diff options
author | Kim Phillips <kim.phillips@amd.com> | 2022-02-28 18:23:15 +0100 |
---|---|---|
committer | Borislav Petkov <bp@suse.de> | 2022-02-28 18:37:08 +0100 |
commit | 244d00b5dd4755f8df892c86cab35fb2cfd4f14b (patch) | |
tree | 72eb087e1e58cc99734ce51e1fb022717eb3a129 /Documentation/admin-guide/hw-vuln | |
parent | x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re... (diff) | |
download | linux-244d00b5dd4755f8df892c86cab35fb2cfd4f14b.tar.xz linux-244d00b5dd4755f8df892c86cab35fb2cfd4f14b.zip |
x86/speculation: Use generic retpoline by default on AMD
AMD retpoline may be susceptible to speculation. The speculation
execution window for an incorrect indirect branch prediction using
LFENCE/JMP sequence may potentially be large enough to allow
exploitation using Spectre V2.
By default, don't use retpoline,lfence on AMD. Instead, use the
generic retpoline.
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Diffstat (limited to 'Documentation/admin-guide/hw-vuln')
0 files changed, 0 insertions, 0 deletions