diff options
author | Tibor Frank <tifrank@cisco.com> | 2020-07-13 10:47:54 +0200 |
---|---|---|
committer | Tibor Frank <tifrank@cisco.com> | 2020-07-13 10:47:54 +0200 |
commit | d6aed8b19c60ff81cad100c9c3a6931ce1686f38 (patch) | |
tree | c1b26f6da4f3f174d6a0d54b5e22151d14035c58 | |
parent | b9056e2936fa92ae0ec514db2eed482ce33679a0 (diff) |
Report 2005: Fix titles in test env
Change-Id: I55e7a596d5fa23531e68d7ace9364411c3c372fc
Signed-off-by: Tibor Frank <tifrank@cisco.com>
5 files changed, 6 insertions, 6 deletions
diff --git a/docs/report/introduction/test_environment_sut_meltspec_clx.rst b/docs/report/introduction/test_environment_sut_meltspec_clx.rst index a715971c5b..826e6d37b4 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_clx.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_clx.rst @@ -1,5 +1,5 @@ Spectre and Meltdown Checks -~~~~~~~~~~~~~~~~~~~~~~~~~~~ +^^^^^^^^^^^^^^^^^^^^^^^^^^^ Following section displays the output of a running shell script to tell if system is vulnerable against the several speculative execution CVEs that were @@ -332,4 +332,4 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github * iTLB Multihit mitigation enabled and active: YES (KVM: Mitigation: Split huge pages) > STATUS: NOT VULNERABLE (this system is not running a hypervisor) - > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK CVE-2019-11135:OK CVE-2018-12207:OK
\ No newline at end of file + > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK CVE-2019-11135:OK CVE-2018-12207:OK diff --git a/docs/report/introduction/test_environment_sut_meltspec_dnv.rst b/docs/report/introduction/test_environment_sut_meltspec_dnv.rst index a83869ba03..616449efd7 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_dnv.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_dnv.rst @@ -1,5 +1,5 @@ Spectre and Meltdown Checks -~~~~~~~~~~~~~~~~~~~~~~~~~~~ +^^^^^^^^^^^^^^^^^^^^^^^^^^^ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were diff --git a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst index fd66a8dfa3..092bfb3ca1 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_hsw.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_hsw.rst @@ -1,5 +1,5 @@ Spectre and Meltdown Checks -~~~~~~~~~~~~~~~~~~~~~~~~~~~ +^^^^^^^^^^^^^^^^^^^^^^^^^^^ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were diff --git a/docs/report/introduction/test_environment_sut_meltspec_skx.rst b/docs/report/introduction/test_environment_sut_meltspec_skx.rst index abba5804b3..e242e19b7e 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_skx.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_skx.rst @@ -1,5 +1,5 @@ Spectre and Meltdown Checks -~~~~~~~~~~~~~~~~~~~~~~~~~~~ +^^^^^^^^^^^^^^^^^^^^^^^^^^^ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were diff --git a/docs/report/introduction/test_environment_sut_meltspec_tsh.rst b/docs/report/introduction/test_environment_sut_meltspec_tsh.rst index 059f0f99a3..f7d385061c 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_tsh.rst +++ b/docs/report/introduction/test_environment_sut_meltspec_tsh.rst @@ -1,5 +1,5 @@ Spectre and Meltdown Checks -~~~~~~~~~~~~~~~~~~~~~~~~~~~ +^^^^^^^^^^^^^^^^^^^^^^^^^^^ Following section displays the output of a running shell script to tell if system is vulnerable against the several "speculative execution" CVEs that were |