Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-19 Thread Stefan Wahren
> Jeremy Linton hat am 18. Januar 2019 um 23:22 > geschrieben: > > > On 01/18/2019 12:05 PM, Stefan Wahren wrote: > > Hi, > > > > ... > > > > a snippet or a new version would be nice > > Sure, I've got another version, to be posted soon (probably Tue of next > week). > > In the

Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-18 Thread Jeremy Linton
On 01/18/2019 12:05 PM, Stefan Wahren wrote: Hi, Jeremy Linton hat am 15. Januar 2019 um 22:21 geschrieben: Hi, On 01/15/2019 01:50 PM, Stefan Wahren wrote: Hi Jeremy, Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: Arm64 machines should be displaying a human readable

Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-18 Thread Stefan Wahren
Hi, > Jeremy Linton hat am 15. Januar 2019 um 22:21 > geschrieben: > > > Hi, > > On 01/15/2019 01:50 PM, Stefan Wahren wrote: > > Hi Jeremy, > > > >> Jeremy Linton hat am 10. Januar 2019 um 00:55 > >> geschrieben: > >> > >> > >> Arm64 machines should be displaying a human readable > >>

Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-15 Thread Jeremy Linton
Hi, On 01/15/2019 01:50 PM, Stefan Wahren wrote: Hi Jeremy, Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: Arm64 machines should be displaying a human readable vulnerability status to speculative execution attacks in /sys/devices/system/cpu/vulnerabilities This series enables

Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-15 Thread Stefan Wahren
Hi Jeremy, > Jeremy Linton hat am 10. Januar 2019 um 00:55 > geschrieben: > > > Arm64 machines should be displaying a human readable > vulnerability status to speculative execution attacks in > /sys/devices/system/cpu/vulnerabilities > > This series enables that behavior by providing the

[PATCH v3 0/7] arm64: add system vulnerability sysfs entries

2019-01-09 Thread Jeremy Linton
Arm64 machines should be displaying a human readable vulnerability status to speculative execution attacks in /sys/devices/system/cpu/vulnerabilities This series enables that behavior by providing the expected functions. Those functions expose the cpu errata and feature states, as well as