Public bug reported: [Impact] Track: Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64 using SMC firmware call to set a hardware chicken bit. Patch now in 4.18 to Bionic.
[Test] [Fix] http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html -- From 4.18 -- eff0e9e1078e arm/arm64: smccc: Add SMCCC-specific return codes 8e2906245f1e arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 5cf9ce6e5ea5 arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 a725e3dda181 arm64: Add ARCH_WORKAROUND_2 probing a43ae4dfe56a arm64: Add 'ssbd' command-line option c32e1736ca03 arm64: ssbd: Add global mitigation state accessor 986372c4367f arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation 647d0519b53f arm64: ssbd: Restore mitigation status on CPU resume 9dd9614f5476 arm64: ssbd: Introduce thread flag to control userspace mitigation 85478bab4091 arm64: KVM: Add HYP per-cpu accessors 55e3748e8902 arm64: KVM: Add ARCH_WORKAROUND_2 support for guests the first line b4f18c063a13 arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests 5d81f7dc9bca arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID [Regression Potential] ** Affects: linux (Ubuntu) Importance: High Status: Incomplete ** Tags: bionic cavium -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1787993 Title: [Bionic] Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64 using SMC firmware call to set a hardware chicken bit Status in linux package in Ubuntu: Incomplete Bug description: [Impact] Track: Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64 using SMC firmware call to set a hardware chicken bit. Patch now in 4.18 to Bionic. [Test] [Fix] http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html -- From 4.18 -- eff0e9e1078e arm/arm64: smccc: Add SMCCC-specific return codes 8e2906245f1e arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 5cf9ce6e5ea5 arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 a725e3dda181 arm64: Add ARCH_WORKAROUND_2 probing a43ae4dfe56a arm64: Add 'ssbd' command-line option c32e1736ca03 arm64: ssbd: Add global mitigation state accessor 986372c4367f arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation 647d0519b53f arm64: ssbd: Restore mitigation status on CPU resume 9dd9614f5476 arm64: ssbd: Introduce thread flag to control userspace mitigation 85478bab4091 arm64: KVM: Add HYP per-cpu accessors 55e3748e8902 arm64: KVM: Add ARCH_WORKAROUND_2 support for guests the first line b4f18c063a13 arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests 5d81f7dc9bca arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID [Regression Potential] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787993/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp