[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190724100107.GA7206@amd>
Date: Wed, 24 Jul 2019 12:01:07 +0200
From: Pavel Machek <pavel@....cz>
To: tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, hpa@...or.com,
x86@...nel.org, corbet@....net, linux-kernel@...r.kernel.org,
linux-doc@...r.kernel.org
Subject: doc: mds: nitpicking and typo fix
Consistently end sentences, fix typo.
Signed-off-by: Pavel Machek <pavel@...x.de>
commit 310cb17613f46db97cebbd9dc11187961e4b1c69
Author: Pavel <pavel@....cz>
Date: Mon May 20 10:46:35 2019 +0200
doc: typo fix, consistency in mds.
diff --git a/Documentation/x86/mds.rst b/Documentation/x86/mds.rst
index 5d4330b..9983b50 100644
--- a/Documentation/x86/mds.rst
+++ b/Documentation/x86/mds.rst
@@ -54,13 +54,13 @@ needed for exploiting MDS requires:
- to control the load to trigger a fault or assist
- to have a disclosure gadget which exposes the speculatively accessed
- data for consumption through a side channel.
+ data for consumption through a side channel
- to control the pointer through which the disclosure gadget exposes the
data
The existence of such a construct in the kernel cannot be excluded with
-100% certainty, but the complexity involved makes it extremly unlikely.
+100% certainty, but the complexity involved makes it extremely unlikely.
There is one exception, which is untrusted BPF. The functionality of
untrusted BPF is limited, but it needs to be thoroughly investigated
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
Download attachment "signature.asc" of type "application/pgp-signature" (182 bytes)
Powered by blists - more mailing lists