projects
/
linux.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
f2701b7
)
Documentation/l1tf: Remove Yonah processors from not vulnerable list
author
Thomas Gleixner
<tglx@linutronix.de>
Sun, 5 Aug 2018 15:06:12 +0000
(17:06 +0200)
committer
Thomas Gleixner
<tglx@linutronix.de>
Sun, 5 Aug 2018 15:10:18 +0000
(17:10 +0200)
Dave reported, that it's not confirmed that Yonah processors are
unaffected. Remove them from the list.
Reported-by: ave Hansen <dave.hansen@intel.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Documentation/admin-guide/l1tf.rst
patch
|
blob
|
history
diff --git
a/Documentation/admin-guide/l1tf.rst
b/Documentation/admin-guide/l1tf.rst
index ccf649cabdcdde4128d7ffe9e531591328df0da2..5dadb4503ec991860e70efb878869fb9957c71af 100644
(file)
--- a/
Documentation/admin-guide/l1tf.rst
+++ b/
Documentation/admin-guide/l1tf.rst
@@
-19,8
+19,6
@@
vulnerability is not present on:
- A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
Penwell, Pineview, Silvermont, Airmont, Merrifield)
- - The Intel Core Duo Yonah variants (2006 - 2008)
-
- The Intel XEON PHI family
- Intel processors which have the ARCH_CAP_RDCL_NO bit set in the