Daniel Axtens writes:
> Michael Ellerman writes:
>> diff --git a/arch/powerpc/include/asm/security_features.h
>> b/arch/powerpc/include/asm/security_features.h
>> new file mode 100644
>> index ..3b690de8b0e8
>> --- /dev/null
>> +++ b/arch/powerpc/include/asm/security_features.h
>> @@
Segher Boessenkool writes:
> Hi!
>
> On Thu, Mar 01, 2018 at 01:53:11AM +1100, Michael Ellerman wrote:
>> +// A speculation barrier should be used for bounds checks (Spectre variant
>> 1ull
>
> s/1ull/1)/ ?
Haha, oops. Thanks for spotting it.
Result of replacing ASM_CONST(x) with xull.
cheer
Michael Ellerman writes:
> This commit adds security feature flags to reflect the settings we
> receive from firmware regarding Spectre/Meltdown mitigations.
>
> The feature names reflect the names we are given by firmware on bare
> metal machines. See the hostboot source for details.
>
> Arguabl
Hi!
On Thu, Mar 01, 2018 at 01:53:11AM +1100, Michael Ellerman wrote:
> +// A speculation barrier should be used for bounds checks (Spectre variant
> 1ull
s/1ull/1)/ ?
Segher
This commit adds security feature flags to reflect the settings we
receive from firmware regarding Spectre/Meltdown mitigations.
The feature names reflect the names we are given by firmware on bare
metal machines. See the hostboot source for details.
Arguably these could be firmware features, but