[19.10 FEAT] KVM: Secure Linux Boot Toleration - qemu
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
Fix Released
|
High
|
Canonical Server | ||
qemu (Ubuntu) |
Fix Released
|
Undecided
|
Skipper Bug Screeners | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Undecided
|
Unassigned | ||
Cosmic |
Won't Fix
|
Undecided
|
Unassigned | ||
Disco |
Fix Released
|
Undecided
|
Unassigned | ||
Eoan |
Fix Released
|
Undecided
|
Skipper Bug Screeners |
Bug Description
[Impact]
* s390x is about to add secure boot features which are implemented by a
new IPL section
* Older qemu bootloaders for s390x will stumble over that IPL section and
be unable to boot.
* Backport the changes from upstream that make qemu tolerate those
sections (not the new feature of secure boot, just the avoidance of the
guest crash on boot)
[Test Case]
* Take a signed kernel on s390x (either the one from xnox in comment #19
or use signtool to create one)
* Install that kernel in a guest of the qemu that is to be tested
* Run zipl with --secure 1 to write a secure boot section for sure
* With an unpatched qemu this would now fail to boot again
* Install the update to qemu and boot the guest, by skipping the
"tolerated, but not supported" new section it works again.
[Regression Potential]
* If any of the checks goes wrong we might affect booting of guests in a
negative way. For example it might no more start or load a wrong
kernel. But since the IPL records written by `zipl` are clearly
specified that should hopefully not be the case here. The code added
clearly only skips an additional section that didn't exist before.
[Other Info]
* n/a
---
Secure boot enablement KVM.
Will be made available with qemu 4.1
Related branches
- Rafael David Tinoco (community): Approve
- Canonical Server packageset reviewers: Pending requested
- git-ubuntu developers: Pending requested
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
- Rafael David Tinoco (community): Approve
- Canonical Server packageset reviewers: Pending requested
- git-ubuntu developers: Pending requested
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
- Rafael David Tinoco (community): Approve
- Canonical Server packageset reviewers: Pending requested
- git-ubuntu developers: Pending requested
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
CVE References
tags: | added: architecture-s39064 bugnameltc-177823 severity-high targetmilestone-inin1910 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → qemu (Ubuntu) |
tags: | added: qemu-19.10 |
Changed in ubuntu-z-systems: | |
status: | Incomplete → Triaged |
information type: | Private → Public |
Changed in ubuntu-z-systems: | |
status: | Triaged → In Progress |
description: | updated |
Changed in ubuntu-z-systems: | |
status: | In Progress → Fix Committed |
Changed in ubuntu-z-systems: | |
status: | Fix Committed → Fix Released |
Strongly assuming that this should be targeted towards 19.10 (like in the tags) and not 19.04 (like in the headline) I adjusted the headline to 19.10, too.
Will set to Incomplete for now until code got released and will discuss internally ...