We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 4bf5d56 commit af189c9Copy full SHA for af189c9
arch/x86/include/asm/nospec-branch.h
@@ -150,7 +150,7 @@ extern char __indirect_thunk_end[];
150
* On VMEXIT we must ensure that no RSB predictions learned in the guest
151
* can be followed in the host, by overwriting the RSB completely. Both
152
* retpoline and IBRS mitigations for Spectre v2 need this; only on future
153
- * CPUs with IBRS_ATT *might* it be avoided.
+ * CPUs with IBRS_ALL *might* it be avoided.
154
*/
155
static inline void vmexit_fill_RSB(void)
156
{
0 commit comments