On Mon, 19 Nov 2018, Thomas Gleixner wrote:

> Tim,
> 
> On Fri, 16 Nov 2018, Tim Chen wrote:
> >  
> > +static char *l1tf_show_smt_vulnerable(void)
> > +{
> > +   if (static_branch_likely(&cpu_smt_enabled))
> > +           return "vulnerable";
> > +   else
> > +           return "disabled";
> 
> so an UP kernel will now report vulnerable.

Actually it will not do that because the UP build fails in the linker
stage.

arch/x86/Kconfig:       select HOTPLUG_SMT                      if SMP

Thanks,

        tglx

Reply via email to