** Description changed:

+ SRU Justification:
+ ==================
+ 
+ [Impact]
+ 
+ * A qeth device on a DPM-managed (HMC) IBM Z machine does not obtain its
+ MAC address for layer2 OSD interfaces from the OSA Network Adapter,
+ instead it uses a random MAC address.
+ 
+ * This can cause connectivity issues in environments where reliable and
+ pre-determined MAC addresses are required, ie. when doing network
+ configuration based on DHCP.
+ 
+ [Fix]
+ 
+ * Backport 1: https://launchpadlibrarian.net/481647649/0001-s390-qeth-
+ improve-fallback-to-random-MAC-address.patch
+ 
+ * Backport 2: https://launchpadlibrarian.net/481647657/0002-s390-qeth-
+ utilize-virtual-MAC-for-Layer2-OSD-devices.patch
+ 
+ [Test Case]
+ 
+ * Bring up a qeth L2 OSD interface in DPM-managed (HMC) LPAR
+ 
+ * Inspect the interface's MAC address. It should be the same as
+ displayed in the HMC DPM panels.
+ 
+ * Due to the fact that a system is needed where the HMC is in DPM moce
+ (rather than in classic mode) this needs to be tested by IBM.
+ 
+ [Regression Potential]
+ 
+ * There is a certain risk for a regression, since OSA devices are the
+ standard netweork devices on s390x.
+ 
+ * But static network configurations are still more popular for the
+ usually long running workload on s390x and not dynamic assignments.
+ 
+ * On the other hand qeth devices are s390x only, so this will at least
+ not affect common code or code for other architectures.
+ 
+ * The modifications are limited to drivers/s390/net/qeth_*.
+ 
+ * The patches are upstream since quite a while, which speaks for their
+ stability.
+ 
+ [Other Info]
+ 
+ * The upstream patch 21b1702af12e "s390/qeth: improve fallback to random
+ MAC address" got upstream accepted with 4.18, hence is already in all
+ Ubuntu release that are newer than bionic
+ 
+ * And the upstream patch b144b99fff69 "s390/qeth: utilize virtual MAC
+ for Layer2 OSD devices" got upstream accepted with 5.0, hence is also
+ already in all Ubuntu release that are newer than bionic.
+ 
+ __________
+ 
  == Comment: #0 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-04-22 
14:44:31 ==
  +++ This bug was initially created as a clone of Bug #184073 +++
  
  This bug is a follow on to LP 1866909 to address a missing piece - only
  half the following patch was included in 5.4.0-24.28.
  
  The upstream patch has an additional fix but it?s not critical for GA.
  It can get included as part of bug fixes. It also affects only power.
  The patch("powerpc/ima: fix secure boot rules in ima arch policy") is
  posted to linux-integrity and linuxppc-dev mailing list
  (https://lore.kernel.org/linux-integrity/1586549618-6106-1-git-send-
  email-na...@linux.ibm.com/T/#u)
  
  If there are any issues identified during further testing, they will get
  opened as separate issue to be addressed later.
  
  Thanks & Regards,
-    - Nayna
+    - Nayna
  
  == Comment: #4 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-05-11 
02:23:35 ==
  Updated posting:
  
  https://lore.kernel.org/linux-integrity/1588342612-14532-1-git-send-
  email-na...@linux.ibm.com/T/#u

** Description changed:

  SRU Justification:
  ==================
  
  [Impact]
  
- * A qeth device on a DPM-managed (HMC) IBM Z machine does not obtain its
- MAC address for layer2 OSD interfaces from the OSA Network Adapter,
- instead it uses a random MAC address.
+ * Currently the kernel module appended signature is verified twice
+ (finit_module) - once by the module_sig_check() and again by IMA.
  
- * This can cause connectivity issues in environments where reliable and
- pre-determined MAC addresses are required, ie. when doing network
- configuration based on DHCP.
+ * To prevent this the powerpc secure boot rules define an IMA
+ architecture specific policy rule only if CONFIG_MODULE_SIG_FORCE is not
+ enabled.
+ 
+ * But this doesn't take the ability into account of enabling
+ "sig_enforce" at the boot command line (module.sig_enforce=1).
+ 
+ * Including the IMA module appraise rule results in failing the
+ finit_module syscall, unless the module signing public key is loaded
+ onto the IMA keyring.
+ 
+ * This patch fixes secure boot policy rules to be based on
+ CONFIG_MODULE_SIG instead.
  
  [Fix]
  
- * Backport 1: https://launchpadlibrarian.net/481647649/0001-s390-qeth-
- improve-fallback-to-random-MAC-address.patch
- 
- * Backport 2: https://launchpadlibrarian.net/481647657/0002-s390-qeth-
- utilize-virtual-MAC-for-Layer2-OSD-devices.patch
+ * fa4f3f56ccd28ac031ab275e673ed4098855fed4 fa4f3f56ccd2 "powerpc/ima:
+ Fix secure boot rules in ima arch policy"
  
  [Test Case]
  
- * Bring up a qeth L2 OSD interface in DPM-managed (HMC) LPAR
+ * Perform a secure boot on a powerpc system with 'module.sig_enforce=1'
+ set at the boot command.
  
- * Inspect the interface's MAC address. It should be the same as
- displayed in the HMC DPM panels.
+ * If the IMA module appraise rule is included, the finit_module syscall
+ will fail (unless the module signing public key got loaded onto the IMA
+ keyring) without having the patch in place.
  
- * Due to the fact that a system is needed where the HMC is in DPM moce
- (rather than in classic mode) this needs to be tested by IBM.
+ * The verificatiob needs to be done by the IBM Power team.
  
  [Regression Potential]
  
- * There is a certain risk for a regression, since OSA devices are the
- standard netweork devices on s390x.
+ * There is (always) a certain regression risk with having code changes,
+ especially in the secure boot area.
  
- * But static network configurations are still more popular for the
- usually long running workload on s390x and not dynamic assignments.
+ * But this patch is limited to the powerpc platform and will not affect
+ any other architecture.
  
- * On the other hand qeth devices are s390x only, so this will at least
- not affect common code or code for other architectures.
+ * It got discussed at 
https://lore.kernel.org/r/1588342612-14532-1-git-send-email-na...@linux.ibm.com
+   before it became finally upstream accepted with kernel 5.7-rc7.
  
- * The modifications are limited to drivers/s390/net/qeth_*.
+ * The secure boot code itself wasn't really touched, rather than it's basis 
for execution.
+   The IMA policy rule for module appraisal is now added only if 
'CONFIG_MODULE_SIG' is not enabled (instead of CONFIG_MODULE_SIG_FORCE).
+   Hence the change is very limited and straightforward.
  
- * The patches are upstream since quite a while, which speaks for their
- stability.
+ [Other]
  
- [Other Info]
- 
- * The upstream patch 21b1702af12e "s390/qeth: improve fallback to random
- MAC address" got upstream accepted with 4.18, hence is already in all
- Ubuntu release that are newer than bionic
- 
- * And the upstream patch b144b99fff69 "s390/qeth: utilize virtual MAC
- for Layer2 OSD devices" got upstream accepted with 5.0, hence is also
- already in all Ubuntu release that are newer than bionic.
- 
+ * Since the patch got upstream with 5.7-rc7, it is already in groovy, hence 
this SRU is for focal only.
  __________
  
  == Comment: #0 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-04-22 
14:44:31 ==
  +++ This bug was initially created as a clone of Bug #184073 +++
  
  This bug is a follow on to LP 1866909 to address a missing piece - only
  half the following patch was included in 5.4.0-24.28.
  
  The upstream patch has an additional fix but it?s not critical for GA.
  It can get included as part of bug fixes. It also affects only power.
  The patch("powerpc/ima: fix secure boot rules in ima arch policy") is
  posted to linux-integrity and linuxppc-dev mailing list
  (https://lore.kernel.org/linux-integrity/1586549618-6106-1-git-send-
  email-na...@linux.ibm.com/T/#u)
  
  If there are any issues identified during further testing, they will get
  opened as separate issue to be addressed later.
  
  Thanks & Regards,
     - Nayna
  
  == Comment: #4 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-05-11 
02:23:35 ==
  Updated posting:
  
  https://lore.kernel.org/linux-integrity/1588342612-14532-1-git-send-
  email-na...@linux.ibm.com/T/#u

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1877955

Title:
  Fix for secure boot rules in IMA arch policy on powerpc

Status in The Ubuntu-power-systems project:
  Incomplete
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  SRU Justification:
  ==================

  [Impact]

  * Currently the kernel module appended signature is verified twice
  (finit_module) - once by the module_sig_check() and again by IMA.

  * To prevent this the powerpc secure boot rules define an IMA
  architecture specific policy rule only if CONFIG_MODULE_SIG_FORCE is
  not enabled.

  * But this doesn't take the ability into account of enabling
  "sig_enforce" at the boot command line (module.sig_enforce=1).

  * Including the IMA module appraise rule results in failing the
  finit_module syscall, unless the module signing public key is loaded
  onto the IMA keyring.

  * This patch fixes secure boot policy rules to be based on
  CONFIG_MODULE_SIG instead.

  [Fix]

  * fa4f3f56ccd28ac031ab275e673ed4098855fed4 fa4f3f56ccd2 "powerpc/ima:
  Fix secure boot rules in ima arch policy"

  [Test Case]

  * Perform a secure boot on a powerpc system with
  'module.sig_enforce=1' set at the boot command.

  * If the IMA module appraise rule is included, the finit_module
  syscall will fail (unless the module signing public key got loaded
  onto the IMA keyring) without having the patch in place.

  * The verificatiob needs to be done by the IBM Power team.

  [Regression Potential]

  * There is (always) a certain regression risk with having code
  changes, especially in the secure boot area.

  * But this patch is limited to the powerpc platform and will not
  affect any other architecture.

  * It got discussed at 
https://lore.kernel.org/r/1588342612-14532-1-git-send-email-na...@linux.ibm.com
    before it became finally upstream accepted with kernel 5.7-rc7.

  * The secure boot code itself wasn't really touched, rather than it's basis 
for execution.
    The IMA policy rule for module appraisal is now added only if 
'CONFIG_MODULE_SIG' is not enabled (instead of CONFIG_MODULE_SIG_FORCE).
    Hence the change is very limited and straightforward.

  [Other]

  * Since the patch got upstream with 5.7-rc7, it is already in groovy, hence 
this SRU is for focal only.
  __________

  == Comment: #0 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-04-22 
14:44:31 ==
  +++ This bug was initially created as a clone of Bug #184073 +++

  This bug is a follow on to LP 1866909 to address a missing piece -
  only half the following patch was included in 5.4.0-24.28.

  The upstream patch has an additional fix but it?s not critical for GA.
  It can get included as part of bug fixes. It also affects only power.
  The patch("powerpc/ima: fix secure boot rules in ima arch policy") is
  posted to linux-integrity and linuxppc-dev mailing list
  (https://lore.kernel.org/linux-integrity/1586549618-6106-1-git-send-
  email-na...@linux.ibm.com/T/#u)

  If there are any issues identified during further testing, they will
  get opened as separate issue to be addressed later.

  Thanks & Regards,
     - Nayna

  == Comment: #4 - Michael Ranweiler <mranw...@us.ibm.com> - 2020-05-11 
02:23:35 ==
  Updated posting:

  https://lore.kernel.org/linux-integrity/1588342612-14532-1-git-send-
  email-na...@linux.ibm.com/T/#u

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1877955/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to