[PATCH 7/8] x86/speculation: Warn about Spectre v2 LFENCE mitigation
authorJosh Poimboeuf <jpoimboe@redhat.com>
Fri, 25 Feb 2022 22:31:49 +0000 (14:31 -0800)
committerSalvatore Bonaccorso <carnil@debian.org>
Tue, 8 Mar 2022 17:47:04 +0000 (17:47 +0000)
commit7b8603c112c25de58f4af6e79b6f0fea9d3ef851
treeece1dd42f06aca93cd751f8b21700babd80a3772
parent9e1df1722cfd8447ebc80219a27cd79661f43591
[PATCH 7/8] x86/speculation: Warn about Spectre v2 LFENCE mitigation

commit eafd987d4a82c7bb5aa12f0e3b4f8f3dea93e678 upstream.

With:

  f8a66d608a3e ("x86,bugs: Unconditionally allow spectre_v2=retpoline,amd")

it became possible to enable the LFENCE "retpoline" on Intel. However,
Intel doesn't recommend it, as it has some weaknesses compared to
retpoline.

Now AMD doesn't recommend it either.

It can still be left available as a cmdline option. It's faster than
retpoline but is weaker in certain scenarios -- particularly SMT, but
even non-SMT may be vulnerable in some cases.

So just unconditionally warn if the user requests it on the cmdline.

  [ bp: Massage commit message. ]

Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Gbp-Pq: Topic bugfix/x86/bhb
Gbp-Pq: Name 0007-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch
arch/x86/kernel/cpu/bugs.c