Received: by 10.223.176.5 with SMTP id f5csp2463104wra; Sun, 28 Jan 2018 21:32:32 -0800 (PST) X-Google-Smtp-Source: AH8x227FPV3tGDgSt27zwrIPFNQsV7Ner9d/vrP9hDALIiYY02Q+1Ss8gSwsIvc7qRnT1Se+qF9s X-Received: by 10.101.100.19 with SMTP id a19mr20752254pgv.203.1517203952044; Sun, 28 Jan 2018 21:32:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517203952; cv=none; d=google.com; s=arc-20160816; b=yB8FjiL/Lle2igTOguCe3WKK/ObqiyVVRsO5f5jK67KtCgTVuomftS8b6mETYYt24c W1DZSpY04xpoKWqesse7BGkOVq+qF4JTT9L/5sIJZHW8zjDT+4RvBygQb+TmbNPCwYGp FxOWLtbWAE5b6xfukdzZ0YK8TNizRqUZ317PtWITLxNQDG5sg/5f9K5R4O2EIHTFtU+i OpcG1nlvmgTbfbZosVsh+fe1ddb1RrkMiWYikdb73hcXcnZRTlI04bjesJ8dXQOpCecb 3d15clYeY+mteVPq1MH53AblBD3eJC2P+aVX08YX/E/2wBSB+n8W1/lxm9AFNRddMx4s tXUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:organization :from:cc:references:to:arc-authentication-results; bh=UdMCBytQW420M/3Q3fRYy/1aayiT+W3Hw5dZR6BlCU8=; b=aSPd3xdJHaUOGl5uJqLRpGuAXVibkwx5hO+AcycOY5kp8ZTS01nM90FQCWQ4hnhXfs ZR/3sbXfW/8fVxGwJhyGsYM2RcF+LlJ0JOuVD/2xQhKXlSA1vwAL7KF8PnbyxPGxM+BA qV0i3ZNwYRlBN3UwGrHabz3hdMe6KAv6kASSuWwbOn9ewI9CHt+V1fU+TAxY3OSv+3SL URKXfp6oA65Ty0w7C653SI0WXhn8ISPgTv5IAeYlMgh2uCIhd/YRUIxJ5Z3zaya8NS2S g9S78woXWoyYC0Yk4uZX+M1oOVk0XKh+M4Foeq3SvpJ6EFblBX/yL8jYCe1Dme6kFHdk MIPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i13-v6si2500800plr.187.2018.01.28.21.32.17; Sun, 28 Jan 2018 21:32:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751374AbeA2FbH (ORCPT + 99 others); Mon, 29 Jan 2018 00:31:07 -0500 Received: from edison.jonmasters.org ([173.255.233.168]:47964 "EHLO edison.jonmasters.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751281AbeA2FbF (ORCPT ); Mon, 29 Jan 2018 00:31:05 -0500 Received: from 173-164-135-226-sfba.hfc.comcastbusiness.net ([173.164.135.226] helo=washington.bos.jonmasters.org) by edison.jonmasters.org with esmtpsa (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1eg21m-0008OZ-5G; Mon, 29 Jan 2018 05:30:46 +0000 To: Thomas Gleixner , LKML References: <20180107214759.387300853@linutronix.de> <20180107214913.096657732@linutronix.de> Cc: Linus Torvalds , Greg Kroah-Hartman , Ingo Molnar , Peter Zijlstra , Borislav Petkov , David Woodhouse , Dave Hansen , Will Deacon From: Jon Masters Organization: World Organi{s,z}ation Of Broken Dreams Message-ID: <12f6bdbe-3fbb-7e12-50ee-dc7b2575d9d5@jonmasters.org> Date: Mon, 29 Jan 2018 00:30:35 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.0 MIME-Version: 1.0 In-Reply-To: <20180107214913.096657732@linutronix.de> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 173.164.135.226 X-SA-Exim-Mail-From: jcm@jonmasters.org X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on edison.jonmasters.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham version=3.3.1 Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder X-SA-Exim-Version: 4.2.1 (built Sun, 08 Nov 2009 07:31:22 +0000) X-SA-Exim-Scanned: Yes (on edison.jonmasters.org) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/07/2018 04:48 PM, Thomas Gleixner wrote: > +#ifdef CONFIG_GENERIC_CPU_VULNERABILITIES > + > +ssize_t __weak cpu_show_meltdown(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + return sprintf(buf, "Not affected\n"); > +} > + > +ssize_t __weak cpu_show_spectre_v1(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + return sprintf(buf, "Not affected\n"); > +} > + > +ssize_t __weak cpu_show_spectre_v2(struct device *dev, > + struct device_attribute *attr, char *buf) > +{ > + return sprintf(buf, "Not affected\n"); > +} Just wondering aloud (after the merge) here but shouldn't the default be "unknown", at least for Spectre? It's pervasive enough. Jon.