Merge "doc: fix formatting in mitigation-for-Intel-MDS-security-flaws"
This commit is contained in:
commit
14f4a0b16b
@ -90,12 +90,12 @@ following command (on the host)::
|
|||||||
|
|
||||||
To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable":
|
To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable":
|
||||||
|
|
||||||
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
|
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
|
||||||
buffer clearing" mitigation enabled (which is mechanism to invoke a
|
buffer clearing" mitigation enabled (which is mechanism to invoke a
|
||||||
flush of various exploitable CPU buffers by invoking a CPU
|
flush of various exploitable CPU buffers by invoking a CPU
|
||||||
instruction called "VERW").
|
instruction called "VERW").
|
||||||
|
|
||||||
- The ``SMT vulnerable`` bit means, depending on your workload, you may
|
- The ``SMT vulnerable`` bit means, depending on your workload, you may
|
||||||
still be vulnerable to SMT-related problems. You need to evaluate
|
still be vulnerable to SMT-related problems. You need to evaluate
|
||||||
whether your workloads need SMT (also called "Hyper-Threading") to
|
whether your workloads need SMT (also called "Hyper-Threading") to
|
||||||
be disabled or not. Refer to the guidance from your Linux
|
be disabled or not. Refer to the guidance from your Linux
|
||||||
|
Loading…
Reference in New Issue
Block a user