doc: fix formatting in mitigation-for-Intel-MDS-security-flaws
The bullet list was indented too far. Change-Id: I615c20a6b2b54795dfbd991b0a51dbaaac543f36
This commit is contained in:
parent
7058fac53b
commit
1ed2b2ac53
@ -90,16 +90,16 @@ following command (on the host)::
|
||||
|
||||
To unpack the message "Mitigation: Clear CPU buffers; SMT vulnerable":
|
||||
|
||||
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
|
||||
buffer clearing" mitigation enabled (which is mechanism to invoke a
|
||||
flush of various exploitable CPU buffers by invoking a CPU
|
||||
instruction called "VERW").
|
||||
- The ``Mitigation: Clear CPU buffers`` bit means, you have the "CPU
|
||||
buffer clearing" mitigation enabled (which is mechanism to invoke a
|
||||
flush of various exploitable CPU buffers by invoking a CPU
|
||||
instruction called "VERW").
|
||||
|
||||
- The ``SMT vulnerable`` bit means, depending on your workload, you may
|
||||
still be vulnerable to SMT-related problems. You need to evaluate
|
||||
whether your workloads need SMT (also called "Hyper-Threading") to
|
||||
be disabled or not. Refer to the guidance from your Linux
|
||||
distribution and processor vendor.
|
||||
- The ``SMT vulnerable`` bit means, depending on your workload, you may
|
||||
still be vulnerable to SMT-related problems. You need to evaluate
|
||||
whether your workloads need SMT (also called "Hyper-Threading") to
|
||||
be disabled or not. Refer to the guidance from your Linux
|
||||
distribution and processor vendor.
|
||||
|
||||
To see the other possible values for the sysfs file,
|
||||
``/sys/devices/system/cpu/vulnerabilities/mds``, refer to the `MDS
|
||||
|
Loading…
x
Reference in New Issue
Block a user