On Wed, Feb 26, 2025 at 06:45:40PM +0000, Patrick Bellasi wrote: > + > + case SRSO_CMD_BP_SPEC_REDUCE: > + if (boot_cpu_has(X86_FEATURE_SRSO_BP_SPEC_REDUCE)) { > +bp_spec_reduce: > + pr_notice("Reducing speculation to address VM/HV SRSO attack vector.\n"); Probably not needed anymore as that will be in srso_strings which is issued later. > + srso_mitigation = SRSO_MITIGATION_BP_SPEC_REDUCE; > + break; > + } else { > + srso_mitigation = SRSO_MITIGATION_BP_SPEC_REDUCE_NA; > + pr_warn("BP_SPEC_REDUCE not supported!\n"); > + } This is the part I'm worried about: user hears somewhere "bp-spec-reduce" is faster, sets it but doesn't know whether the hw even supports it. Machine boots, warns which is a single line and waaay buried in dmesg and continues unmitigated. So *maybe* we can make this a lot more subtle and say: srso=__dont_fall_back_to_ibpb_on_vmexit_if_bp_spec_reduce__ (joking about the name but that should be the gist of what it means) and then act accordingly when that is specified along with a big fat: WARN_ON(..."You should not use this as a mitigation option if you don't know what you're doing") along with a big fat splat in dmesg. Hmmm...? -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette