Re: [PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Jiri Kosina
On Wed, 12 Sep 2018, Thomas Gleixner wrote: > > case X86_BUG_SPECTRE_V2: > > - return sprintf(buf, "%s%s%s%s\n", > > spectre_v2_strings[spectre_v2_enabled], > > + mutex_lock(_ctrl_mutex); > > + ret = sprintf(buf, "%s%s%s%s%s\n", > >

Re: [PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Jiri Kosina
On Wed, 12 Sep 2018, Thomas Gleixner wrote: > > case X86_BUG_SPECTRE_V2: > > - return sprintf(buf, "%s%s%s%s\n", > > spectre_v2_strings[spectre_v2_enabled], > > + mutex_lock(_ctrl_mutex); > > + ret = sprintf(buf, "%s%s%s%s%s\n", > >

Re: [PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Thomas Gleixner
On Wed, 12 Sep 2018, Jiri Kosina wrote: > case X86_BUG_SPECTRE_V2: > - return sprintf(buf, "%s%s%s%s\n", > spectre_v2_strings[spectre_v2_enabled], > + mutex_lock(_ctrl_mutex); > + ret = sprintf(buf, "%s%s%s%s%s\n", >

Re: [PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Thomas Gleixner
On Wed, 12 Sep 2018, Jiri Kosina wrote: > case X86_BUG_SPECTRE_V2: > - return sprintf(buf, "%s%s%s%s\n", > spectre_v2_strings[spectre_v2_enabled], > + mutex_lock(_ctrl_mutex); > + ret = sprintf(buf, "%s%s%s%s%s\n", >

[PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Jiri Kosina
From: Jiri Kosina STIBP is a feature provided by certain Intel ucodes / CPUs. This feature (once enabled) prevents cross-hyperthread control of decisions made by indirect branch predictors. Enable this feature if - the CPU is vulnerable to spectre v2 - the CPU supports SMT and has SMT siblings

[PATCH v6 2/3] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2018-09-12 Thread Jiri Kosina
From: Jiri Kosina STIBP is a feature provided by certain Intel ucodes / CPUs. This feature (once enabled) prevents cross-hyperthread control of decisions made by indirect branch predictors. Enable this feature if - the CPU is vulnerable to spectre v2 - the CPU supports SMT and has SMT siblings