We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 06c2afb commit 0479a42Copy full SHA for 0479a42
arch/x86/include/asm/nospec-branch.h
@@ -234,6 +234,10 @@
234
* JMP_NOSPEC and CALL_NOSPEC macros can be used instead of a simple
235
* indirect jmp/call which may be susceptible to the Spectre variant 2
236
* attack.
237
+ *
238
+ * NOTE: these do not take kCFI into account and are thus not comparable to C
239
+ * indirect calls, take care when using. The target of these should be an ENDBR
240
+ * instruction irrespective of kCFI.
241
*/
242
.macro JMP_NOSPEC reg:req
243
#ifdef CONFIG_RETPOLINE
0 commit comments