Skip to content

Commit

Permalink
Documentation: Correct the possible MDS sysfs values
Browse files Browse the repository at this point in the history
commit ea01668 upstream

Adjust the last two rows in the table that display possible values when
MDS mitigation is enabled. They both were slightly innacurate.

In addition, convert the table of possible values and their descriptions
to a list-table. The simple table format uses the top border of equals
signs to determine cell width which resulted in the first column being
far too wide in comparison to the second column that contained the
majority of the text.

Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  • Loading branch information
Tyler Hicks authored and Greg Kroah-Hartman committed May 14, 2019
1 parent f937f9c commit a146601
Showing 1 changed file with 13 additions and 16 deletions.
29 changes: 13 additions & 16 deletions Documentation/admin-guide/hw-vuln/mds.rst
Original file line number Diff line number Diff line change
Expand Up @@ -95,22 +95,19 @@ mitigations are active. The relevant sysfs file is:

The possible values in this file are:

========================================= =================================
'Not affected' The processor is not vulnerable

'Vulnerable' The processor is vulnerable,
but no mitigation enabled

'Vulnerable: Clear CPU buffers attempted' The processor is vulnerable but
microcode is not updated.
The mitigation is enabled on a
best effort basis.
See :ref:`vmwerv`

'Mitigation: CPU buffer clear' The processor is vulnerable and the
CPU buffer clearing mitigation is
enabled.
========================================= =================================
.. list-table::

* - 'Not affected'
- The processor is not vulnerable
* - 'Vulnerable'
- The processor is vulnerable, but no mitigation enabled
* - 'Vulnerable: Clear CPU buffers attempted, no microcode'
- The processor is vulnerable but microcode is not updated.

The mitigation is enabled on a best effort basis. See :ref:`vmwerv`
* - 'Mitigation: Clear CPU buffers'
- The processor is vulnerable and the CPU buffer clearing mitigation is
enabled.

If the processor is vulnerable then the following information is appended
to the above information:
Expand Down

0 comments on commit a146601

Please sign in to comment.