summaryrefslogtreecommitdiff
path: root/include/linux/nospec.h
diff options
context:
space:
mode:
authorDan Williams <dan.j.williams@intel.com>2018-02-17 00:20:54 +0300
committerIngo Molnar <mingo@kernel.org>2018-02-17 10:40:59 +0300
commiteb6174f6d1be16b19cfa43dac296bfed003ce1a6 (patch)
treece6231dba0ffc07dbb02fb0e8b3545b129cd9c15 /include/linux/nospec.h
parentb98c6a160a057d5686a8c54c79cc6c8c94a7d0c8 (diff)
downloadlinux-eb6174f6d1be16b19cfa43dac296bfed003ce1a6.tar.xz
nospec: Include <asm/barrier.h> dependency
The nospec.h header expects the per-architecture header file <asm/barrier.h> to optionally define array_index_mask_nospec(). Include that dependency to prevent inadvertent fallback to the default array_index_mask_nospec() implementation. The default implementation may not provide a full mitigation on architectures that perform data value speculation. Reported-by: Christian Borntraeger <borntraeger@de.ibm.com> Signed-off-by: Dan Williams <dan.j.williams@intel.com> Cc: Andy Lutomirski <luto@kernel.org> Cc: Arjan van de Ven <arjan@linux.intel.com> Cc: Borislav Petkov <bp@alien8.de> Cc: Dave Hansen <dave.hansen@linux.intel.com> Cc: David Woodhouse <dwmw2@infradead.org> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Josh Poimboeuf <jpoimboe@redhat.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Will Deacon <will.deacon@arm.com> Cc: linux-arch@vger.kernel.org Link: http://lkml.kernel.org/r/151881605404.17395.1341935530792574707.stgit@dwillia2-desk3.amr.corp.intel.com Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'include/linux/nospec.h')
-rw-r--r--include/linux/nospec.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/nospec.h b/include/linux/nospec.h
index 172a19dc35ab..e791ebc65c9c 100644
--- a/include/linux/nospec.h
+++ b/include/linux/nospec.h
@@ -5,6 +5,7 @@
#ifndef _LINUX_NOSPEC_H
#define _LINUX_NOSPEC_H
+#include <asm/barrier.h>
/**
* array_index_mask_nospec() - generate a ~0 mask when index < size, 0 otherwise