| From foo@baz Tue Aug 14 16:14:56 CEST 2018 |
| From: Thomas Gleixner <tglx@linutronix.de> |
| Date: Sun, 5 Aug 2018 17:06:12 +0200 |
| Subject: Documentation/l1tf: Remove Yonah processors from not vulnerable list |
| |
| From: Thomas Gleixner <tglx@linutronix.de> |
| |
| commit 58331136136935c631c2b5f06daf4c3006416e91 upstream |
| |
| Dave reported, that it's not confirmed that Yonah processors are |
| unaffected. Remove them from the list. |
| |
| Reported-by: ave Hansen <dave.hansen@intel.com> |
| Signed-off-by: Thomas Gleixner <tglx@linutronix.de> |
| Signed-off-by: David Woodhouse <dwmw@amazon.co.uk> |
| Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> |
| --- |
| Documentation/l1tf.rst | 2 -- |
| 1 file changed, 2 deletions(-) |
| |
| --- a/Documentation/l1tf.rst |
| +++ b/Documentation/l1tf.rst |
| @@ -19,8 +19,6 @@ vulnerability is not present on: |
| - A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft, |
| Penwell, Pineview, Silvermont, Airmont, Merrifield) |
| |
| - - The Intel Core Duo Yonah variants (2006 - 2008) |
| - |
| - The Intel XEON PHI family |
| |
| - Intel processors which have the ARCH_CAP_RDCL_NO bit set in the |