** Changed in: linux (Ubuntu Bionic)
       Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Disco)
       Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Eoan)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860657

Title:
  Prevent arm64 guest from accessing host debug registers

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed

Bug description:
  [Impact]
  Guests could access host debug/PMU registers. This could happen very briefly 
before they are first preempted.
  This only affects arm64 CPUs that support virtualization.

  [Regression potential]
  This could break virtualization or guest access to PMU registers.

  [Test case]
  A guest has been run with a host with the patched kernel. perf top has been 
run on the guest. Using uvtool:

  host$ sudo apt install uvtool qemu-efi-aarch64
  host$ uvt-kvm create test release=eoan arch=arm64
  host$ uvt-kvm ssh test
  guest$ sudo perf top

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860657/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to