From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AB6ACC43387 for ; Mon, 14 Jan 2019 12:06:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 7475820656 for ; Mon, 14 Jan 2019 12:06:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547467589; bh=vw9kAyvHrJa64WNZawjOysthiQ+GVDbMsu/EC4gJ6BI=; h=Date:From:To:cc:Subject:In-Reply-To:References:List-ID:From; b=FkugPuUsz0bss/jJp+A7zOoUP7j3iuqVShgAaAjBtqDGmq6GKL1tjjY+9N/nfvRVZ YNOSR4mAUgxM8ndelpjLJjaU1+Z2UW7tAg4j+yLv24jm6j+BvfbPOX7iHsy4ozIF45 ZGcWXPLOGMrvcsPhKkR1YA6rJeyJnNOGT+qevhSw= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726436AbfANMG3 (ORCPT ); Mon, 14 Jan 2019 07:06:29 -0500 Received: from mx2.suse.de ([195.135.220.15]:57798 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726414AbfANMG2 (ORCPT ); Mon, 14 Jan 2019 07:06:28 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 1F69EACE8; Mon, 14 Jan 2019 12:06:27 +0000 (UTC) Date: Mon, 14 Jan 2019 13:06:24 +0100 (CET) From: Jiri Kosina To: Pavel Machek cc: Tim Chen , Jonathan Corbet , Thomas Gleixner , Linus Torvalds , Tom Lendacky , Ingo Molnar , Peter Zijlstra , Josh Poimboeuf , Andrea Arcangeli , David Woodhouse , Andi Kleen , Dave Hansen , Asit Mallick , Arjan van de Ven , Jon Masters , Waiman Long , Greg KH , Borislav Petkov , linux-kernel@vger.kernel.org, x86@kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] x86/speculation: Add document to describe Spectre and its mitigations In-Reply-To: <20190114120157.GB21544@amd> Message-ID: References: <64efec3fda40c0758601bf9b1480a35d76d3c487.1545413988.git.tim.c.chen@linux.intel.com> <20181228103437.4c03c181@lwn.net> <20190113231001.GB18710@amd> <20190114120157.GB21544@amd> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Mon, 14 Jan 2019, Pavel Machek wrote: > > > That one really is Intel-specific (not even all x86s are affectd). Same > > > for Meltdown. > > > > At least for Meltdown, your claim is simply not correct. > > You are right, there may be few ARM chips affected by meltdown. And some of the powerpc64s as well. -- Jiri Kosina SUSE Labs