X-Git-Url: http://git.nikiroo.be/?p=gofetch.git;a=blobdiff_plain;f=test%2Fexpected%2FLWN%2F0000764209.header;fp=test%2Fexpected%2FLWN%2F0000764209.header;h=123092cbfdffd11f80a08fc229fd099642d116a4;hp=d0410edcf79a03453c2b436568aeeb6616dff101;hb=3367f6256b5143b7cba2a61de36e74f389a5f379;hpb=b389651b0012a7ba1ff30d164958e155688ac216 diff --git a/test/expected/LWN/0000764209.header b/test/expected/LWN/0000764209.header index d0410ed..123092c 100644 --- a/test/expected/LWN/0000764209.header +++ b/test/expected/LWN/0000764209.header @@ -9,7 +9,12 @@ i reasonably well protected against this variant since shortly i after its disclosure in January. It is, however, possible for i user-space processes to use Spectre v2 to attack each other; i thus far, the mainline kernel has offered relatively little -i protection against such attacks. A recent proposal from Jiri -i Kosina may change that situation, but there are still some -i disagreements around the details. +i protection against such attacks. A recent [1]proposal from +i Jiri Kosina may change that situation, but there are still +i some disagreements around the details. +i +i +i +i [1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619- +i 510.15880@cbobk.fhfr.pm/ i