You have been subscribed to a public bug:

Canonical,

if you are planning to integrate the following patch, you will need the
ppc64el patches that could be found attached to this bug:

>From f0dadb2e6bd7b463670a6230d5c23ad859f11c75 Mon Sep 17 00:00:00 2001         
>                                                                               
>               
From: Thomas Gleixner <t...@linutronix.de>
Date: Sun, 7 Jan 2018 22:48:00 +0100
Subject: [PATCH 1/3] sysfs/cpu: Add vulnerability folder

As the meltdown/spectre problem affects several CPU architectures, it makes
sense to have common way to express whether a system is affected by a
particular vulnerability or not. If affected the way to express the
mitigation should be common as well.

Create /sys/devices/system/cpu/vulnerabilities folder and files for
meltdown, spectre_v1 and spectre_v2.

** Affects: linux (Ubuntu)
     Importance: Undecided
     Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
         Status: New


** Tags: architecture-ppc64le bugnameltc-163988 severity-medium 
targetmilestone-inin1710
-- 
sysfs/cpu: Add vulnerability folder for ppc64el
https://bugs.launchpad.net/bugs/1746080
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to