Merge "doc: fix formatting in mitigation-for-Intel-MDS-security-flaws"

This commit is contained in:
Zuul 2019-10-08 20:31:05 +00:00 committed by Gerrit Code Review
commit 14f4a0b16b

View File

@ -90,16 +90,16 @@ following command (on the host)::
To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable": To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable":
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU - The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
buffer clearing" mitigation enabled (which is mechanism to invoke a buffer clearing" mitigation enabled (which is mechanism to invoke a
flush of various exploitable CPU buffers by invoking a CPU flush of various exploitable CPU buffers by invoking a CPU
instruction called "VERW"). instruction called "VERW").
- The ``SMT vulnerable`` bit means, depending on your workload, you may - The ``SMT vulnerable`` bit means, depending on your workload, you may
still be vulnerable to SMT-related problems. You need to evaluate still be vulnerable to SMT-related problems. You need to evaluate
whether your workloads need SMT (also called "Hyper-Threading") to whether your workloads need SMT (also called "Hyper-Threading") to
be disabled or not. Refer to the guidance from your Linux be disabled or not. Refer to the guidance from your Linux
distribution and processor vendor. distribution and processor vendor.
To see the other possible values for the sysfs file, To see the other possible values for the sysfs file,
``/sys/devices/system/cpu/vulnerabilities/mds``, refer to the `MDS ``/sys/devices/system/cpu/vulnerabilities/mds``, refer to the `MDS