Activity log for bug #1768630

Date Who What changed Old value New value Message
2018-05-02 19:05:53 dann frazier bug added bug
2018-05-02 19:08:34 dann frazier nominated for series Ubuntu Bionic
2018-05-02 19:08:34 dann frazier bug task added linux (Ubuntu Bionic)
2018-05-02 19:08:45 dann frazier linux (Ubuntu): status New In Progress
2018-05-02 19:08:48 dann frazier linux (Ubuntu Bionic): status New In Progress
2018-05-02 19:08:50 dann frazier linux (Ubuntu): assignee dann frazier (dannf)
2018-05-02 19:08:53 dann frazier linux (Ubuntu Bionic): assignee dann frazier (dannf)
2018-05-02 20:35:47 dann frazier description [Impact] In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode). [Test Case] I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing. [Regression Risk] The code is restricted to arm64, and should only run on systems that support SDEI. [Impact] In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode). [Test Case] I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing. [Regression Risk] The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway.
2018-05-02 20:39:12 dann frazier description [Impact] In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode). [Test Case] I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing. [Regression Risk] The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway. [Impact] In bug 1756096, we backported SDEI (Software Delegated Exception Interface) support for arm64. However, this backport missed 2 changes that make the SDEI entry point a trampoline which make sure the kernel is mapped before processing. (The kernel may not be mapped if KPTI is enabled and the exception comes in while e.g. executing in usermode). This may lead to a crash. [Test Case] I haven't yet found a way to inject/simulate an SDEI, so I can only regression test by boot testing. [Regression Risk] The code is restricted to arm64, and should only run on systems that support SDEI. I'm unaware of any production firmware that expose the SDEI ACPI table, which means this code isn't actively used yet anyway.
2018-05-23 14:39:13 Stefan Bader linux (Ubuntu Bionic): status In Progress Fix Committed
2018-05-24 18:05:32 Brad Figg tags verification-needed-bionic
2018-05-25 14:59:18 dann frazier tags verification-needed-bionic verification-done-bionic
2018-06-11 15:08:06 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2018-06-11 15:08:06 Launchpad Janitor cve linked 2018-1092
2018-06-11 15:08:06 Launchpad Janitor cve linked 2018-3639
2018-06-11 15:08:06 Launchpad Janitor cve linked 2018-8087
2018-06-14 12:16:29 Launchpad Janitor linux (Ubuntu): status In Progress Fix Released