diff options
| author | Suleiman Souhlal <suleiman@google.com> | 2022-11-17 18:19:19 +0900 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-11-23 07:53:43 +0100 |
| commit | 67b137bf0d9d096f86c8bfa175ca5ab3629369c9 (patch) | |
| tree | 7a6a5b39a16bd84392b22deb53819748c1e5fc89 /Documentation | |
| parent | d419ec8ec760fc3c6edc8775a3ab19da4e83dbea (diff) | |
| download | linux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.tar.gz linux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.tar.bz2 linux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.zip | |
Revert "x86/speculation: Add RSB VM Exit protections"
This reverts commit b6c5011934a15762cd694e36fe74f2f2f93eac9b.
In order to apply IBRS mitigation for Retbleed, PBRSB mitigations must be
reverted and the reapplied, so the backports can look sane.
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Signed-off-by: Suleiman Souhlal <suleiman@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation')
| -rw-r--r-- | Documentation/admin-guide/hw-vuln/spectre.rst | 8 |
1 files changed, 0 insertions, 8 deletions
diff --git a/Documentation/admin-guide/hw-vuln/spectre.rst b/Documentation/admin-guide/hw-vuln/spectre.rst index 7e061ed449aa..6bd97cd50d62 100644 --- a/Documentation/admin-guide/hw-vuln/spectre.rst +++ b/Documentation/admin-guide/hw-vuln/spectre.rst @@ -422,14 +422,6 @@ The possible values in this file are: 'RSB filling' Protection of RSB on context switch enabled ============= =========================================== - - EIBRS Post-barrier Return Stack Buffer (PBRSB) protection status: - - =========================== ======================================================= - 'PBRSB-eIBRS: SW sequence' CPU is affected and protection of RSB on VMEXIT enabled - 'PBRSB-eIBRS: Vulnerable' CPU is vulnerable - 'PBRSB-eIBRS: Not affected' CPU is not affected by PBRSB - =========================== ======================================================= - Full mitigation might require a microcode update from the CPU vendor. When the necessary microcode is not available, the kernel will report vulnerability. |
