From: Boris Ostrovsky Date: Fri, 12 Apr 2019 21:50:57 +0000 (-0400) Subject: x86/speculation/mds: Fix comment X-Git-Tag: v4.1.12-124.31.3~177 X-Git-Url: https://www.infradead.org/git/?a=commitdiff_plain;h=c3d0b7a58980308a3239e00c9ecf2fd259894e93;p=users%2Fjedix%2Flinux-maple.git x86/speculation/mds: Fix comment commit cae5ec342645746d617dd420d206e1588d47768a upstream s/L1TF/MDS/ Signed-off-by: Boris Ostrovsky Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Thomas Gleixner Reviewed-by: Tyler Hicks Reviewed-by: Josh Poimboeuf (cherry picked from commit 9a5f1b636984bcf0a8495208e0fc9f30e2ec8359) Orabug: 29526900 CVE: CVE-2018-12126 CVE: CVE-2018-12130 CVE: CVE-2018-12127 Signed-off-by: Mihai Carabas Reviewed-by: Boris Ostrovsky Conflicts: arch/x86/kernel/cpu/bugs.c bugs.c vs bugs_64.c on UEK4 --- diff --git a/arch/x86/kernel/cpu/bugs_64.c b/arch/x86/kernel/cpu/bugs_64.c index b6181ab47a44..2886aa744ea6 100644 --- a/arch/x86/kernel/cpu/bugs_64.c +++ b/arch/x86/kernel/cpu/bugs_64.c @@ -1283,7 +1283,7 @@ static void __init l1tf_select_mitigation(void) setup_force_cpu_cap(X86_FEATURE_L1TF_PTEINV); } -/* Default mitigation for L1TF-affected CPUs */ +/* Default mitigation for MDS-affected CPUs */ static enum mds_mitigations mds_mitigation __read_mostly = MDS_MITIGATION_FULL; static bool mds_nosmt = false;