From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 27 Feb 2019 16:34:15 -0000 Received: from mail.kernel.org ([198.145.29.99]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1gz29t-0004BI-B2 for speck@linutronix.de; Wed, 27 Feb 2019 17:34:13 +0100 Date: Wed, 27 Feb 2019 17:34:04 +0100 From: Greg KH Subject: [MODERATED] Re: [patch V5 03/14] MDS basics 3 Message-ID: <20190227163404.GA24461@kroah.com> References: <20190227150939.605235753@linutronix.de> <20190227152037.276549415@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20190227152037.276549415@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Wed, Feb 27, 2019 at 04:09:42PM +0100, speck for Thomas Gleixner wrote: > Subject: [patch V5 03/14] x86/speculation: Consolidate CPU whitelists > From: Thomas Gleixner > > The CPU vulnerability whitelists have some overlap and there are more > whitelists coming along. > > Use the driver_data field in the x86_cpu_id struct to denote the > whitelisted vulnerabilities and combine all whitelists into one. > > Suggested-by: Linus Torvalds > Signed-off-by: Thomas Gleixner So much nicer and sane: Reviewed-by: Greg Kroah-Hartman