Hi Tyler, Yes, we need to backport this patchset to all the current supported kernel. Since most of the supported kernel contains the whole RFI infra structure, I do not expect it to be hard. If you need help, I can find someone to help on the backport.
Regarding the problem you are facing, I talked to the powerpc maintainer (Michael Ellerman) and he suggested squashing the warning using something as the code below. He will be also sending the patch upstream. ``` diff --git a/arch/powerpc/kernel/setup_64.c b/arch/powerpc/kernel/setup_64.c index 66f2b6299c40..44c30dd38067 100644 --- a/arch/powerpc/kernel/setup_64.c +++ b/arch/powerpc/kernel/setup_64.c @@ -880,7 +880,7 @@ void rfi_flush_enable(bool enable) rfi_flush = enable; } -static void init_fallback_flush(void) +static void __ref init_fallback_flush(void) { u64 l1d_size, limit; int cpu; ``` -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1760099 Title: Additional spectre and meltdown patches Status in The Ubuntu-power-systems project: Triaged Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Status in linux source package in Xenial: Triaged Status in linux source package in Artful: Triaged Status in linux source package in Bionic: Triaged Bug description: == Comment: #0 - Breno Leitao <bren...@br.ibm.com> - 2018-03-29 08:53:56 == Hi Canonical, There are some additional patches for Spectre and Meltdown that is required on ppc64el. We would need to have them included on all Ubuntu kernels. This is the patch series: [v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,08/10] powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,05/10] powerpc/64s: Move cpu_show_meltdown() [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,04/10] powerpc/powernv: Set or clear security feature flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,03/10] powerpc/pseries: Set or clear security feature flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown http://patchwork.ozlabs.org/project/linuxppc- dev/list/?series=36012&state=* == Comment: #1 - Breno Leitao <bren...@br.ibm.com> - 2018-03-29 08:55:48 == This is a better formatted patch series list: [v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2() [v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1() [v2,08/10] powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() [v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flus() [v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown() [v2,05/10] powerpc/64s: Move cpu_show_meltdown() [v2,04/10] powerpc/powernv: Set or clear security feature flags [v2,03/10] powerpc/pseries: Set or clear security feature flags [v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags [v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1760099/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp