Skip to content

Commit 1949f9f

Browse files
aeglKAGA-KOKO
authored andcommitted
Documentation/l1tf: Fix typos
Fix spelling and other typos Signed-off-by: Tony Luck <tony.luck@intel.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
1 parent 288d152 commit 1949f9f

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

Documentation/admin-guide/l1tf.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ vulnerability is not present on:
1717
- Older processor models, where the CPU family is < 6
1818

1919
- A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
20-
Penwell, Pineview, Slivermont, Airmont, Merrifield)
20+
Penwell, Pineview, Silvermont, Airmont, Merrifield)
2121

2222
- The Intel Core Duo Yonah variants (2006 - 2008)
2323

@@ -113,7 +113,7 @@ Attack scenarios
113113
deployment scenario. The mitigations, their protection scope and impact
114114
are described in the next sections.
115115

116-
The default mitigations and the rationale for chosing them are explained
116+
The default mitigations and the rationale for choosing them are explained
117117
at the end of this document. See :ref:`default_mitigations`.
118118

119119
.. _l1tf_sys_info:
@@ -191,15 +191,15 @@ Guest mitigation mechanisms
191191
- unconditional ('always')
192192

193193
The conditional mode avoids L1D flushing after VMEXITs which execute
194-
only audited code pathes before the corresponding VMENTER. These code
195-
pathes have beed verified that they cannot expose secrets or other
194+
only audited code paths before the corresponding VMENTER. These code
195+
paths have been verified that they cannot expose secrets or other
196196
interesting data to an attacker, but they can leak information about the
197197
address space layout of the hypervisor.
198198

199199
Unconditional mode flushes L1D on all VMENTER invocations and provides
200200
maximum protection. It has a higher overhead than the conditional
201201
mode. The overhead cannot be quantified correctly as it depends on the
202-
work load scenario and the resulting number of VMEXITs.
202+
workload scenario and the resulting number of VMEXITs.
203203

204204
The general recommendation is to enable L1D flush on VMENTER. The kernel
205205
defaults to conditional mode on affected processors.
@@ -262,7 +262,7 @@ Guest mitigation mechanisms
262262
Whether the interrupts with are affine to CPUs, which run untrusted
263263
guests, provide interesting data for an attacker depends on the system
264264
configuration and the scenarios which run on the system. While for some
265-
of the interrupts it can be assumed that they wont expose interesting
265+
of the interrupts it can be assumed that they won't expose interesting
266266
information beyond exposing hints about the host OS memory layout, there
267267
is no way to make general assumptions.
268268

@@ -299,7 +299,7 @@ Guest mitigation mechanisms
299299
to be brought up at least partially and are then shut down
300300
again. "nosmt" can be undone via the sysfs interface.
301301

302-
nosmt=force Has the same effect as "nosmt' but it does not allow to
302+
nosmt=force Has the same effect as "nosmt" but it does not allow to
303303
undo the SMT disable via the sysfs interface.
304304
=========== ==========================================================
305305

0 commit comments

Comments
 (0)