Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755440AbeAHFfT (ORCPT + 1 other); Mon, 8 Jan 2018 00:35:19 -0500 Received: from mail-wm0-f66.google.com ([74.125.82.66]:47075 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754579AbeAHFfS (ORCPT ); Mon, 8 Jan 2018 00:35:18 -0500 X-Google-Smtp-Source: ACJfBoszMigEICYkfXCKwzOW6eDe4WBgCM8iImw4SPZSitXFu6awkzlFxxD0q/6wMNcGTBYqqdSR1A== Date: Mon, 8 Jan 2018 08:35:14 +0300 From: Alexey Dobriyan To: Konrad Rzeszutek Wilk Cc: tglx@linutronix.de, linux-kernel@vger.kernel.org Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder Message-ID: <20180108053514.GA2408@avx2> References: <20180107222204.GA28038@avx2> <20180108035056.GA6599@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180108035056.GA6599@localhost.localdomain> User-Agent: Mutt/1.7.2 (2016-11-26) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Sun, Jan 07, 2018 at 10:50:58PM -0500, Konrad Rzeszutek Wilk wrote: > On Mon, Jan 08, 2018 at 01:22:04AM +0300, Alexey Dobriyan wrote: > > Thomas Gleixner wrote: > > > Create /sys/devices/system/cpu/vulnerabilities folder and files for > > > meltdown, spectre_v1 and spectre_v2. > > > > It is called "grep -e '^bugs' /proc/cpuinfo". > > > > kpti is deduceable from .config and /proc/cmdline . > > If people don't know what .config they are running, god bless them. > > It is not just for meltdown (kpti). You also have retpoline and IBRS > which is for spectre. If you, as kernel developer, are sure that bug is properly mitigated to the best of your knowledge then clear the bit from the bug mask.