UPD unknown words and hypenation
This commit is contained in:
@@ -264,8 +264,7 @@ However, some of these are dynamically created at runtime, or can be modified af
|
||||
To provide an additional layer of security, route all of these calls through a single executable that can not have its name changed.\\
|
||||
Note, it is up to this single binary to then call the relevant ``real'' usermode helper binary, based on the first argument passed to it.
|
||||
If desired, this program can filter and pick and choose what real programs are called.
|
||||
If you wish for all usermode helper programs are to be disabled, choose this option and then set STATIC\_USERMODEHELPER\_PATH
|
||||
to an empty string.}
|
||||
If you wish for all usermode helper programs are to be disabled, choose this option and then set\\STATIC\_USERMODEHELPER\_PATH to an empty string.}
|
||||
|
||||
%17.15
|
||||
\subsection{SELinux Support}
|
||||
@@ -670,7 +669,7 @@ If unsure, answer Y.}
|
||||
|
||||
\subsubsection{IPE policy update verification with platform keyring}
|
||||
CONFIG\_IPE\_POLICY\_SIG\_SECONDARY\_KEYRING [=y] \textbf{[Y]}\\
|
||||
Erlauben Sie außerdem, dass der vertrauenswürdige Schlüsselbund der Plattform IPE"=Richt\-linien\-aktuali\-sie\-rungen überprüft.\\
|
||||
Erlauben Sie außerdem, dass der vertrauenswürdige Schlüsselbund der Plattform IPE"=Richtlinienaktualisierungen überprüft.\\
|
||||
Wenn Sie unsicher sind, antworten Sie mit Y für Ja.
|
||||
\english{Also allow the platform trusted keyring to verify IPE policy updates.\\
|
||||
If unsure, answer Y.}
|
||||
@@ -952,7 +951,7 @@ Die Auswirkung auf die Leistung variiert je nach Arbeitslast, ist aber teurer al
|
||||
der negativen Cache-Effekte beim Berühren von \glqq kalten\grqq{} Speicherbereichen.
|
||||
In den meisten Fällen sind die Auswirkungen \qtyrange{3}{5}{\percent}.
|
||||
Bei einigen synthetischen Workloads wurden bis zu \qty{8}{\percent} gemessen.
|
||||
\english{This has the effect of setting ``init\_on\_free=1'' on the kernel command line.
|
||||
\english{This has the effect of setting ``init\_on\_free=1'' on the kernel command line.\\
|
||||
This can be disabled with ``init\_on\_free=0''.
|
||||
Similar to ``init\_on\_alloc'', when ``init\_on\_free'' is enabled, all page allocator and slab allocator memory will be zeroed
|
||||
when freed, eliminating many kinds of ``uninitialized heap memory'' flaws, especially heap content exposures.
|
||||
|
||||
Reference in New Issue
Block a user