| From cfe8376fc6c9d53531d6442a1a8fb1d82035e70e Mon Sep 17 00:00:00 2001 |
| From: Tyler Hicks <tyhicks@canonical.com> |
| Date: Mon, 6 May 2019 23:52:58 +0000 |
| Subject: [PATCH 29/30] Documentation: Correct the possible MDS sysfs values |
| |
| commit ea01668f9f43021b28b3f4d5ffad50106a1e1301 upstream |
| |
| Adjust the last two rows in the table that display possible values when |
| MDS mitigation is enabled. They both were slightly innacurate. |
| |
| In addition, convert the table of possible values and their descriptions |
| to a list-table. The simple table format uses the top border of equals |
| signs to determine cell width which resulted in the first column being |
| far too wide in comparison to the second column that contained the |
| majority of the text. |
| |
| Signed-off-by: Tyler Hicks <tyhicks@canonical.com> |
| Signed-off-by: Thomas Gleixner <tglx@linutronix.de> |
| Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> |
| --- |
| Documentation/admin-guide/hw-vuln/mds.rst | 29 ++++++++++------------- |
| 1 file changed, 13 insertions(+), 16 deletions(-) |
| |
| diff --git a/Documentation/admin-guide/hw-vuln/mds.rst b/Documentation/admin-guide/hw-vuln/mds.rst |
| index e0dccf414eca..e3a796c0d3a2 100644 |
| --- a/Documentation/admin-guide/hw-vuln/mds.rst |
| +++ b/Documentation/admin-guide/hw-vuln/mds.rst |
| @@ -95,22 +95,19 @@ mitigations are active. The relevant sysfs file is: |
| |
| The possible values in this file are: |
| |
| - ========================================= ================================= |
| - 'Not affected' The processor is not vulnerable |
| - |
| - 'Vulnerable' The processor is vulnerable, |
| - but no mitigation enabled |
| - |
| - 'Vulnerable: Clear CPU buffers attempted' The processor is vulnerable but |
| - microcode is not updated. |
| - The mitigation is enabled on a |
| - best effort basis. |
| - See :ref:`vmwerv` |
| - |
| - 'Mitigation: CPU buffer clear' The processor is vulnerable and the |
| - CPU buffer clearing mitigation is |
| - enabled. |
| - ========================================= ================================= |
| + .. list-table:: |
| + |
| + * - 'Not affected' |
| + - The processor is not vulnerable |
| + * - 'Vulnerable' |
| + - The processor is vulnerable, but no mitigation enabled |
| + * - 'Vulnerable: Clear CPU buffers attempted, no microcode' |
| + - The processor is vulnerable but microcode is not updated. |
| + |
| + The mitigation is enabled on a best effort basis. See :ref:`vmwerv` |
| + * - 'Mitigation: Clear CPU buffers' |
| + - The processor is vulnerable and the CPU buffer clearing mitigation is |
| + enabled. |
| |
| If the processor is vulnerable then the following information is appended |
| to the above information: |
| -- |
| 2.21.0 |
| |