Commit a1466018 authored by Tyler Hicks's avatar Tyler Hicks Committed by Greg Kroah-Hartman

Documentation: Correct the possible MDS sysfs values

commit ea01668f upstream

Adjust the last two rows in the table that display possible values when
MDS mitigation is enabled. They both were slightly innacurate.

In addition, convert the table of possible values and their descriptions
to a list-table. The simple table format uses the top border of equals
signs to determine cell width which resulted in the first column being
far too wide in comparison to the second column that contained the
majority of the text.
Signed-off-by: default avatarTyler Hicks <tyhicks@canonical.com>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent f937f9cb
...@@ -95,22 +95,19 @@ mitigations are active. The relevant sysfs file is: ...@@ -95,22 +95,19 @@ mitigations are active. The relevant sysfs file is:
The possible values in this file are: The possible values in this file are:
========================================= ================================= .. list-table::
'Not affected' The processor is not vulnerable
* - 'Not affected'
'Vulnerable' The processor is vulnerable, - The processor is not vulnerable
but no mitigation enabled * - 'Vulnerable'
- The processor is vulnerable, but no mitigation enabled
'Vulnerable: Clear CPU buffers attempted' The processor is vulnerable but * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
microcode is not updated. - The processor is vulnerable but microcode is not updated.
The mitigation is enabled on a
best effort basis. The mitigation is enabled on a best effort basis. See :ref:`vmwerv`
See :ref:`vmwerv` * - 'Mitigation: Clear CPU buffers'
- The processor is vulnerable and the CPU buffer clearing mitigation is
'Mitigation: CPU buffer clear' The processor is vulnerable and the enabled.
CPU buffer clearing mitigation is
enabled.
========================================= =================================
If the processor is vulnerable then the following information is appended If the processor is vulnerable then the following information is appended
to the above information: to the above information:
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment