From 894eaf5184dda4f851b01d2ed6806d0b0609b321 Mon Sep 17 00:00:00 2001 From: Michael Tremer Date: Tue, 11 Jun 2019 17:07:23 +0000 Subject: [PATCH] smt: Only disable SMT when the kernel thinks it is vulnerable On virtual machines, it does not make sense to disable SMT for the virtual cores. This has to be done by the hypervisor. Signed-off-by: Michael Tremer --- src/initscripts/system/smt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/initscripts/system/smt b/src/initscripts/system/smt index f85f567fa8..f83776c1a8 100644 --- a/src/initscripts/system/smt +++ b/src/initscripts/system/smt @@ -23,7 +23,7 @@ case "${1}" in # Disable SMT when the processor is vulnerable to Foreshadow or Fallout/ZombieLoad/RIDL for vuln in l1tf mds; do if [ -r "/sys/devices/system/cpu/vulnerabilities/${vuln}" ] && \ - [ "$( /sys/devices/system/cpu/smt/control -- 2.39.2