[19.10 FEAT] KVM: Secure Linux Boot Toleration - qemu
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
| Ubuntu on IBM z Systems |
High
|
Canonical Server Team | ||
| qemu (Ubuntu) |
Undecided
|
Skipper Bug Screeners | ||
| Xenial |
Undecided
|
Unassigned | ||
| Bionic |
Undecided
|
Unassigned | ||
| Cosmic |
Undecided
|
Unassigned | ||
| Disco |
Undecided
|
Unassigned | ||
| Eoan |
Undecided
|
Skipper Bug Screeners |
Bug Description
[Impact]
* s390x is about to add secure boot features which are implemented by a
new IPL section
* Older qemu bootloaders for s390x will stumble over that IPL section and
be unable to boot.
* Backport the changes from upstream that make qemu tolerate those
sections (not the new feature of secure boot, just the avoidance of the
guest crash on boot)
[Test Case]
* Take a signed kernel on s390x (either the one from xnox in comment #19
or use signtool to create one)
* Install that kernel in a guest of the qemu that is to be tested
* Run zipl with --secure 1 to write a secure boot section for sure
* With an unpatched qemu this would now fail to boot again
* Install the update to qemu and boot the guest, by skipping the
"tolerated, but not supported" new section it works again.
[Regression Potential]
* If any of the checks goes wrong we might affect booting of guests in a
negative way. For example it might no more start or load a wrong
kernel. But since the IPL records written by `zipl` are clearly
specified that should hopefully not be the case here. The code added
clearly only skips an additional section that didn't exist before.
[Other Info]
* n/a
---
Secure boot enablement KVM.
Will be made available with qemu 4.1
Related branches
- Rafael David Tinoco: Approve on 2019-07-11
- Canonical Server packageset reviewers: Pending requested 2019-07-04
- Ubuntu Server Dev import team: Pending requested 2019-07-04
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
- Rafael David Tinoco: Approve on 2019-07-11
- Canonical Server packageset reviewers: Pending requested 2019-07-04
- Ubuntu Server Dev import team: Pending requested 2019-07-04
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
- Rafael David Tinoco: Approve on 2019-07-11
- Canonical Server packageset reviewers: Pending requested 2019-07-04
- Ubuntu Server Dev import team: Pending requested 2019-07-04
-
Diff: 122 lines (+100/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/series (+1/-0)
debian/patches/ubuntu/lp-1830243-s390-bios-Skip-bootmap-signature-entries.patch (+92/-0)
CVE References
tags: | added: architecture-s39064 bugnameltc-177823 severity-high targetmilestone-inin1910 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → qemu (Ubuntu) |
Frank Heimes (fheimes) wrote : | #1 |
summary: |
- [19.04 FEAT] KVM: Secure Linux Boot Toleration - qemu + [19.10 FEAT] KVM: Secure Linux Boot Toleration - qemu |
Changed in ubuntu-z-systems: | |
status: | New → Incomplete |
importance: | Undecided → High |
assignee: | nobody → Canonical Server Team (canonical-server) |
tags: | added: qemu-19.10 |
Christian Ehrhardt (paelzer) wrote : | #2 |
Qemu 4.1 is a stretch for Ubuntu 19.10.
While qemu 4.1 itself would release "just in time" the usual rule of thumb is that one should have a libvirt that is released later (to handle any new quirks). Now that is then already way into feature freeze - therefore while 4.1 is an option it is rather unlikely.
Is there any chance that the patch set can be isolated and applied on top of 4.0?
If so a list of commits that are needed would be great.
------- Comment From <email address hidden> 2019-05-24 06:21 EDT-------
This affects the boot firmware only, the commit ids for the firmware binary and sources are
commit f7a339a5ba48a8a
Author: Thomas Huth <email address hidden>
Date: Wed May 8 11:26:01 2019 +0200
pc-bios/s390: Update firmware image with "Skip bootmap signature entries" fi
Firmware now skips the unsupported signature entries instead of
aborting the boot process.
Signed-off-by: Thomas Huth <email address hidden>
commit 2497b4a3c084261
Author: Jason J. Herne <email address hidden>
Date: Mon Apr 29 09:09:41 2019 -0400
s390-bios: Skip bootmap signature entries
Newer versions of zipl have the ability to write signature entries to the bo
script for secure boot. We don't yet support secure boot, but we need to ski
over signature entries while reading the boot script in order to maintain ou
ability to boot guest operating systems that have a secure bootloader.
Signed-off-by: Jason J. Herne <email address hidden>
Reviewed-by: Farhan Ali <email address hidden>
Message-Id: <email address hidden>
Signed-off-by: Thomas Huth <email address hidden>
Changed in ubuntu-z-systems: | |
status: | Incomplete → Triaged |
Dimitri John Ledkov (xnox) wrote : | #4 |
We will need this in xenial and up, and cloud-archives too.
Dimitri John Ledkov (xnox) wrote : | #5 |
On top of v4.0 we only need:
2497b4a3c0 s390-bios: Skip bootmap signature entries
but can take a relatively harmless as well:
796588ba1 pc-bios/s390-ccw: Clean up harmless misuse of isdigit()
On top of 3.1 we probably want all of these:
$ git log --oneline 63c93fac18.. pc-bios/s390-ccw
2497b4a3c0 s390-bios: Skip bootmap signature entries
d796588ba1 pc-bios/s390-ccw: Clean up harmless misuse of isdigit()
2880469c95 s390-bios: Use control unit type to find bootable devices
efa47d36da s390-bios: Support booting from real dasd device
69333c36dc s390-bios: Add channel command codes/structs needed for dasd-ipl
3668cb7ce8 s390-bios: Use control unit type to determine boot method
9de6cbb152 s390-bios: Refactor virtio to run channel programs via cio
7b361db37b s390-bios: Factor finding boot device out of virtio code path
930072d2bf s390-bios: Extend find_dev() for non-virtio devices
86c58705bb s390-bios: cio error handling
3083a1bbb8 s390-bios: Support for running format-0/1 channel programs
1fb3e5cde8 s390-bios: ptr2u32 and u32toptr
c95df3d108 s390-bios: Map low core memory
120d04103e s390-bios: Decouple channel i/o logic from virtio
d96c5db77f s390-bios: Clean up cio.h
a5f6e0975b s390-bios: decouple common boot logic from virtio
87f910c142 s390-bios: decouple cio setup from virtio
0d3a761398 pc-bios/s390-ccw: Use proper register names for Clang
Christian Ehrhardt (paelzer) wrote : | #6 |
Thanks for that list Dimitri.
FYI - Qemu 4.0 merge was postponed a few times for other interrupts, due to that it will still take a while to get this - especially back into much older releases depending on how much more changes we will need there.
Christian Ehrhardt (paelzer) wrote : | #7 |
FYI 796588ba1 is actually d796588ba13b9d9
Christian Ehrhardt (paelzer) wrote : | #8 |
In the PPA [1] is a preliminary build of a qemu 4.0 for Ubuntu 19.10.
This is still being tested, but a confirmation that this brings all the z14 related changes that you expect would be great - so I wanted to ask to test the PPA in regard to this bug here "KVM: Secure Linux Boot Toleration - qemu".
[1]: https:/
information type: | Private → Public |
Launchpad Janitor (janitor) wrote : | #9 |
This bug was fixed in the package qemu - 1:4.0+dfsg-0ubuntu1
---------------
qemu (1:4.0+
* Merge with Upstream release of qemu 4.0.
Among many other things this fixes LP Bugs:
LP: #1782206 - SnowRidge Accelerator Interfacing Architecture (AIA)
LP: #1828038 - Update s390x CPU Model for more HW support
LP: #1832622 - count cache flush Spectre v2 mitigation for ppc64el
Remaining Changes:
- qemu-kvm to systemd unit
- d/qemu-kvm-init: script for QEMU KVM preparation modules, ksm,
hugepages and architecture specifics
- d/qemu-
- d/qemu-
- d/qemu-
- d/qemu-
- d/rules: call dh_installinit and dh_installsystemd for qemu-kvm
- Enable nesting by default
- d/qemu-
(is default on amd)
- d/qemu-
without nested=1
- d/p/ubuntu/
in qemu64 cpu type.
- d/p/ubuntu/
in qemu64 on amd
- d/qemu-
default is comfort, not full support
- Distribution specific machine type (LP: 1304107 1621042)
- d/p/ubuntu/
types
- d/qemu-
for host-phys-bits=true (LP: 1776189)
- add an info about -hpb machine type in debian/
- provide pseries-
- improved dependencies
- Make qemu-system-common depend on qemu-block-extra
- Make qemu-utils depend on qemu-block-extra
- let qemu-utils recommend sharutils
- s390x support
- Create qemu-system-s390x package
- Enable numa support for s390x
- arch aware kvm wrappers
- d/control: update VCS links
- qemu-guest-agent: freeze-hook fixes (LP: 1484990)
- d/qemu-
- d/qemu-
- d/control-in: enable RDMA support in qemu (LP: 1692476)
- enable RDMA config option
- add libibumad-dev build-dep
- tolerate ipxe size change on migrations to >=18.04 (LP: 1713490)
- d/p/ubuntu/
reference 256k path
- d/control-in: depend on ipxe-qemu-
handle incoming migrations from former releases.
- d/control-in: Disable capstone disassembler library support (universe)
- Move s390x roms to a new qemu-system-
- d/qemu-
Changed in qemu (Ubuntu Eoan): | |
status: | New → Fix Released |
Changed in ubuntu-z-systems: | |
status: | Triaged → In Progress |
Christian Ehrhardt (paelzer) wrote : | #10 |
Ok, now that things are in Eoan how do we want to work on the SRUs.
Dimitri already identified quite a lot of changes on top of 3.1 in comment #5.
I can only assume that this will get worse and worse further back.
will IBM provide branches or patches for qemu 2.5, 2.11 and 3.1 or should I give things a try starting with the list in comment #5 and someone will check against a PPA, or ... ?
bugproxy (bugproxy) wrote : | #11 |
------- Comment From <email address hidden> 2019-07-04 05:29 EDT-------
The commits identified by Dmitry are mostly for IPLing from a dasd attached via vfio-ccw.
I cannot say right now if we want that feature also for disco,cosmic and bionic.
If not we can simply focus on just the secure boot toleration, we can limit ourselves to
commit 2497b4a3c084261
Author: Jason J. Herne <email address hidden>
AuthorDate: Mon Apr 29 09:09:41 2019 -0400
Commit: Thomas Huth <email address hidden>
CommitDate: Wed May 8 10:52:14 2019 +0200
s390-bios: Skip bootmap signature entries
and of course the rebuild of the s390-ccw.img binary.
It seems that this patch applies cleanly on top of 2,5, 2.11 and 3.1. This means we just need to double check if it builds and runs
Dimitri John Ledkov (xnox) wrote : | #12 |
I also wonder if we need secureboot toleration patches in zipl for xenial+ (when it has no signed stage3.bin)
Specifically, it should strip secureboot signatures off kernels or otherwise things might not boot.
bugproxy (bugproxy) wrote : | #13 |
------- Comment From <email address hidden> 2019-07-04 08:02 EDT-------
While I'd expect that the combination of a newer guest under an older hypervisor will not be that common, it would probably not hurt to SRU this. If you do, don't forget the OpenStack QEMUs.
Christian Ehrhardt (paelzer) wrote : | #14 |
Yeah lets focus on 2497b4a3 "s390-bios: Skip bootmap signature entries" here then.
If ever "IPLing from a dasd attached via vfio-ccw" is wanted that would be an extra bug/discussion.
Thanks Christian B. for pointing to the core change of this bug!
That way it applies as-is to 3.1, with very slight noise to 2.11 and even 2.5.
Started test builds in [1] as a PPA to evaluate.
Who has s390x test kernels with secure boot enabled available to give this a try?
Marking the bug tasks incomplete until that has been verified.
For formal review MPs are up [2][3][4] as well.
P.S. Cosmic will be EOL until this reaches the SRU queues. Not preparing that.
[1]: https:/
[2]: https:/
[3]: https:/
[4]: https:/
Changed in qemu (Ubuntu Disco): | |
status: | New → Incomplete |
Changed in qemu (Ubuntu Cosmic): | |
status: | New → Incomplete |
status: | Incomplete → Won't Fix |
Changed in qemu (Ubuntu Bionic): | |
status: | New → Incomplete |
Changed in qemu (Ubuntu Xenial): | |
status: | New → Incomplete |
Dimitri John Ledkov (xnox) wrote : | #15 |
I have access to secureboot signed zipl & kernels. I will prepare a sample cloud-image to test boot with all the qemus.
bugproxy (bugproxy) wrote : | #16 |
------- Comment From <email address hidden> 2019-07-04 10:32 EDT-------
You can actually try to test that yourself by having a guest that has a very new zipl
(this commit or newer)
https:/
(s390-tools 2.9 will be good enough).
and the override the detection (--secure 1) and let zipl write such a boot record.
Christian Ehrhardt (paelzer) wrote : | #17 |
Thanks Christian, but when doing so I get:
$ cat /etc/zipl.conf
# This has been modified by the cloud image build process
[defaultboot]
default=ubuntu
[ubuntu]
target = /boot
secure = 1
image = /boot/vmlinuz
parameters = root=LABEL=
ramdisk = /boot/initrd.img
$ sudo zipl -V
Using config file '/etc/zipl.conf'
Target device information
Device.
Partition.
Device name...
Device driver name..............: virtblk
Type.
Disk layout.
Geometry - start..
File system block size..........: 4096
Physical block size.............: 512
Device size in physical blocks..: 16775135
Building bootmap in '/boot'
Adding IPL section 'ubuntu' (default)
initial ramdisk...: /boot/initrd.img
signature for.....: /lib/s390-
kernel image......: /boot/vmlinuz
Error: Could not install Secure Boot IPL records: Missing signature in image file /boot/vmlinuz
So do I really not need a kernel with a signature?
If so how to avoid the break on the missing signature?
@Dimitri - I found none in the archive yet, do you have signed s390x kernel around that could be used?
bugproxy (bugproxy) wrote : | #18 |
------- Comment From <email address hidden> 2019-07-05 06:10 EDT-------
Yes, you do need a signed key. For the purpose of QEMU testing maybe you can use the sign_file tool from the kernel to have a signed kernel.
Christian Ehrhardt (paelzer) wrote : | #19 |
Got signed kernels from xnox in [1].
With those they zipl
Using config file '/etc/zipl.conf'
Target device information
Device.
Partition.
Device name...
Device driver name..............: virtblk
Type.
Disk layout.
Geometry - start..
File system block size..........: 4096
Physical block size.............: 512
Device size in physical blocks..: 16775135
Building bootmap in '/boot'
Adding IPL section 'ubuntu' (default)
initial ramdisk...: /boot/initrd.
signature for.....: /lib/s390-
kernel image......: /boot/vmlinuz-
signature for.....: /boot/vmlinuz-
kernel parmline...: 'root=LABEL=
component address:
heap area.......: 0x00002000-
stack area......: 0x0000f000-
internal loader.: 0x0000a000-
parameters.
kernel image....: 0x00010000-
parmline.
initial ramdisk.: 0x004c0000-
Preparing boot device: vda (0000).
Detected SCSI PCBIOS disk layout.
Writing SCSI master boot record.
Syncing disks...
Done.
With that starting the guest gave either
2019-07-05 10:17:06.535+0000: shutting down, reason=crashed
or
! No EXEC entry !
With the qemu from PPA [2] things work again.
I can go forward with the SRU on this, thanks for your help everybody.
P.S. I have a few other changes I want to bundle, so I beg your pardon for a few days extra delay. But this isn't urgent until the signed kernels would land so that should be ok.
[1]: https:/
[2]: https:/
Changed in qemu (Ubuntu Disco): | |
status: | Incomplete → In Progress |
Changed in qemu (Ubuntu Bionic): | |
status: | Incomplete → In Progress |
Changed in qemu (Ubuntu Xenial): | |
status: | Incomplete → In Progress |
description: | updated |
Christian Ehrhardt (paelzer) wrote : | #20 |
Tags pushed and uploaded to X/B/D unapproved for the SRU Team to do a final review and accept.
Hello bugproxy, or anyone else affected,
Accepted qemu into disco-proposed. The package will build now and be available at https:/
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-
Further information regarding the verification process can be found at https:/
N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days.
Changed in qemu (Ubuntu Disco): | |
status: | In Progress → Fix Committed |
tags: | added: verification-needed verification-needed-disco |
Brian Murray (brian-murray) wrote : | #22 |
Hello bugproxy, or anyone else affected,
Accepted qemu into bionic-proposed. The package will build now and be available at https:/
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-
Further information regarding the verification process can be found at https:/
N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days.
Changed in qemu (Ubuntu Bionic): | |
status: | In Progress → Fix Committed |
tags: | added: verification-needed-bionic |
Changed in qemu (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
tags: | added: verification-needed-xenial |
Brian Murray (brian-murray) wrote : | #23 |
Hello bugproxy, or anyone else affected,
Accepted qemu into xenial-proposed. The package will build now and be available at https:/
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-
Further information regarding the verification process can be found at https:/
N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days.
Changed in ubuntu-z-systems: | |
status: | In Progress → Fix Committed |
All autopkgtests for the newly accepted qemu (1:2.11+
There have been regressions in tests triggered by the package. Please visit the sru report page and investigate the failures.
https:/
All errors are timeout errors when trying to access armhf archive:
# libvirt armhf:
The following packages will be upgraded:
apt apt-transport-https apt-utils bash binutils binutils-
binutils-common bzip2 console-setup console-setup-linux dbus debconf
debconf-i18n distro-info-data dmsetup gcc-8-base initramfs-tools
initramfs-
keyboard-
libdb5.3 libdbus-1-3 libdevmapper1.02.1 libdns-export1100 libelf1 libexpat1
libgcc1 libglib2.0-0 libglib2.0-data libgnutls30 libisc-export169
libldap-2.4-2 libldap-common libnss-systemd libpam-systemd
libpython3.
libstdc++6 libsystemd0 libudev1 linux-headers-
openssl passwd python3.6 python3.6-minimal systemd systemd-sysv tzdata
ubuntu-minimal udev vim-common vim-tiny xxd
65 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
Need to get 35.3 MB of archives.
After this operation, 85.9 MB of additional disk space will be used.
Err:1 http://
Could not connect to ftpmaster.
----
## nova armhf:
The following packages will be upgraded:
apt apt-transport-https apt-utils bash binutils binutils-
binutils-common bzip2 console-setup console-setup-linux dbus debconf
debconf-i18n distro-info-data dmsetup gcc-8-base initramfs-tools
initramfs-
keyboard-
libdb5.3 libdbus-1-3 libdevmapper1.02.1 libdns-export1100 libelf1 libexpat1
libgcc1 libglib2.0-0 libglib2.0-data libgnutls30 libisc-export169
libldap-2.4-2 libldap-common libnss-systemd libpam-systemd
libpython3.
libstdc++6 libsystemd0 libudev1 linux-headers-
openssl passwd python3.6 python3.6-minimal systemd systemd-sysv tzdata
ubuntu-minimal udev vim-common vim-tiny xxd
65 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
Need to get 35.3 MB of archives.
After this operation, 85.9 MB of additional disk space will be used.
Err:1 http://
Could not connect to ftpmaster.
----
## systemd armhf:
The following packages will be upgraded:
apt apt-transport-https apt-utils bash binutils binutils-
binutils-common bzip2 console-setup console-setup-linux dbus debconf
debconf-i18n distro-info-data dmsetup gcc-8-base initramfs-tools
initramfs-
keyboard-
libdb5.3 libdbus-1-3 libdevmapper1.02.1 libdns-export1100 libelf1 libexpat1
libgcc1 libglib2.0-0 libglib2.0-data libgnutls30 libisc-export169
libldap-2.4-2 libldap-common libnss-s...
I asked someone with permissions to restart those tests to check if timeout issue is gone.
All autopkgtests for the newly accepted qemu (1:3.1+
There have been regressions in tests triggered by the package. Please visit the sru report page and investigate the failures.
https:/
Christian Ehrhardt (paelzer) wrote : | #28 |
1. Installed an Eoan guest on Xenial/Bionic/Disco hosts
In the Guest
2. set secure = 1 in /etc/zipl.conf
3. unfortunately xnox refreshed his PPA and it has no pre-signed kernel anymore :-/
I tried to follow https:/
but I assume things are just different for s390x here.
After a while I found this old build [1] of which I used [2]
Install that and drop the ramdisk line
change:
image = /boot/vmlinuz-
remove:
ramdisk = /boot/initrd.img
4. run zipl verbosely, which should have:
Adding IPL section 'ubuntu' (default)
signature for.....: /lib/s390-
kernel image......: /boot/vmlinuz-
signature for.....: /boot/vmlinuz-
5. shut down guest
6. back in the Host, start the guest (fails without the update).
Check the console - the error messages differ per version:
Xenial:
$ virsh start --console test-secureboot-x
Domain test-secureboot-x started
Connected to domain test-secureboot-x
Escape character is ^]
..
! No EXEC entry !
Bionic:
Domain test-secureboot-b started
error: The domain is not running
Disco:
seems to work but complains about validations
7. Upgrade to proposed and check again.
qemu-system-
qemu-kvm/
qemu-system-
qemu-system-
With the upgrade from proposed they all can start fine (well I stole the initrd, so they fail mounting the root disk, but we passed hat we wanted to check).
Setting verified
[1]: https:/
[2]: https:/
tags: |
added: verification-done verification-done-bionic verification-done-disco verification-done-xenial removed: verification-needed verification-needed-bionic verification-needed-disco verification-needed-xenial |
The verification of the Stable Release Update for qemu has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions.
Launchpad Janitor (janitor) wrote : | #30 |
This bug was fixed in the package qemu - 1:2.5+dfsg-
---------------
qemu (1:2.5+
* d/p/ubuntu/
tolerate guests with secure boot loaders (LP: #1830243)
-- Christian Ehrhardt <email address hidden> Thu, 04 Jul 2019 14:47:56 +0200
Changed in qemu (Ubuntu Xenial): | |
status: | Fix Committed → Fix Released |
Hello bugproxy, or anyone else affected,
Accepted qemu into bionic-proposed. The package will build now and be available at https:/
Please help us by testing this new package. See https:/
If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-
Further information regarding the verification process can be found at https:/
tags: |
added: verification-needed verification-needed-bionic removed: verification-done verification-done-bionic |
Christian Ehrhardt (paelzer) wrote : | #32 |
Just checked on s1lp05 - this one still works as before (as expected as we didn't change it in this fixup upload).
tags: |
added: verification-done verification-done-bionic removed: verification-needed verification-needed-bionic |
Launchpad Janitor (janitor) wrote : | #33 |
This bug was fixed in the package qemu - 1:3.1+dfsg-
---------------
qemu (1:3.1+
[ Christian Ehrhardt ]
* d/p/ubuntu/
tolerate guests with secure boot loaders (LP: #1830243)
[ Rafael David Tinoco ]
* {Ice,Cascade}Lake CPUs IA32_ARCH_
Needed patches are in d/p/u/lp1828495-:
- 0011-disable-
i386: kvm: Disable arch_capabilities if MSR can't be set
- 0012-arch-
i386: Make arch_capabilities migratable
- 0014-remove-
i386: remove the new CPUID 'PCONFIG' from Icelake-Server CPU model
- 0015-remove-
i386: remove the 'INTEL_PT' CPUID bit from named CPU models
- 0016-no-
i386: Disable OSPKE on CPU model definitions
-- Christian Ehrhardt <email address hidden> Thu, 04 Jul 2019 14:47:56 +0200
Changed in qemu (Ubuntu Disco): | |
status: | Fix Committed → Fix Released |
Launchpad Janitor (janitor) wrote : | #34 |
This bug was fixed in the package qemu - 1:2.11+
---------------
qemu (1:2.11+
* {Ice,Cascade}Lake IA32_ARCH_
Needed patch is in d/p/u/lp1828495-:
- 0017-target-
target/i386: add MDS-NO feature
qemu (1:2.11+
[ Christian Ehrhardt ]
* d/p/ubuntu/
tolerate guests with secure boot loaders (LP: #1830243)
[ Rafael David Tinoco ]
* {Ice,Cascade}Lake CPUs + IA32_ARCH_
Needed patches are in d/p/u/lp1828495-:
- 0001-guidance-
docs: add guidance on configuring CPU models for x86
+ d/qemu-
- 0002-msr-
i386: Add new MSR indices for IA32_PRED_CMD and IA32_ARCH_
- 0003-cpuid-
i386: Add CPUID bit and feature words for IA32_ARCH_
- 0004-cpuid-
i386: Add CPUID bit for WBNOINVD
- 0005-new-
i386: Add new CPU model Icelake-
- 0006-update-
update Linux headers to 4.16-rc5
- 0007-kvm-
kvm: Add support to KVM_GET_
- 0008-x86-
x86: Data structure changes to support MSR based features
- 0009-feature-
x86: define a new MSR based feature word -- FEATURE_WORDS_ARCH
- 0010-use-
kvm: Use KVM_GET_
- 0011-disable-
i386: kvm: Disable arch_capabilities if MSR can't be set
- 0012-arch-
i386: Make arch_capabilities migratable
- 0013-cascadelak
i386: Add new model of Cascadelake-Server
- 0014-remove-
i386: remove the new CPUID 'PCONFIG' from Icelake-Server CPU model
- 0015-remove-
i386: remove the 'INTEL_PT' CPUID bit from named CPU models
- 0016-no-
i386: Disable OSPKE on CPU model definitions
-- Rafael David Tinoco <email address hidden> Mon, 05 Aug 2019 19:12:08 +0000
Changed in qemu (Ubuntu Bionic): | |
status: | Fix Committed → Fix Released |
Changed in ubuntu-z-systems: | |
status: | Fix Committed → Fix Released |
------- Comment From <email address hidden> 2019-08-14 03:38 EDT-------
IBM Bugzilla status -> closed, Fix Released with Eoan
Strongly assuming that this should be targeted towards 19.10 (like in the tags) and not 19.04 (like in the headline) I adjusted the headline to 19.10, too.
Will set to Incomplete for now until code got released and will discuss internally ...