Expose ARCH_CAP_MDS_NO in guest

Bug #1830821 reported by quanxian
16
This bug affects 1 person
Affects Status Importance Assigned to Milestone
QEMU
Fix Released
Undecided
Unassigned
intel
New
Undecided
Unassigned
qemu (Ubuntu)
Confirmed
Wishlist
Rafael David Tinoco
Bionic
Confirmed
Wishlist
Unassigned
Cosmic
Confirmed
Wishlist
Unassigned
Disco
Confirmed
Wishlist
Unassigned

Bug Description

Description:

MDS_NO is bit 5 of ARCH_CAPABILITIES. Expose this bit to guest.

Target Qemu: 4.1

tags: added: qemu-19.10
Revision history for this message
Steve Beattie (sbeattie) wrote :

The specific upstream commit is 20140a82c67467f53814ca197403d5e1b561a5e5 and is incorporated into qemu 1:3.1+dfsg-2ubuntu3.1 in disco-security (19.04) and 1:3.1+dfsg-2ubuntu4 in eoan-proposed. For backporting to cosmic and older, I believe it requires the infrastructure to support IA32_ARCH_CAPABILITIES in place.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

This is done upstream, no need for the upstream bug task.
For Ubuntu I'll update the tasks to match the statement of sbeattie.
There are discussions to reconsider some of the backports, but unfortunately the IA32_ARCH_CAPABILITIES infrastructure is a rather big set of changes.

Changed in qemu:
status: New → Fix Released
Changed in qemu (Ubuntu Disco):
status: New → Fix Released
Changed in qemu (Ubuntu):
status: New → Fix Released
Changed in qemu (Ubuntu Bionic):
importance: Undecided → Wishlist
Changed in qemu (Ubuntu Cosmic):
importance: Undecided → Wishlist
Changed in qemu (Ubuntu Bionic):
status: New → Confirmed
Changed in qemu (Ubuntu Cosmic):
status: New → Confirmed
Revision history for this message
Rafael David Tinoco (rafaeldtinoco) wrote :
Changed in qemu (Ubuntu Disco):
status: Fix Released → Confirmed
importance: Undecided → Wishlist
Changed in qemu (Ubuntu):
status: Fix Released → Confirmed
importance: Undecided → Wishlist
assignee: nobody → Rafael David Tinoco (rafaeldtinoco)
Revision history for this message
Rafael David Tinoco (rafaeldtinoco) wrote :

I'm marking this bug as a duplicate of LP: #1828495 since both are asking for mitigations pass-through to i386 kvm guests and I'm preparing a fix for both simultaneously.

Revision history for this message
Rafael David Tinoco (rafaeldtinoco) wrote :

Commit:

https://bugs.launchpad.net/intel/+bug/1828495/comments/42

Addresses exactly this bug fix.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.