x86/bugs: Clean up SRSO microcode handling
authorDavid Kaplan <david.kaplan@amd.com>
Wed, 25 Jun 2025 15:58:05 +0000 (10:58 -0500)
committerBorislav Petkov (AMD) <bp@alien8.de>
Thu, 26 Jun 2025 11:32:31 +0000 (13:32 +0200)
commit98b5dab4d22181c931f2bf63c060416badbb49ab
tree8837530b7a6d4f0c0286f50a55b476a7ae7b7eea
parentff54ae7314962699749869a3475da7a702ae991a
x86/bugs: Clean up SRSO microcode handling

SRSO microcode only exists for Zen3/Zen4 CPUs.  For those CPUs, the microcode
is required for any mitigation other than Safe-RET to be effective.  Safe-RET
can still protect user->kernel and guest->host attacks without microcode.

Clarify this in the code and ensure that SRSO_MITIGATION_UCODE_NEEDED is
selected for any mitigation besides Safe-RET if the required microcode isn't
present.

Signed-off-by: David Kaplan <david.kaplan@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Link: https://lore.kernel.org/20250625155805.600376-4-david.kaplan@amd.com
arch/x86/kernel/cpu/bugs.c