Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754745AbeAGWWJ (ORCPT + 1 other); Sun, 7 Jan 2018 17:22:09 -0500 Received: from mail-wm0-f46.google.com ([74.125.82.46]:32780 "EHLO mail-wm0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754703AbeAGWWI (ORCPT ); Sun, 7 Jan 2018 17:22:08 -0500 X-Google-Smtp-Source: ACJfBotp9Jrj9cVogMvkwm+13VRFA5PDl4FVz8A5UOYmecRTYFbE75HZ3l3v5/eVzLa9nr+mYqe44Q== Date: Mon, 8 Jan 2018 01:22:04 +0300 From: Alexey Dobriyan To: tglx@linutronix.de Cc: linux-kernel@vger.kernel.org Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder Message-ID: <20180107222204.GA28038@avx2> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.7.2 (2016-11-26) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: Thomas Gleixner wrote: > Create /sys/devices/system/cpu/vulnerabilities folder and files for > meltdown, spectre_v1 and spectre_v2. It is called "grep -e '^bugs' /proc/cpuinfo". kpti is deduceable from .config and /proc/cmdline . If people don't know what .config they are running, god bless them.