Activity log for bug #1832624

Date Who What changed Old value New value Message
2019-06-12 17:52:32 bugproxy bug added bug
2019-06-12 17:52:34 bugproxy tags architecture-s39064 bugnameltc-178125 severity-high targetmilestone-inin1910
2019-06-12 17:52:35 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2019-06-12 17:52:38 bugproxy affects ubuntu linux (Ubuntu)
2019-06-12 19:10:54 Andrew Cloke bug task added ubuntu-z-systems
2019-06-12 19:11:03 Andrew Cloke ubuntu-z-systems: importance Undecided High
2019-06-12 19:11:13 Andrew Cloke ubuntu-z-systems: assignee Canonical Kernel Team (canonical-kernel-team)
2019-06-13 23:38:18 Terry Rudd bug added subscriber Terry Rudd
2019-06-17 06:01:01 Frank Heimes ubuntu-z-systems: status New Triaged
2019-06-18 04:15:51 Si Watt ubuntu-z-systems: status Triaged In Progress
2019-06-18 13:59:34 bugproxy attachment added Here is a backport of the upstream patch. https://bugs.launchpad.net/bugs/1832624/+attachment/5271392/+files/s390-zcrypt-Fix-wrong-dispatching-for-control-domain.patch
2019-06-26 07:29:24 Harald Freudenberger attachment added s390-zcrypt-Fix-wrong-dispatching-for-control-domain.ubuntu_bionic.patch https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832624/+attachment/5273391/+files/s390-zcrypt-Fix-wrong-dispatching-for-control-domain.ubuntu_bionic.patch
2019-06-26 08:21:08 Ubuntu Foundations Team Bug Bot tags architecture-s39064 bugnameltc-178125 severity-high targetmilestone-inin1910 architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910
2019-06-27 10:02:28 Frank Heimes description Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned. Such a domain can be controlled (for example master keys can be set) but can't be used for regualar crypto load (usage). A crypto domain may be assigned for control-and-usage to only one active LPAR. But the very same domain may be assigned for control-only to one or more other LPARs. However, trying to communicate in any way with a control-only crypto domain did not work. So a simple query for the state of the master keys on a control-only domain failed and the TKE does not even show this domain. Even worse, when the lowest domain (in a numerically sense) is a control-only domain, the TKE does not even see the crypto cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is addressing a control-only domain. If that's the case and there is a default control-and-usage domain available the CPRB is send to this other domain instead. The target domain field within the CPRB is untouched and the crypto card firmware code detects this working-as-designed mismatch and does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of an LPAR and re-activate the LPAR. 2. Connect the TKE the LPAR and try to visit the master key verification patterns of this control-only domain. 3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04 SRU Justification: ================== [Impact] * Unable to maintain control-only crypto domains * The communication to control-only domains does not work in any way. * And depending on the setup (lowest numerical domain is control-only) the TKE does not see the crypto card at all. [Fix] * 7379e652797c0b9b5f6caea1576f2dff9ce6a708 7379e65 "s390/zcrypt: Fix wrong dispatching for control domain CPRBs" * Backport: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+attachment/5271392/+files/s390-zcrypt-Fix-wrong-dispatching-for-control-domain.patch [Test Case] * Configure a control-only domain to the activation profile of LPAR A * Configure a control-and-usage domain to the activation profile of LPAR B * Try to communicate to LPAR A with the control-only domain (e.g. trying to read or set master key) [Regression Potential] * The regression potential can be considered as moderate since this is purely s390x specific * and again limited to CryptoExpress adapter cards. * It only occurs if crypto domains are configured as control-only or better control-only in combination with control-and-usage. * The majority of configurations is control-and-usage, since this offers more flexibility and covers more use cases. [Other Info] * Problem was found during tests at IBM and is a so called 'preventive fix' * The given patch is supposed to fis this issue and became upstream accepted with kernel 5.2-rc3. * It applies cleanly to disco master-next while cherry-picking, but needs the the backport (from comment #3) for bionic's master-next kernel 4.15. __________ Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned.                Such a domain can be controlled (for example master keys can                be set) but can't be used for regualar crypto load (usage).                A crypto domain may be assigned for control-and-usage to                only one active LPAR. But the very same domain may be                assigned for control-only to one or more other LPARs.                However, trying to communicate in any way with a                control-only crypto domain did not work. So a simple query                for the state of the master keys on a control-only domain                failed and the TKE does not even show this domain. Even                worse, when the lowest domain (in a numerically sense) is a                control-only domain, the TKE does not even see the crypto                cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is                addressing a control-only domain. If that's the case and                there is a default control-and-usage domain available the                CPRB is send to this other domain instead. The target domain                field within the CPRB is untouched and the crypto card                firmware code detects this working-as-designed mismatch and                does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of                   an LPAR and re-activate the LPAR.                2. Connect the TKE the LPAR and try to visit the master key                   verification patterns of this control-only domain.                3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04
2019-06-27 10:39:54 Frank Heimes description SRU Justification: ================== [Impact] * Unable to maintain control-only crypto domains * The communication to control-only domains does not work in any way. * And depending on the setup (lowest numerical domain is control-only) the TKE does not see the crypto card at all. [Fix] * 7379e652797c0b9b5f6caea1576f2dff9ce6a708 7379e65 "s390/zcrypt: Fix wrong dispatching for control domain CPRBs" * Backport: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+attachment/5271392/+files/s390-zcrypt-Fix-wrong-dispatching-for-control-domain.patch [Test Case] * Configure a control-only domain to the activation profile of LPAR A * Configure a control-and-usage domain to the activation profile of LPAR B * Try to communicate to LPAR A with the control-only domain (e.g. trying to read or set master key) [Regression Potential] * The regression potential can be considered as moderate since this is purely s390x specific * and again limited to CryptoExpress adapter cards. * It only occurs if crypto domains are configured as control-only or better control-only in combination with control-and-usage. * The majority of configurations is control-and-usage, since this offers more flexibility and covers more use cases. [Other Info] * Problem was found during tests at IBM and is a so called 'preventive fix' * The given patch is supposed to fis this issue and became upstream accepted with kernel 5.2-rc3. * It applies cleanly to disco master-next while cherry-picking, but needs the the backport (from comment #3) for bionic's master-next kernel 4.15. __________ Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned.                Such a domain can be controlled (for example master keys can                be set) but can't be used for regualar crypto load (usage).                A crypto domain may be assigned for control-and-usage to                only one active LPAR. But the very same domain may be                assigned for control-only to one or more other LPARs.                However, trying to communicate in any way with a                control-only crypto domain did not work. So a simple query                for the state of the master keys on a control-only domain                failed and the TKE does not even show this domain. Even                worse, when the lowest domain (in a numerically sense) is a                control-only domain, the TKE does not even see the crypto                cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is                addressing a control-only domain. If that's the case and                there is a default control-and-usage domain available the                CPRB is send to this other domain instead. The target domain                field within the CPRB is untouched and the crypto card                firmware code detects this working-as-designed mismatch and                does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of                   an LPAR and re-activate the LPAR.                2. Connect the TKE the LPAR and try to visit the master key                   verification patterns of this control-only domain.                3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04 SRU Justification: ================== [Impact] * Unable to maintain control-only crypto domains * The communication to control-only domains does not work in any way. * And depending on the setup (lowest numerical domain is control-only) the TKE does not see the crypto card at all. [Fix] * 7379e652797c0b9b5f6caea1576f2dff9ce6a708 7379e65 "s390/zcrypt: Fix wrong dispatching for control domain CPRBs" * Backport: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+attachment/5271392/+files/s390-zcrypt-Fix-wrong-dispatching-for-control-domain.patch [Test Case] * Configure a control-only domain to the activation profile of LPAR A * Configure a control-and-usage domain to the activation profile of LPAR B * Try to communicate to LPAR A with the control-only domain (e.g. trying to read or set master key) [Regression Potential] * The regression potential can be considered as moderate since this is purely s390x specific * and again limited to CryptoExpress adapter cards. * It only occurs if crypto domains are configured as control-only or better control-only in combination with control-and-usage. * The majority of configurations is control-and-usage, since this offers more flexibility and covers more use cases. [Other Info] * Problem was found during tests at IBM and is a so called 'preventive fix' * The given patch is supposed to fix this issue and became upstream accepted with kernel 5.2-rc3. * It applies cleanly to disco master-next while cherry-picking, but needs the the backport (from comment #3) for bionic's master-next kernel 4.15. * Once target kernel 5.2 has landed in Eoan, it will be in Eoan, too. __________ Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned.                Such a domain can be controlled (for example master keys can                be set) but can't be used for regualar crypto load (usage).                A crypto domain may be assigned for control-and-usage to                only one active LPAR. But the very same domain may be                assigned for control-only to one or more other LPARs.                However, trying to communicate in any way with a                control-only crypto domain did not work. So a simple query                for the state of the master keys on a control-only domain                failed and the TKE does not even show this domain. Even                worse, when the lowest domain (in a numerically sense) is a                control-only domain, the TKE does not even see the crypto                cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is                addressing a control-only domain. If that's the case and                there is a default control-and-usage domain available the                CPRB is send to this other domain instead. The target domain                field within the CPRB is untouched and the crypto card                firmware code detects this working-as-designed mismatch and                does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of                   an LPAR and re-activate the LPAR.                2. Connect the TKE the LPAR and try to visit the master key                   verification patterns of this control-only domain.                3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04
2019-06-27 12:27:50 Frank Heimes ubuntu-z-systems: status In Progress Triaged
2019-06-27 14:00:59 Frank Heimes ubuntu-z-systems: status Triaged Confirmed
2019-06-27 20:16:49 Frank Heimes linux (Ubuntu): status New In Progress
2019-06-27 20:16:52 Frank Heimes ubuntu-z-systems: status Confirmed In Progress
2019-07-01 09:19:14 Stefan Bader nominated for series Ubuntu Disco
2019-07-01 09:19:14 Stefan Bader bug task added linux (Ubuntu Disco)
2019-07-01 09:19:14 Stefan Bader nominated for series Ubuntu Bionic
2019-07-01 09:19:14 Stefan Bader bug task added linux (Ubuntu Bionic)
2019-07-01 09:19:26 Stefan Bader linux (Ubuntu Bionic): importance Undecided Medium
2019-07-01 09:19:30 Stefan Bader linux (Ubuntu Disco): importance Undecided Medium
2019-07-01 14:41:14 Kleber Sacilotto de Souza linux (Ubuntu Bionic): status New Fix Committed
2019-07-01 14:41:18 Kleber Sacilotto de Souza linux (Ubuntu Disco): status New Fix Committed
2019-07-02 09:04:41 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2019-07-03 11:01:58 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-needed-disco
2019-07-03 13:07:26 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-needed-disco architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-needed-bionic verification-needed-disco
2019-07-03 14:23:47 Frank Heimes tags architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-needed-bionic verification-needed-disco architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-done-bionic verification-done-disco
2019-07-22 10:53:34 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2019-07-22 10:53:34 Launchpad Janitor cve linked 2018-12126
2019-07-22 10:53:34 Launchpad Janitor cve linked 2018-12127
2019-07-22 10:53:34 Launchpad Janitor cve linked 2018-12130
2019-07-22 10:53:34 Launchpad Janitor cve linked 2019-11085
2019-07-22 10:53:34 Launchpad Janitor cve linked 2019-11091
2019-07-22 10:53:34 Launchpad Janitor cve linked 2019-11815
2019-07-22 10:53:34 Launchpad Janitor cve linked 2019-11833
2019-07-22 10:53:34 Launchpad Janitor cve linked 2019-11884
2019-07-22 12:38:59 Frank Heimes linux (Ubuntu): status In Progress Fix Released
2019-07-23 05:25:24 Launchpad Janitor linux (Ubuntu Disco): status Fix Committed Fix Released
2019-07-23 05:46:50 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released
2019-08-22 16:15:46 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-done-bionic verification-done-disco architecture-s39064 bugnameltc-178125 patch severity-high targetmilestone-inin1910 verification-done-bionic verification-done-disco verification-needed-xenial