Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756290AbeAHJgw (ORCPT + 1 other); Mon, 8 Jan 2018 04:36:52 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:48938 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756019AbeAHJgu (ORCPT ); Mon, 8 Jan 2018 04:36:50 -0500 Date: Mon, 8 Jan 2018 10:36:48 +0100 (CET) From: Thomas Gleixner To: Alexey Dobriyan cc: Konrad Rzeszutek Wilk , linux-kernel@vger.kernel.org Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder In-Reply-To: <20180108053514.GA2408@avx2> Message-ID: References: <20180107222204.GA28038@avx2> <20180108035056.GA6599@localhost.localdomain> <20180108053514.GA2408@avx2> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, 8 Jan 2018, Alexey Dobriyan wrote: > On Sun, Jan 07, 2018 at 10:50:58PM -0500, Konrad Rzeszutek Wilk wrote: > > On Mon, Jan 08, 2018 at 01:22:04AM +0300, Alexey Dobriyan wrote: > > > Thomas Gleixner wrote: > > > > Create /sys/devices/system/cpu/vulnerabilities folder and files for > > > > meltdown, spectre_v1 and spectre_v2. > > > > > > It is called "grep -e '^bugs' /proc/cpuinfo". > > > > > > kpti is deduceable from .config and /proc/cmdline . > > > If people don't know what .config they are running, god bless them. > > > > It is not just for meltdown (kpti). You also have retpoline and IBRS > > which is for spectre. > > If you, as kernel developer, are sure that bug is properly mitigated > to the best of your knowledge then clear the bit from the bug mask. Nope. The CPU is still buggy and does not become less so because we set a mitigation into effect. Thanks, tglx