Commit d9f378f6 authored by Thomas Gleixner's avatar Thomas Gleixner Committed by Greg Kroah-Hartman

Documentation/l1tf: Remove Yonah processors from not vulnerable list

commit 58331136 upstream

Dave reported, that it's not confirmed that Yonah processors are
unaffected. Remove them from the list.
Reported-by: default avatarave Hansen <dave.hansen@intel.com>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
Signed-off-by: default avatarDavid Woodhouse <dwmw@amazon.co.uk>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent 77a83b3a
......@@ -19,8 +19,6 @@ vulnerability is not present on:
- A range of Intel ATOM processors (Cedarview, Cloverview, Lincroft,
Penwell, Pineview, Silvermont, Airmont, Merrifield)
- The Intel Core Duo Yonah variants (2006 - 2008)
- The Intel XEON PHI family
- Intel processors which have the ARCH_CAP_RDCL_NO bit set in the
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment