Activity log for bug #1959973

Date Who What changed Old value New value Message
2022-02-03 23:09:14 bugproxy bug added bug
2022-02-03 23:09:16 bugproxy tags architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204
2022-02-03 23:09:17 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2022-02-03 23:09:19 bugproxy affects ubuntu linux (Ubuntu)
2022-02-03 23:09:20 bugproxy bug added subscriber CDE Administration
2022-02-03 23:09:21 bugproxy bug added subscriber Boris Barth
2022-02-04 07:22:27 Frank Heimes bug task added ubuntu-z-systems
2022-02-04 07:22:41 Frank Heimes ubuntu-z-systems: assignee Skipper Bug Screeners (skipper-screen-team)
2022-02-04 07:22:45 Frank Heimes linux (Ubuntu): importance Undecided High
2022-02-04 07:22:47 Frank Heimes ubuntu-z-systems: importance Undecided High
2022-02-04 07:22:52 Frank Heimes linux (Ubuntu): status New Incomplete
2022-02-04 07:22:55 Frank Heimes ubuntu-z-systems: status New Incomplete
2022-06-07 14:39:31 bugproxy attachment added VS2021 upstream patch file https://bugs.launchpad.net/bugs/1959973/+attachment/5595333/+files/0001-drivers-s390-char-Add-Ultravisor-io-device.patch
2022-06-07 17:28:37 Frank Heimes ubuntu-z-systems: status Incomplete New
2022-06-07 17:28:39 Frank Heimes linux (Ubuntu): status Incomplete New
2022-06-08 12:40:08 Frank Heimes description KVM: Attestation support for Secure Execution (crypto) Description: Provide attestations support, e.g. for external frameworks, specific deployment models or potentially regulatory requirements. Request Type: Kernel - Enhancement from IBM Upstream Acceptance: In Progress SRU Justification: ================== [Impact] * This is a hardware enablement SRU in support of IBM z15 and LinuxONE III (FC 115) secure execution feature. * It adds a misc character device to expose some Ultravisor functions to userspace. * The device is only available if the (optional) Ultravisor Facility (158) is present in the system. * Two Ultravisor calls are supported: - Query Ultravisor Information (QUI) and - Receive Attestation Measurement (Attest[ation]) * This is in support of for example. external frameworks, specific deployment models or especially potentially regulatory requirements. [Fix] * 4689752c79fa 4689752c79fa30e91b49b39a9fba93c4d1f3e20c "drivers/s390/char: Add Ultravisor io device" * eb3de2d8f78d eb3de2d8f78d893303891d879f941c47f2f2d13d "s390/uv_uapi: depend on CONFIG_S390" * patch to set kernel config option 'CONFIG_S390_UV_UAPI=y' [Test Plan] * An IBM z15 or LinuxONE III LPAR with FC 115 enabled is required. * Installation of Ubuntu Server 22.04 LTS on top. * Install a kernel that incl. the above patches/commits (that has the kernel config option 'CONFIG_S390_UV_UAPI' enabled). * Activate the kernel (reboot) and look for the existence of the uvdevice '/dev/uv'. * Use a userspace test program that makes use of the new misc device by exploiting 'ATTEST'. * Due to hardware requirements this test needs to be conducted by IBM. [Where problems could occur] * The definitions in uv_cmds_inst and uv_feat_ind could be wrong and the codes wrong or mixed up, which would lead to a broken functionality/interface. * The uvdevice header definitions could be erroneous, defining an wrong interface. * The newly added kernel options could be implemented in a wrong way, so that it doesn't enable the 'uvdevice', but unlikely. * The implementation of the device itself in 'uvdevice.c' could be broken by wrong or broken pointer arithmetics, wrong method arguments, wrong sizeof/length calculations, which - in worst case - could entirely crash a system. * The ioctl control block implementation could be wrong in a way, that it doesn't properly handle the case where the facility is not available in the system. * Entry point, copy and check routines could be wrong, allowing non-desired calls. * This is an s390x-only functionality, that is only available on IBM z15 / LinuxONE III systems and newer, and only is the optional feature 'FC 115' in place, which is limited to 'secure-execution' workloads. [Other Info] * The above commit is marked to be merged into 5.19-rc2, and since the planned target kernel for kinetic is 5.19, the SRU is not needed for kinetic. __________ KVM: Attestation support for Secure Execution (crypto) Description: Provide attestations support, e.g. for external frameworks, specific deployment models or potentially regulatory requirements. Request Type: Kernel - Enhancement from IBM Upstream Acceptance: In Progress
2022-06-21 10:40:56 Frank Heimes information type Private Public
2022-06-21 10:41:00 Frank Heimes linux (Ubuntu): status New In Progress
2022-06-21 10:41:04 Frank Heimes ubuntu-z-systems: status New In Progress
2022-06-21 10:41:41 Frank Heimes nominated for series Ubuntu Jammy
2022-06-21 10:41:41 Frank Heimes bug task added linux (Ubuntu Jammy)
2022-06-21 10:41:51 Frank Heimes linux (Ubuntu Jammy): status New In Progress
2022-06-21 10:41:55 Frank Heimes linux (Ubuntu Jammy): importance Undecided High
2022-06-21 10:42:10 Frank Heimes linux (Ubuntu Jammy): assignee Canonical Kernel Team (canonical-kernel-team)
2022-06-21 10:42:15 Frank Heimes linux (Ubuntu): status In Progress Invalid
2022-06-21 10:42:22 Frank Heimes linux (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team)
2022-07-08 14:14:07 Stefan Bader linux (Ubuntu Jammy): status In Progress Fix Committed
2022-07-08 14:22:26 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2022-07-15 13:26:43 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 verification-needed-jammy
2022-07-18 12:09:36 bugproxy tags architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 verification-needed-jammy architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 verification-done-jammy
2022-07-28 10:25:44 Launchpad Janitor linux (Ubuntu Jammy): status Fix Committed Fix Released
2022-07-28 10:25:44 Launchpad Janitor cve linked 2022-1652
2022-07-28 10:25:44 Launchpad Janitor cve linked 2022-1679
2022-07-28 10:25:44 Launchpad Janitor cve linked 2022-28893
2022-07-28 10:25:44 Launchpad Janitor cve linked 2022-34918
2022-07-28 15:57:42 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released
2022-09-29 15:24:28 Frank Heimes tags architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 verification-done-jammy architecture-s39064 bugnameltc-196320 severity-high targetmilestone-inin2204 verification-done-focal verification-done-jammy