From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 22 Feb 2019 08:55:35 -0000 Received: from mx2.suse.de ([195.135.220.15] helo=mx1.suse.de) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1gx6cH-0000i9-Gc for speck@linutronix.de; Fri, 22 Feb 2019 09:55:34 +0100 Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id AF728AB7D for ; Fri, 22 Feb 2019 08:55:27 +0000 (UTC) Date: Fri, 22 Feb 2019 09:55:18 +0100 From: Borislav Petkov Subject: [MODERATED] Re: [patch V3 8/9] MDS basics 8 Message-ID: <20190222085518.GD30865@zn.tnic> References: <20190221234431.922117624@linutronix.de> <20190221235535.104491951@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20190221235535.104491951@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable To: speck@linutronix.de List-ID: On Fri, Feb 22, 2019 at 12:44:39AM +0100, speck for Thomas Gleixner wrote: > Subject: [patch V3 8/9] x86/speculation/mds: Add sysfs reporting for MDS > From: Thomas Gleixner >=20 > Add the sysfs reporting file for MDS. It exposes the vulnerability and > mitigation state similar to the existing files for the other speculative > hardware vulnerabilities. >=20 > Signed-off-by: Thomas Gleixner > --- > V3: Copy & Paste done right :( > --- > Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + > arch/x86/kernel/cpu/bugs.c | 20 ++++++++++++++++= ++++ > drivers/base/cpu.c | 8 ++++++++ > include/linux/cpu.h | 2 ++ > 4 files changed, 31 insertions(+) Reviewed-by: Borislav Petkov --=20 Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imend=C3=B6rffer, Jane Smithard, Graham Norton, HR= B 21284 (AG N=C3=BCrnberg) --=20