Is a retpoline-enabled kernel ‘enough’ to fully protect against Spectre Variant 2?

The Spectre attack exposed processors to memory disclosure attacks. Manipulation of indirect kernel calls may allow side channel retrieval of memory content (Branch Target Injection).

The Linux kernel was subsequently enhanced to mitigate this Variant II attack using the retpoline feature.

Continue reading “Is a retpoline-enabled kernel ‘enough’ to fully protect against Spectre Variant 2?”