summaryrefslogtreecommitdiffstats
path: root/Documentation/hw-vuln
diff options
context:
space:
mode:
authorTyler Hicks <tyhicks@canonical.com>2019-05-06 23:52:58 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-05-16 19:45:16 +0200
commit693eb3bdaf19dd58aea99a5ed088dd6319ecc098 (patch)
treed251434f739f8b8a88b2dc873a9876402f39c83f /Documentation/hw-vuln
parent0f961ec593057bad865d3a9f6834c0ca1582d486 (diff)
downloadlinux-stable-693eb3bdaf19dd58aea99a5ed088dd6319ecc098.tar.gz
linux-stable-693eb3bdaf19dd58aea99a5ed088dd6319ecc098.tar.bz2
linux-stable-693eb3bdaf19dd58aea99a5ed088dd6319ecc098.zip
Documentation: Correct the possible MDS sysfs values
commit ea01668f9f43021b28b3f4d5ffad50106a1e1301 upstream. Adjust the last two rows in the table that display possible values when MDS mitigation is enabled. They both were slightly innacurate. In addition, convert the table of possible values and their descriptions to a list-table. The simple table format uses the top border of equals signs to determine cell width which resulted in the first column being far too wide in comparison to the second column that contained the majority of the text. Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> [bwh: Backported to 4.4: adjust filename] Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation/hw-vuln')
-rw-r--r--Documentation/hw-vuln/mds.rst29
1 files changed, 13 insertions, 16 deletions
diff --git a/Documentation/hw-vuln/mds.rst b/Documentation/hw-vuln/mds.rst
index 055eb0fb68a4..3f92728be021 100644
--- a/Documentation/hw-vuln/mds.rst
+++ b/Documentation/hw-vuln/mds.rst
@@ -95,22 +95,19 @@ mitigations are active. The relevant sysfs file is:
The possible values in this file are:
- ========================================= =================================
- 'Not affected' The processor is not vulnerable
-
- 'Vulnerable' The processor is vulnerable,
- but no mitigation enabled
-
- 'Vulnerable: Clear CPU buffers attempted' The processor is vulnerable but
- microcode is not updated.
- The mitigation is enabled on a
- best effort basis.
- See :ref:`vmwerv`
-
- 'Mitigation: CPU buffer clear' The processor is vulnerable and the
- CPU buffer clearing mitigation is
- enabled.
- ========================================= =================================
+ .. list-table::
+
+ * - 'Not affected'
+ - The processor is not vulnerable
+ * - 'Vulnerable'
+ - The processor is vulnerable, but no mitigation enabled
+ * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
+ - The processor is vulnerable but microcode is not updated.
+
+ The mitigation is enabled on a best effort basis. See :ref:`vmwerv`
+ * - 'Mitigation: Clear CPU buffers'
+ - The processor is vulnerable and the CPU buffer clearing mitigation is
+ enabled.
If the processor is vulnerable then the following information is appended
to the above information: