You have been subscribed to a public bug: Canonical,
if you are planning to integrate the following patch, you will need the ppc64el patches that could be found attached to this bug: >From f0dadb2e6bd7b463670a6230d5c23ad859f11c75 Mon Sep 17 00:00:00 2001 > > From: Thomas Gleixner <t...@linutronix.de> Date: Sun, 7 Jan 2018 22:48:00 +0100 Subject: [PATCH 1/3] sysfs/cpu: Add vulnerability folder As the meltdown/spectre problem affects several CPU architectures, it makes sense to have common way to express whether a system is affected by a particular vulnerability or not. If affected the way to express the mitigation should be common as well. Create /sys/devices/system/cpu/vulnerabilities folder and files for meltdown, spectre_v1 and spectre_v2. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) Status: New ** Tags: architecture-ppc64le bugnameltc-163988 severity-medium targetmilestone-inin1710 -- sysfs/cpu: Add vulnerability folder for ppc64el https://bugs.launchpad.net/bugs/1746080 You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp