[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C1C2579D7BE026428F81F41198ADB17237A866F9@irsmsx110.ger.corp.intel.com>
Date: Wed, 15 Jun 2016 13:12:13 +0000
From: "Anaczkowski, Lukasz" <lukasz.anaczkowski@...el.com>
To: Borislav Petkov <bp@...en8.de>
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-mm@...ck.org" <linux-mm@...ck.org>,
"tglx@...utronix.de" <tglx@...utronix.de>,
"mingo@...hat.com" <mingo@...hat.com>,
"dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>,
"ak@...ux.intel.com" <ak@...ux.intel.com>,
"kirill.shutemov@...ux.intel.com" <kirill.shutemov@...ux.intel.com>,
"mhocko@...e.com" <mhocko@...e.com>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
"hpa@...or.com" <hpa@...or.com>,
"Srinivasappa, Harish" <harish.srinivasappa@...el.com>,
"Odzioba, Lukasz" <lukasz.odzioba@...el.com>,
"Andrejczuk, Grzegorz" <grzegorz.andrejczuk@...el.com>,
"Daniluk, Lukasz" <lukasz.daniluk@...el.com>
Subject: RE: [PATCH v2] Linux VM workaround for Knights Landing A/D leak
From: Borislav Petkov [mailto:bp@...en8.de]
Sent: Tuesday, June 14, 2016 8:10 PM
>> + if (boot_cpu_has_bug(X86_BUG_PTE_LEAK))
>
> static_cpu_has_bug()
>> + if (c->x86_model == 87) {
>
> That should be INTEL_FAM6_XEON_PHI_KNL, AFAICT.
>> + static bool printed;
>> +
>> + if (!printed) {
>> + pr_info("Enabling PTE leaking workaround\n");
>> + printed = true;
>> + }
>
> pr_info_once
Thanks, Boris! This is very valuable. I'll address those comments in next version of the patch.
Cheers,
Lukasz
Powered by blists - more mailing lists