File tree Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -2428,8 +2428,7 @@ static void __init srso_select_mitigation(void)
2428
2428
* Zen1/2 with SMT off aren't vulnerable after the right
2429
2429
* IBPB microcode has been applied.
2430
2430
*/
2431
- if ((boot_cpu_data .x86 < 0x19 ) &&
2432
- (!cpu_smt_possible () || (cpu_smt_control == CPU_SMT_DISABLED ))) {
2431
+ if (boot_cpu_data .x86 < 0x19 && !cpu_smt_possible ()) {
2433
2432
setup_force_cpu_cap (X86_FEATURE_SRSO_NO );
2434
2433
return ;
2435
2434
}
@@ -2714,7 +2713,7 @@ static ssize_t retbleed_show_state(char *buf)
2714
2713
static ssize_t srso_show_state (char * buf )
2715
2714
{
2716
2715
if (boot_cpu_has (X86_FEATURE_SRSO_NO ))
2717
- return sysfs_emit (buf , "Not affected \n" );
2716
+ return sysfs_emit (buf , "Mitigation: SMT disabled \n" );
2718
2717
2719
2718
return sysfs_emit (buf , "%s%s\n" ,
2720
2719
srso_strings [srso_mitigation ],
You can’t perform that action at this time.
0 commit comments