git a/Documentation/admin-guide/hw-vuln/mds.rst b/Documentation/admin-guide/hw-vuln/mds.rst
|
|
index e0dccf414eca..e3a796c0d3a2 100644
|
|
--- a/Documentation/admin-guide/hw-vuln/mds.rst
|
|
+++ b/Documentation/admin-guide/hw-vuln/mds.rst
|
|
@@ -95,22 +95,19 @@ status of the system: whether the system is vulnerable, and which
|
|
|
|
The possible values in this file are:
|
|
|
|
- ========================================= =================================
|
|
- 'Not affected' The processor is not vulnerable
|
|
-
|
|
- 'Vulnerable' The processor is vulnerable,
|
|
- but no mitigation enabled
|
|
-
|
|
- 'Vulnerable: Clear CPU buffers attempted' The processor is vulnerable but
|
|
- microcode is not updated.
|
|
- The mitigation is enabled on a
|
|
- best effort basis.
|
|
- See :ref:`vmwerv`
|
|
-
|
|
- 'Mitigation: CPU buffer clear' The processor is vulnerable and the
|
|
- CPU buffer clearing mitigation is
|
|
- enabled.
|
|
- ========================================= =================================
|
|
+ .. list-table::
|
|
+
|
|
+ * - 'Not affected'
|
|
+ - The processor is not vulnerable
|
|
+ * - 'Vulnerable'
|
|
+ - The processor is vulnerable, but no mitigation enabled
|
|
+ * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
|
|
+ - The processor is vulnerable but microcode is not updated.
|
|
+
|
|
+ The mitigation is enabled on a best effort basis. See :ref:`vmwerv`
|
|
+ * - 'Mitigation: Clear CPU buffers'
|
|
+ - The processor is vulnerable and the CPU buffer clearing mitigation is
|
|
+ enabled.
|
|
|
|
If the processor is vulnerable then the following information is appended
|
|
to the above information:
|