Tyler Hicks pointed out that Cortex-A57, Cortex-A72, Cortex-A73, and Cortex-A75 
all just receive
firmware updates that disabled memory disambiguation at boot time to mitigate 
SSB. The following page indicates that the patches are only relevant for 
Cortex-A76. 
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1787993

Title:
  [Bionic] Spectre v4 mitigation (Speculative Store Bypass Disable)
  support for arm64 using SMC firmware call to set a hardware chicken
  bit

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  Track: Spectre v4 mitigation (Speculative Store Bypass Disable) support for 
arm64 using SMC firmware call to set a hardware chicken bit. Patch now in 4.18 
to Bionic.

  [Test]

  [Fix]
  http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html

  -- From 4.18 --
  eff0e9e1078e arm/arm64: smccc: Add SMCCC-specific return codes
  8e2906245f1e arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
  5cf9ce6e5ea5 arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
  a725e3dda181 arm64: Add ARCH_WORKAROUND_2 probing
  a43ae4dfe56a arm64: Add 'ssbd' command-line option
  c32e1736ca03 arm64: ssbd: Add global mitigation state accessor
  986372c4367f arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
  647d0519b53f arm64: ssbd: Restore mitigation status on CPU resume
  9dd9614f5476 arm64: ssbd: Introduce thread flag to control userspace 
mitigation
  85478bab4091 arm64: KVM: Add HYP per-cpu accessors
  55e3748e8902 arm64: KVM: Add ARCH_WORKAROUND_2 support for guests the first 
line
  b4f18c063a13 arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests
  5d81f7dc9bca arm64: KVM: Add ARCH_WORKAROUND_2 discovery through 
ARCH_FEATURES_FUNC_ID

  [Regression Potential]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787993/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to