Re: [Patch v5 09/16] x86/smt: Convert cpu_smt_control check to cpu_smt_enabled static key

From: Thomas Gleixner
Date: Mon Nov 19 2018 - 07:59:46 EST


On Mon, 19 Nov 2018, Thomas Gleixner wrote:

> Tim,
>
> On Fri, 16 Nov 2018, Tim Chen wrote:
> >
> > +static char *l1tf_show_smt_vulnerable(void)
> > +{
> > + if (static_branch_likely(&cpu_smt_enabled))
> > + return "vulnerable";
> > + else
> > + return "disabled";
>
> so an UP kernel will now report vulnerable.

Actually it will not do that because the UP build fails in the linker
stage.

arch/x86/Kconfig: select HOTPLUG_SMT if SMP

Thanks,

tglx