Merge "doc: fix formatting in mitigation-for-Intel-MDS-security-flaws"

This commit is contained in:
Zuul 2019-10-08 20:31:05 +00:00 committed by Gerrit Code Review
commit 14f4a0b16b

View File

@ -90,12 +90,12 @@ following command (on the host)::
To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable": To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable":
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU - The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
buffer clearing" mitigation enabled (which is mechanism to invoke a buffer clearing" mitigation enabled (which is mechanism to invoke a
flush of various exploitable CPU buffers by invoking a CPU flush of various exploitable CPU buffers by invoking a CPU
instruction called "VERW"). instruction called "VERW").
- The ``SMT vulnerable`` bit means, depending on your workload, you may - The ``SMT vulnerable`` bit means, depending on your workload, you may
still be vulnerable to SMT-related problems. You need to evaluate still be vulnerable to SMT-related problems. You need to evaluate
whether your workloads need SMT (also called "Hyper-Threading") to whether your workloads need SMT (also called "Hyper-Threading") to
be disabled or not. Refer to the guidance from your Linux be disabled or not. Refer to the guidance from your Linux