Re: [PATCH v2 1/5] x86: Detection of Knights Landing A/D leak

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> On Oct 26, 2021, at 8:54 AM, Dave Hansen <dave.hansen@xxxxxxxxx> wrote:
> 
> On 10/21/21 5:21 AM, Nadav Amit wrote:
>> --- a/arch/x86/kernel/cpu/intel.c
>> +++ b/arch/x86/kernel/cpu/intel.c
>> @@ -296,6 +296,11 @@ static void early_init_intel(struct cpuinfo_x86 *c)
>> 		}
>> 	}
>> 
>> +	if (c->x86_model == 87) {
>> +		pr_info_once("Enabling PTE leaking workaround\n");
>> +		set_cpu_bug(c, X86_BUG_PTE_LEAK);
>> +	}
> 
> Please take a look at:
> 
> 	arch/x86/include/asm/intel-family.h
> 
> specifically:
> 
> #define INTEL_FAM6_XEON_PHI_KNL         0x57 /* Knights Landing */

Thanks, I will fix it. I really just copy pasted from Andi’s patch
(for better and worse).





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux