-- SRU Verification --
Enabled SSBD v4 in firmware and booted the -proposed kernel, no regressions
were found on boot.
- Enable SSBD V4 in firmware. -
CAVM_CN99xx# env set core_feature_mask 0x20
core_feature_mask is set to 32
Env Var core_feature_mask set with Value 32
Execute 'env save' Command to make the changes persistent
CAVM_CN99xx# env save
-----------------------------------
ENV Variable Settings
-----------------------------------
Name : Value
-----------------------------------
turbo : 0
smt : 4
corefreq : 2199
numcores : 28
icispeed : 1
socnclk : 666
socsclk : 1199
memclk : 2199
ddrspeed_auto : 0
ddrspeed : 2400
progcpufreq : 1
progdevfreq : 1
dmc_node_channel_mask : 0000ffff
thermcontrol : 1
thermlimit : 105
enter_debug_shell : 0
dbg_speed_up_ddr_lvl : 0
enable_dram_scrub : 0
ipmbcontrol : 1
ddr_dmt_advanced : 0
cppccontrol : 0
loglevel : 0
uart_params : 115200/8-N-1 none
core_feature_mask : 32
sys_feature_mask : 0x00000000
ddr_refresh_rate : 1
fw_feature_mask : 0x00000000
dram_ce_threshold : 500
dram_ce_window : 60 sec
dram_ce_leak_rate : 1 msec/error
-----------------------------------
CAVM_CN99xx#
- Boot the -proposed kernel -
ubuntu@helo:~$ uname -a
Linux helo 4.15.0-35-generic #38-Ubuntu SMP Wed Sep 12 10:35:16 UTC 2018
aarch64 aarch64 aarch64 GNU/Linux
ubuntu@helo:~$
ubuntu@helo:~$ dmesg | grep -i ssbd
[ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.15.0-35-generic
root=UUID=06508e54-5e22-4f62-a30c-56a9268e39be ro ssbd=force-on
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1787993
Title:
[Bionic] Spectre v4 mitigation (Speculative Store Bypass Disable)
support for arm64 using SMC firmware call to set a hardware chicken
bit
Status in linux package in Ubuntu:
Incomplete
Status in linux source package in Bionic:
Fix Committed
Bug description:
[Impact]
Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64
was implemented in the Arm Trusted Firmware with SMCCC v1.1 and
SMCCC_ARCH_WORKAROUND_2[1, 2].
Kernel patches were later produced to toggle the workaround, enable it
only for the kernel side, both for the host or hypervisor case.
[Fix]
Original fix:
http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html
This patchset is a cherry pick of those patches (and prerequisistes)
from the stable / linux-4.14.y tree, forward ported to our Bionic
kernel.
[Test]
Boot a patched kernel and add on the cmdline:
ssbd=force-on
on dmesg you should see something like:
[ 0.779901] ssbd: forced from command-line
Same goes for the off case:
ssbd=force-off
[ 0.781002] ssbd: disabled from command-line
[Regression Potential]
Since it's "new code" to our Bionic kernel, there's some regression
potential, but it was a clean pick from linux-4.14.y without almost
any modication (except for some mechanical diff to make it apply).
1:
https://developer.arm.com/cache-speculation-vulnerability-firmware-specification
2: https://github.com/ARM-software/arm-trusted-firmware/pull/1392
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787993/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp