On Mon, 19 Nov 2018, Thomas Gleixner wrote: > Tim, > > On Fri, 16 Nov 2018, Tim Chen wrote: > > > > +static char *l1tf_show_smt_vulnerable(void) > > +{ > > + if (static_branch_likely(&cpu_smt_enabled)) > > + return "vulnerable"; > > + else > > + return "disabled"; > > so an UP kernel will now report vulnerable.
Actually it will not do that because the UP build fails in the linker stage. arch/x86/Kconfig: select HOTPLUG_SMT if SMP Thanks, tglx