diff options
author | Konrad Rzeszutek Wilk <[email protected]> | 2019-04-12 17:50:58 -0400 |
---|---|---|
committer | Thomas Gleixner <[email protected]> | 2019-04-17 20:59:23 +0200 |
commit | e2c3c94788b08891dcf3dbe608f9880523ecd71b (patch) | |
tree | e79e7576aa0ee562943ab11f9a678062af20fb15 /tools/perf/scripts/python/exported-sql-viewer.py | |
parent | cae5ec342645746d617dd420d206e1588d47768a (diff) |
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
This code is only for CPUs which are affected by MSBDS, but are *not*
affected by the other two MDS issues.
For such CPUs, enabling the mds_idle_clear mitigation is enough to
mitigate SMT.
However if user boots with 'mds=off' and still has SMT enabled, we should
not report that SMT is mitigated:
$cat /sys//devices/system/cpu/vulnerabilities/mds
Vulnerable; SMT mitigated
But rather:
Vulnerable; SMT vulnerable
Signed-off-by: Konrad Rzeszutek Wilk <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Reviewed-by: Tyler Hicks <[email protected]>
Reviewed-by: Josh Poimboeuf <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions