@Breno in addition to the question above about which releases you're requesting, I have a new question about section mismatch warnings that the first patchset introduces:
WARNING: vmlinux.o(.text+0x22228): Section mismatch in reference from the function setup_rfi_flush() to the function .init.text:safe_stack_limit() The function setup_rfi_flush() references the function __init safe_stack_limit(). This is often because setup_rfi_flush lacks a __init annotation or the annotation of safe_stack_limit is wrong. WARNING: vmlinux.o(.text+0x22250): Section mismatch in reference from the function setup_rfi_flush() to the function .init.text:memblock_alloc_base() The function setup_rfi_flush() references the function __init memblock_alloc_base(). This is often because setup_rfi_flush lacks a __init annotation or the annotation of memblock_alloc_base is wrong. The "rfi-flush: Make it possible to call setup_rfi_flush() again" patch removes the __init__ annotation from setup_rfi_flush() and then the "rfi-flush: Call setup_rfi_flush() after LPM migration" patch makes it so that setup_rfi_flush() can be called outside of the initialization phase. If it is called outside of the initialization phase, it could call the two __init__ functions mentioned in the warnings above. So, from what I can tell, these are legitimate warnings. Are you all aware of these warnings and, if so, have you determined that they're not a problem? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1760099 Title: Additional spectre and meltdown patches Status in The Ubuntu-power-systems project: Triaged Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Status in linux source package in Xenial: Triaged Status in linux source package in Artful: Triaged Status in linux source package in Bionic: Triaged Bug description: == Comment: #0 - Breno Leitao <bren...@br.ibm.com> - 2018-03-29 08:53:56 == Hi Canonical, There are some additional patches for Spectre and Meltdown that is required on ppc64el. We would need to have them included on all Ubuntu kernels. This is the patch series: [v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,08/10] powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,05/10] powerpc/64s: Move cpu_show_meltdown() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,04/10] powerpc/powernv: Set or clear security feature flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,03/10] powerpc/pseries: Set or clear security feature flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown http://patchwork.ozlabs.org/project/linuxppc- dev/list/?series=36012&state=* == Comment: #1 - Breno Leitao <bren...@br.ibm.com> - 2018-03-29 08:55:48 == This is a better formatted patch series list: [v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2() [v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1() [v2,08/10] powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() [v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flus() [v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown() [v2,05/10] powerpc/64s: Move cpu_show_meltdown() [v2,04/10] powerpc/powernv: Set or clear security feature flags [v2,03/10] powerpc/pseries: Set or clear security feature flags [v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1760099/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp