@@ -17,7 +17,7 @@ vulnerability is not present on:
17
17
- Older processor models, where the CPU family is < 6
18
18
19
19
- A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
20
- Penwell, Pineview, Slivermont , Airmont, Merrifield)
20
+ Penwell, Pineview, Silvermont , Airmont, Merrifield)
21
21
22
22
- The Intel Core Duo Yonah variants (2006 - 2008)
23
23
@@ -113,7 +113,7 @@ Attack scenarios
113
113
deployment scenario. The mitigations, their protection scope and impact
114
114
are described in the next sections.
115
115
116
- The default mitigations and the rationale for chosing them are explained
116
+ The default mitigations and the rationale for choosing them are explained
117
117
at the end of this document. See :ref: `default_mitigations `.
118
118
119
119
.. _l1tf_sys_info :
@@ -191,15 +191,15 @@ Guest mitigation mechanisms
191
191
- unconditional ('always')
192
192
193
193
The conditional mode avoids L1D flushing after VMEXITs which execute
194
- only audited code pathes before the corresponding VMENTER. These code
195
- pathes have beed verified that they cannot expose secrets or other
194
+ only audited code paths before the corresponding VMENTER. These code
195
+ paths have been verified that they cannot expose secrets or other
196
196
interesting data to an attacker, but they can leak information about the
197
197
address space layout of the hypervisor.
198
198
199
199
Unconditional mode flushes L1D on all VMENTER invocations and provides
200
200
maximum protection. It has a higher overhead than the conditional
201
201
mode. The overhead cannot be quantified correctly as it depends on the
202
- work load scenario and the resulting number of VMEXITs.
202
+ workload scenario and the resulting number of VMEXITs.
203
203
204
204
The general recommendation is to enable L1D flush on VMENTER. The kernel
205
205
defaults to conditional mode on affected processors.
@@ -262,7 +262,7 @@ Guest mitigation mechanisms
262
262
Whether the interrupts with are affine to CPUs, which run untrusted
263
263
guests, provide interesting data for an attacker depends on the system
264
264
configuration and the scenarios which run on the system. While for some
265
- of the interrupts it can be assumed that they wont expose interesting
265
+ of the interrupts it can be assumed that they won't expose interesting
266
266
information beyond exposing hints about the host OS memory layout, there
267
267
is no way to make general assumptions.
268
268
@@ -299,7 +299,7 @@ Guest mitigation mechanisms
299
299
to be brought up at least partially and are then shut down
300
300
again. "nosmt" can be undone via the sysfs interface.
301
301
302
- nosmt=force Has the same effect as "nosmt' but it does not allow to
302
+ nosmt=force Has the same effect as "nosmt" but it does not allow to
303
303
undo the SMT disable via the sysfs interface.
304
304
=========== ==========================================================
305
305
0 commit comments