diff options
| -rw-r--r-- | arch/x86/kernel/cpu/bugs.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c index cb4a16292aa7..4c2313d0b9ca 100644 --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c | |||
| @@ -702,6 +702,10 @@ static void __init l1tf_select_mitigation(void) | |||
| 702 | half_pa = (u64)l1tf_pfn_limit() << PAGE_SHIFT; | 702 | half_pa = (u64)l1tf_pfn_limit() << PAGE_SHIFT; |
| 703 | if (e820__mapped_any(half_pa, ULLONG_MAX - half_pa, E820_TYPE_RAM)) { | 703 | if (e820__mapped_any(half_pa, ULLONG_MAX - half_pa, E820_TYPE_RAM)) { |
| 704 | pr_warn("System has more than MAX_PA/2 memory. L1TF mitigation not effective.\n"); | 704 | pr_warn("System has more than MAX_PA/2 memory. L1TF mitigation not effective.\n"); |
| 705 | pr_info("You may make it effective by booting the kernel with mem=%llu parameter.\n", | ||
| 706 | half_pa); | ||
| 707 | pr_info("However, doing so will make a part of your RAM unusable.\n"); | ||
| 708 | pr_info("Reading https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html might help you decide.\n"); | ||
| 705 | return; | 709 | return; |
| 706 | } | 710 | } |
| 707 | 711 | ||
