[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1954466
Title:
KVM Protection Keys for Supervisor Pages (PKS)
Status in linux package in Ubuntu:
Expired
Bug description:
SKX introduced the Protection Key for User Pages (PKU) feature
enabling fast, thread-specific manipulation of permission restrictions
on user pages. SPR introduced Protection Key for Supervisor
Pages(PKS), a new feature that extends the Protection Key architecture
to support thread-specific permission restrictions on supervisor
pages. This important feature enables enhanced access control on
memory, and brings more valid usage model.
Generally PKS enables protections on 'domains' of supervisor pages to
limit supervisor mode access to pages beyond the normal paging
protections(U/S, R/W, P). PKS works in a similar fashion to user space
pkeys, PKU. As with PKU, supervisor pkeys are checked in addition to
normal paging protections and Access or Writes can be disabled via a
MSR update without TLB flushes when permissions change.
PKS virtualization enabling should base on existing PKU code. Major
works:
CPUID exposure
New CR4 bit exposure
New VMCS fields enabling
IA32_PKRS saving/restoring
#GP handling
Target Linux 5.19
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954466/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp