diff options
author | Dan Williams <dan.j.williams@intel.com> | 2018-02-16 13:20:54 -0800 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2018-02-17 08:40:59 +0100 |
commit | eb6174f6d1be16b19cfa43dac296bfed003ce1a6 (patch) | |
tree | ce6231dba0ffc07dbb02fb0e8b3545b129cd9c15 /include | |
parent | b98c6a160a057d5686a8c54c79cc6c8c94a7d0c8 (diff) | |
download | linux-eb6174f6d1be16b19cfa43dac296bfed003ce1a6.tar.gz linux-eb6174f6d1be16b19cfa43dac296bfed003ce1a6.tar.bz2 linux-eb6174f6d1be16b19cfa43dac296bfed003ce1a6.zip |
nospec: Include <asm/barrier.h> dependency
The nospec.h header expects the per-architecture header file
<asm/barrier.h> to optionally define array_index_mask_nospec(). Include
that dependency to prevent inadvertent fallback to the default
array_index_mask_nospec() implementation.
The default implementation may not provide a full mitigation
on architectures that perform data value speculation.
Reported-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arjan van de Ven <arjan@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David Woodhouse <dwmw2@infradead.org>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Will Deacon <will.deacon@arm.com>
Cc: linux-arch@vger.kernel.org
Link: http://lkml.kernel.org/r/151881605404.17395.1341935530792574707.stgit@dwillia2-desk3.amr.corp.intel.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'include')
-rw-r--r-- | include/linux/nospec.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/nospec.h b/include/linux/nospec.h index 172a19dc35ab..e791ebc65c9c 100644 --- a/include/linux/nospec.h +++ b/include/linux/nospec.h @@ -5,6 +5,7 @@ #ifndef _LINUX_NOSPEC_H #define _LINUX_NOSPEC_H +#include <asm/barrier.h> /** * array_index_mask_nospec() - generate a ~0 mask when index < size, 0 otherwise |