From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755754AbeAHGxr (ORCPT + 1 other); Mon, 8 Jan 2018 01:53:47 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:37876 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755673AbeAHGxq (ORCPT ); Mon, 8 Jan 2018 01:53:46 -0500 Date: Mon, 8 Jan 2018 07:53:49 +0100 From: Greg Kroah-Hartman To: Thomas Gleixner Cc: LKML , Linus Torvalds , Ingo Molnar , Peter Zijlstra , Borislav Petkov , David Woodhouse , Dave Hansen , Will Deacon Subject: Re: [patch V2 1/2] sysfs/cpu: Add vulnerability folder Message-ID: <20180108065349.GA12639@kroah.com> References: <20180107214759.387300853@linutronix.de> <20180107214913.096657732@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180107214913.096657732@linutronix.de> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Sun, Jan 07, 2018 at 10:48:00PM +0100, Thomas Gleixner wrote: > As the meltdown/spectre problem affects several CPU architectures, it makes > sense to have common way to express whether a system is affected by a > particular vulnerability or not. If affected the way to express the > mitigation should be common as well. > > Create /sys/devices/system/cpu/vulnerabilities folder and files for > meltdown, spectre_v1 and spectre_v2. > > Allow architectures to override the show function. > > Signed-off-by: Thomas Gleixner Thanks for the documentation update, looks good to me: Reviewed-by: Greg Kroah-Hartman