2018-05-02 19:05:53 |
dann frazier |
bug |
|
|
added bug |
2018-05-02 19:08:34 |
dann frazier |
nominated for series |
|
Ubuntu Bionic |
|
2018-05-02 19:08:34 |
dann frazier |
bug task added |
|
linux (Ubuntu Bionic) |
|
2018-05-02 19:08:45 |
dann frazier |
linux (Ubuntu): status |
New |
In Progress |
|
2018-05-02 19:08:48 |
dann frazier |
linux (Ubuntu Bionic): status |
New |
In Progress |
|
2018-05-02 19:08:50 |
dann frazier |
linux (Ubuntu): assignee |
|
dann frazier (dannf) |
|
2018-05-02 19:08:53 |
dann frazier |
linux (Ubuntu Bionic): assignee |
|
dann frazier (dannf) |
|
2018-05-02 20:35:47 |
dann frazier |
description |
[Impact]
In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode).
[Test Case]
I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing.
[Regression Risk]
The code is restricted to arm64, and should only run on systems that support SDEI. |
[Impact]
In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode).
[Test Case]
I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing.
[Regression Risk]
The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway. |
|
2018-05-02 20:39:12 |
dann frazier |
description |
[Impact]
In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode).
[Test Case]
I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing.
[Regression Risk]
The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway. |
[Impact]
In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode). This may lead to a crash.
[Test Case]
I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing.
[Regression Risk]
The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway. |
|
2018-05-23 14:39:13 |
Stefan Bader |
linux (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2018-05-24 18:05:32 |
Brad Figg |
tags |
|
verification-needed-bionic |
|
2018-05-25 14:59:18 |
dann frazier |
tags |
verification-needed-bionic |
verification-done-bionic |
|
2018-06-11 15:08:06 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2018-06-11 15:08:06 |
Launchpad Janitor |
cve linked |
|
2018-1092 |
|
2018-06-11 15:08:06 |
Launchpad Janitor |
cve linked |
|
2018-3639 |
|
2018-06-11 15:08:06 |
Launchpad Janitor |
cve linked |
|
2018-8087 |
|
2018-06-14 12:16:29 |
Launchpad Janitor |
linux (Ubuntu): status |
In Progress |
Fix Released |
|