** Description changed: + SRU Justification: + ================== + + [Impact] + + * Unable to maintain control-only crypto domains + + * The communication to control-only domains does not work in any way. + + * And depending on the setup (lowest numerical domain is control-only) + the TKE does not see the crypto card at all. + + [Fix] + + * 7379e652797c0b9b5f6caea1576f2dff9ce6a708 7379e65 "s390/zcrypt: Fix + wrong dispatching for control domain CPRBs" + + * Backport: + https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+attachment/5271392/+files/s390 + -zcrypt-Fix-wrong-dispatching-for-control-domain.patch + + [Test Case] + + * Configure a control-only domain to the activation profile of LPAR A + + * Configure a control-and-usage domain to the activation profile of LPAR + B + + * Try to communicate to LPAR A with the control-only domain (e.g. trying + to read or set master key) + + [Regression Potential] + + * The regression potential can be considered as moderate since this is + purely s390x specific + + * and again limited to CryptoExpress adapter cards. + + * It only occurs if crypto domains are configured as control-only or + better control-only in combination with control-and-usage. + + * The majority of configurations is control-and-usage, since this offers + more flexibility and covers more use cases. + + + [Other Info] + + * Problem was found during tests at IBM and is a so called 'preventive + fix' + + * The given patch is supposed to fis this issue and became upstream + accepted with kernel 5.2-rc3. + + * It applies cleanly to disco master-next while cherry-picking, but + needs the the backport (from comment #3) for bionic's master-next kernel + 4.15. + + __________ + Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned. - Such a domain can be controlled (for example master keys can - be set) but can't be used for regualar crypto load (usage). - A crypto domain may be assigned for control-and-usage to - only one active LPAR. But the very same domain may be - assigned for control-only to one or more other LPARs. - However, trying to communicate in any way with a - control-only crypto domain did not work. So a simple query - for the state of the master keys on a control-only domain - failed and the TKE does not even show this domain. Even - worse, when the lowest domain (in a numerically sense) is a - control-only domain, the TKE does not even see the crypto - cards at all. + Such a domain can be controlled (for example master keys can + be set) but can't be used for regualar crypto load (usage). + A crypto domain may be assigned for control-and-usage to + only one active LPAR. But the very same domain may be + assigned for control-only to one or more other LPARs. + However, trying to communicate in any way with a + control-only crypto domain did not work. So a simple query + for the state of the master keys on a control-only domain + failed and the TKE does not even show this domain. Even + worse, when the lowest domain (in a numerically sense) is a + control-only domain, the TKE does not even see the crypto + cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is - addressing a control-only domain. If that's the case and - there is a default control-and-usage domain available the - CPRB is send to this other domain instead. The target domain - field within the CPRB is untouched and the crypto card - firmware code detects this working-as-designed mismatch and - does the right job and addresses the control domain. + addressing a control-only domain. If that's the case and + there is a default control-and-usage domain available the + CPRB is send to this other domain instead. The target domain + field within the CPRB is untouched and the crypto card + firmware code detects this working-as-designed mismatch and + does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of - an LPAR and re-activate the LPAR. - 2. Connect the TKE the LPAR and try to visit the master key - verification patterns of this control-only domain. - 3. Will fail without the fix, will succeed with the fix. + an LPAR and re-activate the LPAR. + 2. Connect the TKE the LPAR and try to visit the master key + verification patterns of this control-only domain. + 3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832624 Title: [UBUNTU] kernel: Fix wrong dispatching for control domain CPRBs Status in Ubuntu on IBM z Systems: In Progress Status in linux package in Ubuntu: New Bug description: SRU Justification: ================== [Impact] * Unable to maintain control-only crypto domains * The communication to control-only domains does not work in any way. * And depending on the setup (lowest numerical domain is control-only) the TKE does not see the crypto card at all. [Fix] * 7379e652797c0b9b5f6caea1576f2dff9ce6a708 7379e65 "s390/zcrypt: Fix wrong dispatching for control domain CPRBs" * Backport: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+attachment/5271392/+files/s390 -zcrypt-Fix-wrong-dispatching-for-control-domain.patch [Test Case] * Configure a control-only domain to the activation profile of LPAR A * Configure a control-and-usage domain to the activation profile of LPAR B * Try to communicate to LPAR A with the control-only domain (e.g. trying to read or set master key) [Regression Potential] * The regression potential can be considered as moderate since this is purely s390x specific * and again limited to CryptoExpress adapter cards. * It only occurs if crypto domains are configured as control-only or better control-only in combination with control-and-usage. * The majority of configurations is control-and-usage, since this offers more flexibility and covers more use cases. [Other Info] * Problem was found during tests at IBM and is a so called 'preventive fix' * The given patch is supposed to fis this issue and became upstream accepted with kernel 5.2-rc3. * It applies cleanly to disco master-next while cherry-picking, but needs the the backport (from comment #3) for bionic's master-next kernel 4.15. __________ Description: kernel: Fix wrong dispatching for control domain CPRBs Symptom: Unable to maintain control-only crypto domains Problem: LPARs may have control-only crypto domains assigned. Such a domain can be controlled (for example master keys can be set) but can't be used for regualar crypto load (usage). A crypto domain may be assigned for control-and-usage to only one active LPAR. But the very same domain may be assigned for control-only to one or more other LPARs. However, trying to communicate in any way with a control-only crypto domain did not work. So a simple query for the state of the master keys on a control-only domain failed and the TKE does not even show this domain. Even worse, when the lowest domain (in a numerically sense) is a control-only domain, the TKE does not even see the crypto cards at all. Solution: This fix introduces some code which checks if an CCA CPRB is addressing a control-only domain. If that's the case and there is a default control-and-usage domain available the CPRB is send to this other domain instead. The target domain field within the CPRB is untouched and the crypto card firmware code detects this working-as-designed mismatch and does the right job and addresses the control domain. Reproduction: 1. Add a control-only domain to the crypto configuration of an LPAR and re-activate the LPAR. 2. Connect the TKE the LPAR and try to visit the master key verification patterns of this control-only domain. 3. Will fail without the fix, will succeed with the fix. Component: kernel Upstream-ID: 7379e652797c0b9b5f6caea1576f2dff9ce6a708 This fix is requested for 19.10 but should also be applied to 18.04 and 19.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1832624/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp