|
@@ -150,7 +150,7 @@ extern char __indirect_thunk_end[];
|
|
|
* On VMEXIT we must ensure that no RSB predictions learned in the guest
|
|
|
* can be followed in the host, by overwriting the RSB completely. Both
|
|
|
* retpoline and IBRS mitigations for Spectre v2 need this; only on future
|
|
|
- * CPUs with IBRS_ATT *might* it be avoided.
|
|
|
+ * CPUs with IBRS_ALL *might* it be avoided.
|
|
|
*/
|
|
|
static inline void vmexit_fill_RSB(void)
|
|
|
{
|