-- SRU verification -- No regressions were found booting with the SRU kernel.
ubuntu@helo:~$ uname -a Linux helo 4.15.0-35-generic #38-Ubuntu SMP Wed Sep 12 10:35:16 UTC 2018 aarch64 aarch64 aarch64 GNU/Linux ubuntu@helo:~$ dmesg | grep -i ssbd [ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.15.0-35-generic root=UUID=06508e54-5e22-4f62-a30c-56a9268e39be ro ssbd=force-on ** Tags removed: verification-needed-bionic ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1787993 Title: [Bionic] Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64 using SMC firmware call to set a hardware chicken bit Status in linux package in Ubuntu: Incomplete Status in linux source package in Bionic: Fix Committed Bug description: [Impact] Spectre v4 mitigation (Speculative Store Bypass Disable) support for arm64 was implemented in the Arm Trusted Firmware with SMCCC v1.1 and SMCCC_ARCH_WORKAROUND_2[1, 2]. Kernel patches were later produced to toggle the workaround, enable it only for the kernel side, both for the host or hypervisor case. [Fix] Original fix: http://lkml.iu.edu/hypermail/linux/kernel/1805.2/05868.html This patchset is a cherry pick of those patches (and prerequisistes) from the stable / linux-4.14.y tree, forward ported to our Bionic kernel. [Test] Boot a patched kernel and add on the cmdline: ssbd=force-on on dmesg you should see something like: [ 0.779901] ssbd: forced from command-line Same goes for the off case: ssbd=force-off [ 0.781002] ssbd: disabled from command-line [Regression Potential] Since it's "new code" to our Bionic kernel, there's some regression potential, but it was a clean pick from linux-4.14.y without almost any modication (except for some mechanical diff to make it apply). 1: https://developer.arm.com/cache-speculation-vulnerability-firmware-specification 2: https://github.com/ARM-software/arm-trusted-firmware/pull/1392 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1787993/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp