[Bug 1959965] Re: [22.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - s390-tools part
Frank Heimes
1959965 at bugs.launchpad.net
Fri Oct 18 11:40:46 UTC 2024
A new test build was done in PPA:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1959965-2nd
And the packages were again tested in the same infrastructure like before
and all tests were completed successful this time (normal zdump and zdump in SE).
Hence I'm attaching the new deddiff here and prepare for a new upload...
** Attachment added: "debdiffs_2nd.tgz"
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/1959965/+attachment/5829451/+files/debdiffs_2nd.tgz
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to s390-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1959965
Title:
[22.04 FEAT] KVM: Secure Execution guest dump encryption with customer
keys - s390-tools part
Status in Ubuntu on IBM z Systems:
Fix Released
Status in s390-tools package in Ubuntu:
Fix Released
Status in s390-tools-signed package in Ubuntu:
Fix Released
Status in s390-tools source package in Jammy:
Fix Committed
Status in s390-tools-signed source package in Jammy:
Fix Committed
Bug description:
SRU Justification:
------------------
[ Impact ]
* Hypervisor-initiated dumps for Secure Execution (aka confidential computing)
guests (on s390x) are not helpful because memory and CPU state is encrypted
by a transient key only available to the Ultravisor.
* Workload owners can still configure kdump in order to obtain kernel crash
information, but there are situation where kdump doesn't work.
* In such situations problem determination is severely impeded.
* This patch set solves this by implementing dumps created in a way
that can only be decrypted by the owner of the guest image
and be used for problem determination.
[ Test Plan ]
* The setup of a Secure Execution environment is not trivial
and requires a certain set of hardware (IBM z15 or higher)
with FC 115).
* On top of the modification of qemu that are handled in this
LP bug, modifications of the Kernel (LP#1959940) and
the qemu (LP#1959966) are required on top.
* Modified Ubuntu kernel and qemu test builds are needed or
both should be in -proposed at a similar time (which might
be difficult).
A modified s390-tools is what this LP bug is all about.
It can be found at this PPA:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1959965
(kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1959940j
qemu: https://launchpad.net/~sergiodj/+archive/ubuntu/qemu/+packages)
* A detailed description (using Ubuntu as example) on how to setup
secure execution is available here:
Introducing IBM Secure Execution for Linux, April 2024 update
https://www.ibm.com/docs/en/linuxonibm/pdf/lx24se04.pdf
* And information on 'Working with dumps of KVM guests in
IBM Secure Execution mode' is again available here:
https://www.ibm.com/docs/en/linux-on-systems?topic=commands-zgetdump#czgetdump__se_dump_examples
* Due to the special requirements, the test and validation will be done
by IBM (like already be done for Kernel (LP#1959940) and qemu (LP#1959966).
* On top is is needed to still test the normal dump procedure
(in a non-secure-execution) environment as well,
to test for potential regressions on top, incl. attestation.
[ Where problems could occur ]
* The vast majority of patches are in the area of zdump,
which is IBM Z aka s390x specific.
* So the modifications here are not only needed for Secure Execution guest
dump encryption with customer keys, but could potentially also affect
normal dumps (without secure execution),
hence this should be regression tested as well.
* The code/modifications here are all upstream since 24.04 and
to some extend also tested on this Ubuntu level.
But the structure in the s390-tools meanwhile changed slightly,
hence the two adjustments needed in commits:
d/p/lp-1959965-zdump-dfi-add-support-to-read-Protected-Virtualizati.patch
and d/p/lp-1959965-zdump-Makefile-add-basic-libpv-support.patch
* There is a certain danger that additionally needed adjustments were missed,
but a test compile and the test plan would mitigate that risk.
* The changes in the libraries/macros libpv and zt_common are
largely be addressed by the test build.
* Since the pvattest tools got patches as well, attestation
could be impacted as well, hence having this in the test plan, too.
[ Other Info ]
* Since 22.04 is a popular LTS release, it is already in use by many
secure execution customers.
But in case of severe crashes or issues in the secure execution
(KVM) guests dumps cannot be used as of today.
* This enables customers, IBM and Canonical to get support in case of
crashes/dumps on hardware that runs secure execution environments.
__________
KVM: Secure Execution guest dump encryption with customer keys -
s390-tools part
Description:
Hypervisor-initiated dumps for Secure Execution guests are not helpful because memory and CPU state is encrypted by a transient key only available to the Ultravisor. Workload owners can still configure kdump in order to obtain kernel crash infomation, but there are situation where kdump doesn't work. In such situations problem determination is severely impeded. This feature will implement dumps created in a way that can only be decrypted by the owner of the guest image and be used for problem determination.
Request Type: Package - Update Version
Upstream Acceptance: In Progress
Code Contribution: IBM code
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959965/+subscriptions
More information about the foundations-bugs
mailing list