lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <tip-98f0fceec7f84d80bc053e49e596088573086421@git.kernel.org>
Date:   Fri, 19 Jan 2018 07:48:40 -0800
From:   "tip-bot for zhenwei.pi" <tipbot@...or.com>
To:     linux-tip-commits@...r.kernel.org
Cc:     linux-kernel@...r.kernel.org, zhenwei.pi@...runcloud.com,
        mingo@...nel.org, tglx@...utronix.de, hpa@...or.com
Subject: [tip:x86/pti] x86/pti: Document fix wrong index

Commit-ID:  98f0fceec7f84d80bc053e49e596088573086421
Gitweb:     https://git.kernel.org/tip/98f0fceec7f84d80bc053e49e596088573086421
Author:     zhenwei.pi <zhenwei.pi@...runcloud.com>
AuthorDate: Thu, 18 Jan 2018 09:04:52 +0800
Committer:  Thomas Gleixner <tglx@...utronix.de>
CommitDate: Fri, 19 Jan 2018 16:31:29 +0100

x86/pti: Document fix wrong index

In section <2. Runtime Cost>, fix wrong index.

Signed-off-by: zhenwei.pi <zhenwei.pi@...runcloud.com>
Signed-off-by: Thomas Gleixner <tglx@...utronix.de>
Cc: dave.hansen@...ux.intel.com
Link: https://lkml.kernel.org/r/1516237492-27739-1-git-send-email-zhenwei.pi@youruncloud.com

---
 Documentation/x86/pti.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Documentation/x86/pti.txt b/Documentation/x86/pti.txt
index d11eff6..5cd5843 100644
--- a/Documentation/x86/pti.txt
+++ b/Documentation/x86/pti.txt
@@ -78,7 +78,7 @@ this protection comes at a cost:
      non-PTI SYSCALL entry code, so requires mapping fewer
      things into the userspace page tables.  The downside is
      that stacks must be switched at entry time.
-  d. Global pages are disabled for all kernel structures not
+  c. Global pages are disabled for all kernel structures not
      mapped into both kernel and userspace page tables.  This
      feature of the MMU allows different processes to share TLB
      entries mapping the kernel.  Losing the feature means more

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ