lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 8 Jun 2012 16:26:04 +0200 From: Stephane Eranian <eranian@...gle.com> To: Peter Zijlstra <peterz@...radead.org> Cc: Ingo Molnar <mingo@...nel.org>, linux-kernel@...r.kernel.org, andi@...stfloor.org, mingo@...e.hu, ming.m.lin@...el.com, Andreas Herrmann <andreas.herrmann3@....com>, Borislav Petkov <borislav.petkov@....com>, Dimitri Sivanich <sivanich@....com>, Dmitry Adamushko <dmitry.adamushko@...il.com> Subject: Re: [PATCH] perf/x86: check ucode before disabling PEBS on SandyBridge On Fri, Jun 8, 2012 at 4:25 PM, Peter Zijlstra <peterz@...radead.org> wrote: > On Fri, 2012-06-08 at 16:07 +0200, Stephane Eranian wrote: >> > +static const u32 snb_ucode_rev = 0x28; >> > + >> >> That needs to be a per CPU model value. It >> is not the same for SNB vs. SNB-EP. On EP >> it may even depends on stepping. > > Yeah, you said, easiest is removing the const and putting some > assignments to the thing somewhere in our model switch. > > Do you know what values for what chip we should use? > Checking on that. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists