Public bug reported:

[Impact]
Track: Spectre v4 mitigation (Speculative Store Bypass Disable) support for 
arm64 using SMC firmware call to set a hardware chicken bit. Patch now in 4.18 
to Bionic.

[Test]

[Fix]
http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html

-- From 4.18 --
eff0e9e1078e arm/arm64: smccc: Add SMCCC-specific return codes
8e2906245f1e arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1
5cf9ce6e5ea5 arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2
a725e3dda181 arm64: Add ARCH_WORKAROUND_2 probing
a43ae4dfe56a arm64: Add 'ssbd' command-line option
c32e1736ca03 arm64: ssbd: Add global mitigation state accessor
986372c4367f arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation
647d0519b53f arm64: ssbd: Restore mitigation status on CPU resume
9dd9614f5476 arm64: ssbd: Introduce thread flag to control userspace mitigation
85478bab4091 arm64: KVM: Add HYP per-cpu accessors
55e3748e8902 arm64: KVM: Add ARCH_WORKAROUND_2 support for guests the first line
b4f18c063a13 arm64: KVM: Handle guest's ARCH_WORKAROUND_2 requests
5d81f7dc9bca arm64: KVM: Add ARCH_WORKAROUND_2 discovery through 
ARCH_FEATURES_FUNC_ID

[Regression Potential]

** Affects: linux (Ubuntu)
     Importance: High
         Status: Incomplete


** Tags: bionic cavium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1787993

Title:
  [Bionic] Spectre v4 mitigation (Speculative Store Bypass Disable)
  support for arm64 using SMC firmware call to set a hardware chicken
  bit

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787993/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to