From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 10 Aug 2018 07:56:01 -0000 Received: from mx3-rdu2.redhat.com ([66.187.233.73] helo=mx1.redhat.com) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fo2H8-0004PD-U9 for speck@linutronix.de; Fri, 10 Aug 2018 09:56:00 +0200 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 68E298197019 for ; Fri, 10 Aug 2018 07:55:51 +0000 (UTC) Received: from [10.36.117.98] (ovpn-117-98.ams2.redhat.com [10.36.117.98]) by smtp.corp.redhat.com (Postfix) with ESMTPS id B01972166BA2 for ; Fri, 10 Aug 2018 07:55:50 +0000 (UTC) Subject: [MODERATED] Re: [PATCH] SPTE masking References: <20180809025756.GD4238@tassilo.jf.intel.com> <20180809174324.GE4238@tassilo.jf.intel.com> From: Paolo Bonzini Message-ID: <5ed402af-86dc-cc18-16e3-fe8f50178ccd@redhat.com> Date: Fri, 10 Aug 2018 09:55:49 +0200 MIME-Version: 1.0 In-Reply-To: <20180809174324.GE4238@tassilo.jf.intel.com> Content-Type: multipart/mixed; boundary="sYDZeU2uG2ZScpUW5eFysWbxhgJVpF86L"; protected-headers="v1" To: speck@linutronix.de List-ID: This is an OpenPGP/MIME encrypted message (RFC 4880 and 3156) --sYDZeU2uG2ZScpUW5eFysWbxhgJVpF86L Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 09/08/2018 19:43, speck for Andi Kleen wrote: >> But that would only apply to processors with >> MAXPHYADDR=3D52. > We don't expect those to be vulnerable to L1TF. >=20 > So patches are not needed I think. Looks like they are still needed on processors with cache-maxphyaddr =3D l1tf-maxphyaddr. Paolo --sYDZeU2uG2ZScpUW5eFysWbxhgJVpF86L--