[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1515348986.29312.325.camel@amazon.co.uk>
Date: Sun, 7 Jan 2018 18:16:26 +0000
From: "Woodhouse, David" <dwmw@...zon.co.uk>
To: Ivan Ivanov <qmastery16@...il.com>, <kah.listaddress@...il.com>,
"Dave Hansen" <dave.hansen@...el.com>,
Thomas Gleixner <tglx@...utronix.de>,
"Jon Masters" <jcm@...hat.com>,
Paolo Bonzini <pbonzini@...hat.com>,
Alan Cox <gnomes@...rguk.ukuu.org.uk>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Andi Kleen <andi@...stfloor.org>,
Greg Kroah-Hartman <gregkh@...ux-foundation.org>,
Tim Chen <tim.c.chen@...ux.intel.com>,
"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>,
Jeff Law <law@...hat.com>, Nick Clifton <nickc@...hat.com>,
<bp@...en8.de>
Subject: Re: Avoid speculative indirect calls in kernel
On Sun, 2018-01-07 at 21:01 +0300, Ivan Ivanov wrote:
> Make sure that your patches do not affect AMD CPU,
> because they are unaffected by Meltdown vulnerability
> for which this "30% slowdown Intel patch" is required
These patches *do* affect AMD CPUs, because they address one of the
issues for which AMD CPUs are also vulnerable.
Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5210 bytes)
Powered by blists - more mailing lists