summaryrefslogtreecommitdiff
path: root/Documentation
diff options
context:
space:
mode:
authorSuleiman Souhlal <suleiman@google.com>2022-11-17 18:19:19 +0900
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-11-23 07:53:43 +0100
commit67b137bf0d9d096f86c8bfa175ca5ab3629369c9 (patch)
tree7a6a5b39a16bd84392b22deb53819748c1e5fc89 /Documentation
parentd419ec8ec760fc3c6edc8775a3ab19da4e83dbea (diff)
downloadlinux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.tar.gz
linux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.tar.bz2
linux-67b137bf0d9d096f86c8bfa175ca5ab3629369c9.zip
Revert "x86/speculation: Add RSB VM Exit protections"
This reverts commit b6c5011934a15762cd694e36fe74f2f2f93eac9b. In order to apply IBRS mitigation for Retbleed, PBRSB mitigations must be reverted and the reapplied, so the backports can look sane. Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> Signed-off-by: Suleiman Souhlal <suleiman@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'Documentation')
-rw-r--r--Documentation/admin-guide/hw-vuln/spectre.rst8
1 files changed, 0 insertions, 8 deletions
diff --git a/Documentation/admin-guide/hw-vuln/spectre.rst b/Documentation/admin-guide/hw-vuln/spectre.rst
index 7e061ed449aa..6bd97cd50d62 100644
--- a/Documentation/admin-guide/hw-vuln/spectre.rst
+++ b/Documentation/admin-guide/hw-vuln/spectre.rst
@@ -422,14 +422,6 @@ The possible values in this file are:
'RSB filling' Protection of RSB on context switch enabled
============= ===========================================
- - EIBRS Post-barrier Return Stack Buffer (PBRSB) protection status:
-
- =========================== =======================================================
- 'PBRSB-eIBRS: SW sequence' CPU is affected and protection of RSB on VMEXIT enabled
- 'PBRSB-eIBRS: Vulnerable' CPU is vulnerable
- 'PBRSB-eIBRS: Not affected' CPU is not affected by PBRSB
- =========================== =======================================================
-
Full mitigation might require a microcode update from the CPU
vendor. When the necessary microcode is not available, the kernel will
report vulnerability.