x86/speculation/mmio: Print SMT warning
authorJosh Poimboeuf <jpoimboe@kernel.org>
Mon, 23 May 2022 16:11:49 +0000 (09:11 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 16 Jun 2022 11:30:34 +0000 (13:30 +0200)
commit147ae04a7c52e8cec0b81b1057c13fc29dab143a
treeb6460a20a9752e4e7404af8f491be7aa4b91a5d2
parent59d665a709b0446957261e8875ac9f7eb1bb1e96
x86/speculation/mmio: Print SMT warning

commit 1dc6ff02c8bf77d71b9b5d11cbc9df77cfb28626 upstream

Similar to MDS and TAA, print a warning if SMT is enabled for the MMIO
Stale Data vulnerability.

Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c