x86/speculation: Make all RETbleed mitigations depend on X86_64
authorBen Hutchings <ben@decadent.org.uk>
Sat, 23 Jul 2022 14:20:34 +0000 (16:20 +0200)
committerBen Hutchings <benh@debian.org>
Sat, 23 Jul 2022 16:29:57 +0000 (17:29 +0100)
commit75ef10376805696dba525866d0339172a75925f0
treecc96ea8216218d4378a3badfdf6cf4564ecbcba6
parentc7b2a462afa7f68d006c30a0e085c4d4ee6b6aef
x86/speculation: Make all RETbleed mitigations depend on X86_64

Forwarded: https://lore.kernel.org/lkml/YtwSR3NNsWp1ohfV@decadent.org.uk/T/

The mitigations for RETBleed are currently ineffective on x86_32 since
entry_32.S does not use the required macros.  However, for an x86_32
target, the kconfig symbols for them are still enabled by default and
/sys/devices/system/cpu/vulnerabilities/retbleed will wrongly report
that mitigations are in place.

Make all of these symbols depend on X86_64, and only enable RETHUNK by
default on X86_64.

Cc: stable@vger.kernel.org
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Gbp-Pq: Topic bugfix/x86
Gbp-Pq: Name x86-speculation-make-all-retbleed-mitigations-depend.patch
arch/x86/Kconfig