@@ -17,7 +17,7 @@ vulnerability is not present on:
1717 - Older processor models, where the CPU family is < 6
1818
1919 - A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
20- Penwell, Pineview, Slivermont , Airmont, Merrifield)
20+ Penwell, Pineview, Silvermont , Airmont, Merrifield)
2121
2222 - The Intel Core Duo Yonah variants (2006 - 2008)
2323
@@ -113,7 +113,7 @@ Attack scenarios
113113 deployment scenario. The mitigations, their protection scope and impact
114114 are described in the next sections.
115115
116- The default mitigations and the rationale for chosing them are explained
116+ The default mitigations and the rationale for choosing them are explained
117117 at the end of this document. See :ref: `default_mitigations `.
118118
119119.. _l1tf_sys_info :
@@ -191,15 +191,15 @@ Guest mitigation mechanisms
191191 - unconditional ('always')
192192
193193 The conditional mode avoids L1D flushing after VMEXITs which execute
194- only audited code pathes before the corresponding VMENTER. These code
195- pathes have beed verified that they cannot expose secrets or other
194+ only audited code paths before the corresponding VMENTER. These code
195+ paths have been verified that they cannot expose secrets or other
196196 interesting data to an attacker, but they can leak information about the
197197 address space layout of the hypervisor.
198198
199199 Unconditional mode flushes L1D on all VMENTER invocations and provides
200200 maximum protection. It has a higher overhead than the conditional
201201 mode. The overhead cannot be quantified correctly as it depends on the
202- work load scenario and the resulting number of VMEXITs.
202+ workload scenario and the resulting number of VMEXITs.
203203
204204 The general recommendation is to enable L1D flush on VMENTER. The kernel
205205 defaults to conditional mode on affected processors.
@@ -262,7 +262,7 @@ Guest mitigation mechanisms
262262 Whether the interrupts with are affine to CPUs, which run untrusted
263263 guests, provide interesting data for an attacker depends on the system
264264 configuration and the scenarios which run on the system. While for some
265- of the interrupts it can be assumed that they wont expose interesting
265+ of the interrupts it can be assumed that they won't expose interesting
266266 information beyond exposing hints about the host OS memory layout, there
267267 is no way to make general assumptions.
268268
@@ -299,7 +299,7 @@ Guest mitigation mechanisms
299299 to be brought up at least partially and are then shut down
300300 again. "nosmt" can be undone via the sysfs interface.
301301
302- nosmt=force Has the same effect as "nosmt' but it does not allow to
302+ nosmt=force Has the same effect as "nosmt" but it does not allow to
303303 undo the SMT disable via the sysfs interface.
304304 =========== ==========================================================
305305
0 commit comments