From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 06 Mar 2019 19:34:40 -0000 Received: from mx2.suse.de ([195.135.220.15] helo=mx1.suse.de) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1h1cJK-0003c2-Mg for speck@linutronix.de; Wed, 06 Mar 2019 20:34:39 +0100 Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 57EF5B762 for ; Wed, 6 Mar 2019 19:34:33 +0000 (UTC) Date: Wed, 6 Mar 2019 20:34:30 +0100 From: Borislav Petkov Subject: [MODERATED] Re: Re: [patch V6 10/14] MDS basics 10 Message-ID: <20190306193430.GH21338@zn.tnic> References: <20190301214738.281554861@linutronix.de> <20190301214848.075448450@linutronix.de> <20190306143122.GF21338@zn.tnic> MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable To: speck@linutronix.de List-ID: On Wed, Mar 06, 2019 at 07:35:26PM +0100, speck for Thomas Gleixner wrote: > Following up on our conversation on IRC, I've reworded the comment: >=20 > /* > * Enable the idle clearing if SMT is active on CPUs which are > * affected only by MSBDS and not any other MDS variant. > * > * The other variants cannot be mitigated when SMT is enabled, so > * clearing the buffers on idle just to prevent the Store Buffer > * repartitioning leak would be a window dressing exercise. > */ > if (!boot_cpu_has_bug(X86_BUG_MSBDS_ONLY)) > return; Yap, looks good. With that addressed: Reviewed-by: Borislav Petkov --=20 Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imend=C3=B6rffer, Jane Smithard, Graham Norton, HR= B 21284 (AG N=C3=BCrnberg) --=20