|
@@ -832,13 +832,14 @@ static ssize_t l1tf_show_state(char *buf)
|
|
|
|
|
|
if (l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_EPT_DISABLED ||
|
|
if (l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_EPT_DISABLED ||
|
|
(l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_NEVER &&
|
|
(l1tf_vmx_mitigation == VMENTER_L1D_FLUSH_NEVER &&
|
|
- cpu_smt_control == CPU_SMT_ENABLED))
|
|
|
|
|
|
+ sched_smt_active())) {
|
|
return sprintf(buf, "%s; VMX: %s\n", L1TF_DEFAULT_MSG,
|
|
return sprintf(buf, "%s; VMX: %s\n", L1TF_DEFAULT_MSG,
|
|
l1tf_vmx_states[l1tf_vmx_mitigation]);
|
|
l1tf_vmx_states[l1tf_vmx_mitigation]);
|
|
|
|
+ }
|
|
|
|
|
|
return sprintf(buf, "%s; VMX: %s, SMT %s\n", L1TF_DEFAULT_MSG,
|
|
return sprintf(buf, "%s; VMX: %s, SMT %s\n", L1TF_DEFAULT_MSG,
|
|
l1tf_vmx_states[l1tf_vmx_mitigation],
|
|
l1tf_vmx_states[l1tf_vmx_mitigation],
|
|
- cpu_smt_control == CPU_SMT_ENABLED ? "vulnerable" : "disabled");
|
|
|
|
|
|
+ sched_smt_active() ? "vulnerable" : "disabled");
|
|
}
|
|
}
|
|
#else
|
|
#else
|
|
static ssize_t l1tf_show_state(char *buf)
|
|
static ssize_t l1tf_show_state(char *buf)
|