** Summary changed:

- arm64/KVM debug registers vulnerability
+ Prevent arm64 guest from accessing host debug registers

** Description changed:

  [Impact]
+ Guests could access host debug/PMU registers. This could happen very briefly 
before they are first preempted.
+ This only affects arm64 CPUs that support virtualization.
  
- https://www.openwall.com/lists/oss-security/2020/01/30/5
+ [Regression potential]
+ This could break virtualization or guest access to PMU registers.
  
- A bug has been fixed in the arm64 KVM port (commit id
- 4942dc6638b07b5326b6d2faa142635c559e7cd5 "KVM: arm64: Write
- arch.mdcr_el2 changes since last vcpu_load on VHE") which would allow a
- guest to access the debug/PMU registers used by the host without being
- trapped. This can only happen during the vCPU start until the first
- preemption. Systems with an ARMv8.1 or later CPU are affected (with the
- Virtualisation Host Extensions).
+ [Test case]
+ A guest has been run with a host with the patched kernel. perf top has been 
run on the guest. Using uvtool:
  
- The implications are that a guest, for a brief period, may be able to
- read event counters belonging to the host or potentially trigger
- perf-related IRQs in the host.
- 
- 
- [Test Case]
- 
- [Regression Potential]
+ host$ sudo apt install uvtool qemu-efi-aarch64
+ host$ uvt-kvm create test release=eoan arch=arm64
+ host$ uvt-kvm ssh test
+ guest$ sudo perf top

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1860657

Title:
  Prevent arm64 guest from accessing host debug registers

Status in linux package in Ubuntu:
  Triaged

Bug description:
  [Impact]
  Guests could access host debug/PMU registers. This could happen very briefly 
before they are first preempted.
  This only affects arm64 CPUs that support virtualization.

  [Regression potential]
  This could break virtualization or guest access to PMU registers.

  [Test case]
  A guest has been run with a host with the patched kernel. perf top has been 
run on the guest. Using uvtool:

  host$ sudo apt install uvtool qemu-efi-aarch64
  host$ uvt-kvm create test release=eoan arch=arm64
  host$ uvt-kvm ssh test
  guest$ sudo perf top

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860657/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to