x86/speculation/mds: Fix comment
authorBoris Ostrovsky <boris.ostrovsky@oracle.com>
Fri, 12 Apr 2019 21:50:57 +0000 (17:50 -0400)
committerThomas Gleixner <tglx@linutronix.de>
Wed, 17 Apr 2019 18:59:23 +0000 (20:59 +0200)
s/L1TF/MDS/

Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tyler Hicks <tyhicks@canonical.com>
Reviewed-by: Josh Poimboeuf <jpoimboe@redhat.com>
arch/x86/kernel/cpu/bugs.c

index 22a14d4b68a2b9d92828649c6ba55ef51146bd4a..0642505dda69d67e78c8f9e04a192c97c79db5ab 100644 (file)
@@ -221,7 +221,7 @@ static void x86_amd_ssb_disable(void)
 #undef pr_fmt
 #define pr_fmt(fmt)    "MDS: " fmt
 
-/* Default mitigation for L1TF-affected CPUs */
+/* Default mitigation for MDS-affected CPUs */
 static enum mds_mitigations mds_mitigation __ro_after_init = MDS_MITIGATION_FULL;
 static bool mds_nosmt __ro_after_init = false;