From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (146.0.238.70:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 20 Feb 2019 16:46:54 -0000 Received: from mail.kernel.org ([198.145.29.99]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1gwV1I-0000sF-RG for speck@linutronix.de; Wed, 20 Feb 2019 17:46:53 +0100 Date: Wed, 20 Feb 2019 17:46:43 +0100 From: Greg KH Subject: [MODERATED] Re: [patch V2 01/10] MDS basics+ 1 Message-ID: <20190220164643.GA4648@kroah.com> References: <20190220150753.665964899@linutronix.de> <20190220151400.026283215@linutronix.de> MIME-Version: 1.0 In-Reply-To: <20190220151400.026283215@linutronix.de> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Wed, Feb 20, 2019 at 04:07:54PM +0100, speck for Thomas Gleixner wrote: > --- a/arch/x86/include/asm/msr-index.h > +++ b/arch/x86/include/asm/msr-index.h > @@ -77,6 +77,11 @@ > * attack, so no Speculative Store Bypass > * control required. > */ > +#define ARCH_CAP_MDS_NO (1 << 5) /* > + * Not susceptible to > + * Microarchitectural Data > + * Sampling (MDS) vulnerabilities. > + */ Nit, maybe BIT(5)? I know the others in this list are not using BIT, but other parts of this file are. Anyway, not a big deal: Reviewed-by: Greg Kroah-Hartman