------- Comment From [email protected] 2018-09-25 13:55 EDT-------
(In reply to comment #27)
> The test package is for Xenial, not for Trusty. Does that installation
> failure affect Xenial also?

my bad, mistaken it for Trusty.

Xenial installation has no issues, and tested the qemu package with
below level

HW: Power8
FW: latest contains spectre/meltdown fixes(FW860.60 (SV860_174) (b))
# cd /sys/firmware/devicetree/base/ibm,opal/fw-features
# ls -1 */enabled
fw-branch-hints-honored/enabled
fw-count-cache-disabled/enabled
inst-l1d-flush-ori30,30,0/enabled
inst-spec-barrier-ori31,31,0/enabled
needs-l1d-flush-msr-hv-1-to-0/enabled
needs-l1d-flush-msr-pr-0-to-1/enabled
needs-spec-barrier-for-bound-checks/enabled
speculation-policy-favor-security/enabled
tm-suspend-mode/enabled

Host Kernel: 4.15.0-34-generic

qemu:
ri  qemu-system-ppc                       1:2.5+dfsg-5ubuntu10.32~test1         
     ppc64el      QEMU full system emulation binaries (ppc)
ii  qemu-kvm                              1:2.5+dfsg-5ubuntu10.32~test1         
     ppc64el      QEMU Full virtualization

guest: ubuntu18.10(4.17.0-9-generic)

# kvm -M pseries,cap-sbbc=workaround,cap-cfpc=workaround -smp 4 -m 8192 -serial 
mon:stdio -enable-kvm -vga none -nographic ~/ubuntu1810-ppc64le.qcow2
qemu-system-ppc64: Requested safe cache capability level not supported by kvm, 
try cap-cfpc=broken

#
looks like some patches missing backport?

probably below patch?, not sure though

https://github.com/qemu/qemu/commit/b2540203bdf4a390c3489146eae82ce237303653
#diff-b0796c6a577709f249c7c5d96b9ea049

@Suraj,
Could you pls help here, thanks in advance.

Regards,
-Satheesh.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1765364

Title:
  Backport spectre/meltdown fixes on qemu for ppc64 into 16.04 and
  possibly 14.04 LTS releases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1765364/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to