commit | 61f259821dd3306e49b7d42a3f90fb5a4ff3351b | [log] [tgz] |
---|---|---|
author | Luck, Tony <tony.luck@intel.com> | Tue Jul 30 21:39:57 2019 -0700 |
committer | Doug Ledford <dledford@redhat.com> | Thu Aug 01 11:34:11 2019 -0400 |
tree | a67d72f9d2a8e6ddf6486a2b784c62673f551992 | |
parent | 708637e65abd487ebb75fb55401c36a466c3135b [diff] |
IB/core: Add mitigation for Spectre V1 Some processors may mispredict an array bounds check and speculatively access memory that they should not. With a user supplied array index we like to play things safe by masking the value with the array size before it is used as an index. Signed-off-by: Tony Luck <tony.luck@intel.com> Link: https://lore.kernel.org/r/20190731043957.GA1600@agluck-desk2.amr.corp.intel.com Signed-off-by: Doug Ledford <dledford@redhat.com>