summaryrefslogtreecommitdiffstats
path: root/Documentation/admin-guide/hw-vuln
diff options
context:
space:
mode:
authorKim Phillips <kim.phillips@amd.com>2022-02-28 18:23:15 +0100
committerBorislav Petkov <bp@suse.de>2022-02-28 18:37:08 +0100
commit244d00b5dd4755f8df892c86cab35fb2cfd4f14b (patch)
tree72eb087e1e58cc99734ce51e1fb022717eb3a129 /Documentation/admin-guide/hw-vuln
parentx86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re... (diff)
downloadlinux-244d00b5dd4755f8df892c86cab35fb2cfd4f14b.tar.xz
linux-244d00b5dd4755f8df892c86cab35fb2cfd4f14b.zip
x86/speculation: Use generic retpoline by default on AMD
AMD retpoline may be susceptible to speculation. The speculation execution window for an incorrect indirect branch prediction using LFENCE/JMP sequence may potentially be large enough to allow exploitation using Spectre V2. By default, don't use retpoline,lfence on AMD. Instead, use the generic retpoline. Signed-off-by: Kim Phillips <kim.phillips@amd.com> Signed-off-by: Borislav Petkov <bp@suse.de>
Diffstat (limited to 'Documentation/admin-guide/hw-vuln')
0 files changed, 0 insertions, 0 deletions