From: "Gustavo A. R. Silva"
Date: Fri, 21 Dec 2018 15:41:17 -0600
> protocol is indirectly controlled by user-space, hence leading to
> a potential exploitation of the Spectre variant 1 vulnerability.
>
> This issue was detected with the help of Smatch:
>
> net/phonet/af_phonet.c:48 phonet_prot
protocol is indirectly controlled by user-space, hence leading to
a potential exploitation of the Spectre variant 1 vulnerability.
This issue was detected with the help of Smatch:
net/phonet/af_phonet.c:48 phonet_proto_get() warn: potential spectre issue
'proto_tab' [w] (local cap)
Fix this by