From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ozlabs.org (ozlabs.org [IPv6:2401:3900:2:1::2]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3zsY131cD2zF1cM for ; Fri, 2 Mar 2018 00:19:03 +1100 (AEDT) From: Michael Ellerman To: Segher Boessenkool Cc: linuxppc-dev@ozlabs.org Subject: Re: [RFC PATCH 1/6] powerpc: Add security feature flags for Spectre/Meltdown In-Reply-To: <20180228150427.GA21977@gate.crashing.org> References: <20180228145316.11347-1-mpe@ellerman.id.au> <20180228150427.GA21977@gate.crashing.org> Date: Fri, 02 Mar 2018 00:19:02 +1100 Message-ID: <874lm07x2x.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Segher Boessenkool writes: > Hi! > > On Thu, Mar 01, 2018 at 01:53:11AM +1100, Michael Ellerman wrote: >> +// A speculation barrier should be used for bounds checks (Spectre variant 1ull > > s/1ull/1)/ ? Haha, oops. Thanks for spotting it. Result of replacing ASM_CONST(x) with xull. cheers