From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755805AbeAHGyO (ORCPT + 1 other); Mon, 8 Jan 2018 01:54:14 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:37954 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755788AbeAHGyN (ORCPT ); Mon, 8 Jan 2018 01:54:13 -0500 Date: Mon, 8 Jan 2018 07:54:16 +0100 From: Greg Kroah-Hartman To: Thomas Gleixner Cc: LKML , Linus Torvalds , Ingo Molnar , Peter Zijlstra , Borislav Petkov , David Woodhouse , Dave Hansen , Will Deacon Subject: Re: [patch V2 2/2] x86/cpu: Implement CPU vulnerabilites sysfs functions Message-ID: <20180108065416.GB12639@kroah.com> References: <20180107214759.387300853@linutronix.de> <20180107214913.177414879@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180107214913.177414879@linutronix.de> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Sun, Jan 07, 2018 at 10:48:01PM +0100, Thomas Gleixner wrote: > Implement the CPU vulnerabilty show functions for meltdown, spectre_v1 and > spectre_v2. > > Signed-off-by: Thomas Gleixner > --- > arch/x86/Kconfig | 1 + > arch/x86/kernel/cpu/bugs.c | 29 +++++++++++++++++++++++++++++ > 2 files changed, 30 insertions(+) Reviewed-by: Greg Kroah-Hartman