On Mon, 3 Sep 2018, Peter Zijlstra wrote:
> On Mon, Sep 03, 2018 at 04:34:44PM +0200, Peter Zijlstra wrote:
> > On Mon, Sep 03, 2018 at 02:45:31PM +0200, Jiri Kosina wrote:
> >
> > > +static bool __init stibp_needed(void)
> > > +{
> > > + return (cpu_smt_control != CPU_SMT_NOT_SUPPORTED &&
> > > +
On Mon, Sep 03, 2018 at 04:34:44PM +0200, Peter Zijlstra wrote:
> On Mon, Sep 03, 2018 at 02:45:31PM +0200, Jiri Kosina wrote:
>
> > +static bool __init stibp_needed(void)
> > +{
> > + return (cpu_smt_control != CPU_SMT_NOT_SUPPORTED &&
> > + boot_cpu_has(X86_FEATURE_STIBP));
>
On Mon, Sep 03, 2018 at 02:45:31PM +0200, Jiri Kosina wrote:
> +static bool __init stibp_needed(void)
> +{
> + return (cpu_smt_control != CPU_SMT_NOT_SUPPORTED &&
> + boot_cpu_has(X86_FEATURE_STIBP));
> +}
Should that not be:
((cpu_smt_control != CPU_SMT_NOT_SUPPO
From: Jiri Kosina
STIBP is a feature provided by certain Intel ucodes / CPUs. This feature
(once enabled) prevents cross-hyperthread control of decisions made by
indirect branch predictors.
Enable this feature if
- the CPU is vulnerable to spectre v2
- the CPU supports SMT
- spectre_v2 mitigati
4 matches
Mail list logo