x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
authorPeter Zijlstra <peterz@infradead.org>
Tue, 14 Jun 2022 21:15:56 +0000 (23:15 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 23 Jul 2022 10:54:03 +0000 (12:54 +0200)
commitb9349805e65380c3de8fff90a05472e131ce96f8
treea5d9b673ceaf989ef0ec19adcc067993f3e0caba
parent347d0bf6b0c020ca0284b3fd96652470e06bd084
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()

commit 166115c08a9b0b846b783088808a27d739be6e8d upstream.

retbleed will depend on spectre_v2, while spectre_v2_user depends on
retbleed. Break this cycle.

Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/x86/kernel/cpu/bugs.c