x86/speculation/mds: Add SMT warning message
authorJosh Poimboeuf <jpoimboe@redhat.com>
Tue, 2 Apr 2019 15:00:51 +0000 (10:00 -0500)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 14 May 2019 17:19:41 +0000 (19:19 +0200)
commitf8a0bbe4bac879c0caf47ca699925ab29a4a9375
treea941dc5207181cb87719f1787f27f3a1098c520f
parent98c4b3c2ee37ca65d72d23243b621006b69158fd
x86/speculation/mds: Add SMT warning message

commit 39226ef02bfb43248b7db12a4fdccb39d95318e3 upstream.

MDS is vulnerable with SMT.  Make that clear with a one-time printk
whenever SMT first gets enabled.

Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tyler Hicks <tyhicks@canonical.com>
Acked-by: Jiri Kosina <jkosina@suse.cz>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c