diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-caution.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-caution.gif deleted file mode 100644 index 6e90d7cfc2193e39e10bb58c38d01a23f045d571..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-caution.gif and /dev/null differ diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-danger.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-danger.gif deleted file mode 100644 index 6e90d7cfc2193e39e10bb58c38d01a23f045d571..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-danger.gif and /dev/null differ diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-note.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-note.gif deleted file mode 100644 index 6314297e45c1de184204098efd4814d6dc8b1cda..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-note.gif and /dev/null differ diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-notice.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-notice.gif deleted file mode 100644 index 86024f61b691400bea99e5b1f506d9d9aef36e27..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-notice.gif and /dev/null differ diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-tip.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-tip.gif deleted file mode 100644 index 93aa72053b510e456b149f36a0972703ea9999b7..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-tip.gif and /dev/null differ diff --git a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-warning.gif b/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-warning.gif deleted file mode 100644 index 6e90d7cfc2193e39e10bb58c38d01a23f045d571..0000000000000000000000000000000000000000 Binary files a/docs/en/server/installation_upgrade/installation/public_sys-resources/icon-warning.gif and /dev/null differ diff --git a/docs/en/server/network/gazelle/gazelle_user_guide.md b/docs/en/server/network/gazelle/gazelle_user_guide.md index a1b2c4f73d137dcfb291fd1dd1f5a2afb8c33ba8..53b00a84d6d89529e66d972117c6c758aefbb014 100644 --- a/docs/en/server/network/gazelle/gazelle_user_guide.md +++ b/docs/en/server/network/gazelle/gazelle_user_guide.md @@ -300,7 +300,7 @@ For a non-root user, the path of the DPDK configuration file is determined by th - The patch to fix the Retbleed vulnerability is merged in kernel 5.10.0-60.57.0.85. This patch impacts the performance of Gazelle in x86 environments. You can add **retbleed=off mitigations=off** to the boot parameters to disable the patch and prevent the performance impact based on your security requirements. By default, the patch is enabled for security. - In the test scenario, 1024 KB of data is sent from kernel space to user space through ltran. The performance decreases from 17,000 Mb/s to 5,000 Mb/s. - openEuler 22.03 LTS and its SP versions (kernel version 5.10.0-60.57.0.85 or later) are affected. -- For details, see . +- For details, see . ## Restrictions diff --git a/docs/zh/embedded/uniproton/uniproton_apis.md b/docs/zh/embedded/uniproton/uniproton_apis.md index f88c6bfdf586ed7d92f82a824985b65d31058b32..159d91e1a466f6cf9012d02d16a6fd82f4713fff 100644 --- a/docs/zh/embedded/uniproton/uniproton_apis.md +++ b/docs/zh/embedded/uniproton/uniproton_apis.md @@ -1034,7 +1034,7 @@ PRT_HardBootInit 在 OS 启动时调用,在main函数前被调用,可以用 | [calloc](#calloc) | 支持 | | [posix_memalign](#posix_memalign) | 支持 | | [abort](#abort) | 支持 | -| [_Exit](#_Exit) | 支持 | +| [_Exit](#_exit) | 支持 | | [atexit](#atexit) | 支持 | | [quick_exit](#quick_exit) | 支持 | | [at_quick_exit](#at_quick_exit) | 支持 | diff --git a/docs/zh/server/network/gazelle/gazelle_user_guide.md b/docs/zh/server/network/gazelle/gazelle_user_guide.md index dff60c832503b01ce9b299e958fa7f8d4119e9f1..0060828a4ba5c26508daaa0b0d5e48b3580590ed 100644 --- a/docs/zh/server/network/gazelle/gazelle_user_guide.md +++ b/docs/zh/server/network/gazelle/gazelle_user_guide.md @@ -296,8 +296,8 @@ gazelle使用的网卡由dpdk接管,因此普通的tcpdump无法抓到gazelle - 内核在5.10.0-60.57.0.85版本合入retbleed漏洞补丁,该补丁导致X86架构下gazelle性能下降,可以在启动参数内增加**retbleed=off mitigations=off** 来规避此CVE带来的性能损耗,用户可以根据自身产品特性来选择是否规避,出于安全考虑,默认是不规避的。 - 测试场景为发送端内核态,接收端用户态ltran模式,收发1024字节,性能由17000Mb/s下降至5000Mb/s。 -- 受影响的版本包括openEuler-22.03-LTS(内核版本高于等于5.10.0-60.57.0.85) 及其之后的SP版本。 -- 具体详情可参考:。 +- 受影响的版本包括openEuler-22.03-LTS(内核版本高于等于5.10.0-60.57.0.85)及其之后的SP版本。 +- 具体详情可参考:。 ## 约束限制