On Wed, 12 Sep 2018, Thomas Gleixner wrote:
> > case X86_BUG_SPECTRE_V2:
> > - return sprintf(buf, "%s%s%s%s\n",
> > spectre_v2_strings[spectre_v2_enabled],
> > + mutex_lock(&spec_ctrl_mutex);
> > + ret = sprintf(buf, "%s%s%s%s%s\n",
> > spectre_v2_strings[spect
On Wed, 12 Sep 2018, Jiri Kosina wrote:
> case X86_BUG_SPECTRE_V2:
> - return sprintf(buf, "%s%s%s%s\n",
> spectre_v2_strings[spectre_v2_enabled],
> + mutex_lock(&spec_ctrl_mutex);
> + ret = sprintf(buf, "%s%s%s%s%s\n",
> spectre_v2_strings[spectre_v2_ena
From: Jiri Kosina
STIBP is a feature provided by certain Intel ucodes / CPUs. This feature
(once enabled) prevents cross-hyperthread control of decisions made by
indirect branch predictors.
Enable this feature if
- the CPU is vulnerable to spectre v2
- the CPU supports SMT and has SMT siblings
3 matches
Mail list logo