x86/srso: Correct the mitigation status when SMT is disabled
authorBorislav Petkov (AMD) <bp@alien8.de>
Tue, 15 Aug 2023 09:53:13 +0000 (11:53 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 26 Aug 2023 11:27:01 +0000 (13:27 +0200)
commit7487244912b13a918812b8f830e6a0dde269fdeb
tree7ea0701cfe670695dd97830cb73799c5db3e19f6
parent4da4aae04b7f3d5ba4345a75f92de00a54644f11
x86/srso: Correct the mitigation status when SMT is disabled

commit 6405b72e8d17bd1875a56ae52d23ec3cd51b9d66 upstream.

Specify how is SRSO mitigated when SMT is disabled. Also, correct the
SMT check for that.

Fixes: e9fbc47b818b ("x86/srso: Disable the mitigation on unaffected configurations")
Suggested-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Acked-by: Josh Poimboeuf <jpoimboe@kernel.org>
Link: https://lore.kernel.org/r/20230814200813.p5czl47zssuej7nv@treble
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c