]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/speculation/mmio: Print SMT warning
authorJosh Poimboeuf <jpoimboe@kernel.org>
Mon, 23 May 2022 16:11:49 +0000 (09:11 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 16 Jun 2022 11:01:55 +0000 (13:01 +0200)
commit66b7fb8b6de97d02255611eb83a0a64d88f01710
tree9122fe43362d2ea69e84dece080cdb504b86dcf1
parentac87ab4460f35b5064b2b9db1be146def2941fee
x86/speculation/mmio: Print SMT warning

commit 1dc6ff02c8bf77d71b9b5d11cbc9df77cfb28626 upstream

Similar to MDS and TAA, print a warning if SMT is enabled for the MMIO
Stale Data vulnerability.

Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c