x86: remove retpoline code
This code: 1) Doesn't work 2) Hasn't ever been enabled by default 3) We mitigate Spectre V2 via Extended IBRS anyway Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
This commit is contained in:
parent
077b587447
commit
07c278382a
6 changed files with 4 additions and 61 deletions
|
@ -43,16 +43,6 @@ endmenu
|
|||
|
||||
menu "Processor Capabilities"
|
||||
|
||||
config X86_RETPOLINE
|
||||
bool "Build with retpolines enabled in x86 assembly code"
|
||||
depends on USERSPACE
|
||||
help
|
||||
This is recommended on platforms with speculative executions, to
|
||||
protect against branch target injection (AKA Spectre-V2). Full
|
||||
description of how retpolines work can be found here[1].
|
||||
|
||||
[1] https://support.google.com/faqs/answer/7625886
|
||||
|
||||
config X86_ENABLE_TSS
|
||||
bool
|
||||
help
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue