Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755308AbeAHDvd (ORCPT + 1 other); Sun, 7 Jan 2018 22:51:33 -0500 Received: from mail-io0-f172.google.com ([209.85.223.172]:45472 "EHLO mail-io0-f172.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754987AbeAHDvb (ORCPT ); Sun, 7 Jan 2018 22:51:31 -0500 X-Google-Smtp-Source: ACJfBotFs+N+kcmthdW6et8CQVyZsWrYKhOQTZyBAxh9EW3KZk/A/jUuHH+DoG/L77mNZSTD5NoTdA== Date: Sun, 7 Jan 2018 22:50:58 -0500 From: Konrad Rzeszutek Wilk To: Alexey Dobriyan Cc: tglx@linutronix.de, linux-kernel@vger.kernel.org Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder Message-ID: <20180108035056.GA6599@localhost.localdomain> References: <20180107222204.GA28038@avx2> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180107222204.GA28038@avx2> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, Jan 08, 2018 at 01:22:04AM +0300, Alexey Dobriyan wrote: > Thomas Gleixner wrote: > > Create /sys/devices/system/cpu/vulnerabilities folder and files for > > meltdown, spectre_v1 and spectre_v2. > > It is called "grep -e '^bugs' /proc/cpuinfo". > > kpti is deduceable from .config and /proc/cmdline . > If people don't know what .config they are running, god bless them. It is not just for meltdown (kpti). You also have retpoline and IBRS which is for spectre.