------- Comment From grgo.mari...@ibm.com 2024-08-23 06:09 EDT------- We installed from ppa:canonical-kernel-team/unstable: # cat /etc/os-release PRETTY_NAME="Ubuntu Oracular Oriole (development branch)" NAME="Ubuntu" VERSION_ID="24.10" VERSION="24.10 (Oracular Oriole)" VERSION_CODENAME=oracular ... ... # apt search linux-image-6.11 linux-image-6.11.0-4-generic/oracular,now 6.11.0-4.4 s390x [installed,automatic] Signed kernel image generic # uname -r 6.11.0-4-generic # grep [0-9] /sys/firmware/ipl/*sec* /sys/firmware/ipl/has_secure:1 /sys/firmware/ipl/secure:0
# ls -l /boot/vmlinuz /boot/initrd.img lrwxrwxrwx 1 root root 27 Aug 23 09:08 /boot/initrd.img -> initrd.img-6.11.0-4-generic lrwxrwxrwx 1 root root 24 Aug 23 09:08 /boot/vmlinuz -> vmlinuz-6.11.0-4-generic load with kernel vmlinuz-6.11.0-4-generic - without secure boot enable - without adding the signature IPB received. IPB sent. System version 9. Watchdog enabled. Running 'ZBootLoader' version '3.3.5' level 'D51C.D51C_328.24'. --- Audit message summary start --- MLOLOA62693210 Audit: Signature verification failure for component 3 in program 0 loaded from device HBA:0.0.1900,WWPN:500507630700572C,LUN:4051402C00000000. MLOLOA62693210 Audit: Signature verification failure for component 5 in program 0 loaded from device HBA:0.0.1900,WWPN:500507630700572C,LUN:4051402C00000000. --- Audit message summary end --- OK00000000 Success load with kernel vmlinuz-6.11.0-4-generic - with secure boot enable - without adding the signature IPB received. IPB sent. System version 9. Watchdog enabled. Running 'ZBootLoader' version '3.3.5' level 'D51C.D51C_328.24'. --- Audit message summary start --- MLOLOA62693210 Audit: Signature verification failure for component 3 in program 0 loaded from device HBA:0.0.1900,WWPN:500507630700572C,LUN:4051402C00000000. MLOLOA62693210 Audit: Signature verification failure for component 5 in program 0 loaded from device HBA:0.0.1900,WWPN:500507630700572C,LUN:4051402C00000000. --- Audit message summary end --- MLOLOA6269321F A security violation error was encountered when loading from devi ce HBA:0.0.1900,WWPN:500507630700572C,LUN:4051402C00000000. IPL failed (110). load with kernel vmlinuz-6.11.0-4-generic - with secure boot enable - with adding the signature IPB received. IPB sent. System version 9. Watchdog enabled. Running 'ZBootLoader' version '3.3.5' level 'D51C.D51C_328.24'. OK00000000 Success [ 0.078590] Linux version 6.11.0-4-generic (buildd@bos02-s390x-011) (s390x-linux-gnu-gcc-14 (Ubuntu 14.2.0-3ubuntu1) 14.2.0, GNU ld (GNU Binutils for Ubuntu) 2.43.1) #4-Ubuntu SMP Tue Aug 20 14:03:40 UTC 2024 (Ubuntu 6.11.0-4.4-generic 6.11.0-rc4) [ 0.078592] setup: Linux is running natively in 64-bit mode [ 0.078593] setup: Linux is running with Secure-IPL enabled [ 0.078593] setup: The IPL report contains the following components: [ 0.078594] setup: 0000000000002000 - 0000000000006000 (not signed) [ 0.078596] setup: 0000000000009000 - 0000000000009200 (not signed) [ 0.078597] setup: 000000000000a000 - 000000000000e000 (signed, verified) [ 0.078598] setup: 000000000000f000 - 0000000000010000 (not signed) [ 0.078599] setup: 0000000000010000 - 0000000000a0b000 (signed, verified) [ 0.078601] setup: 0000000000a0c000 - 0000000000a0c200 (not signed) [ 0.078602] setup: 0000000000a1c000 - 0000000000a1d000 (not signed) [ 0.078603] setup: 0000000000a20000 - 00000000022dcc00 (not signed) [ 0.078604] Kernel is locked down from Secure IPL mode; see man kernel_lockdown.7 After secure boot load # grep [0-9] /sys/firmware/ipl/*sec* /sys/firmware/ipl/has_secure:1 /sys/firmware/ipl/secure:1 we used these Certificate: # openssl x509 -text -in sipl1.x509 Certificate: Data: Version: 3 (0x2) Serial Number: a1:b6:a0:75:09:df:f4:18 Signature Algorithm: sha512WithRSAEncryption Issuer: CN = PPA canonical-kernel-team unstable SIPL Validity Not Before: Aug 23 20:47:25 2019 GMT Not After : Aug 20 20:47:25 2029 GMT Subject: CN = PPA canonical-kernel-team unstable SIPL ... ... # openssl x509 -text -in sipl2.x509 Certificate: Data: Version: 3 (0x2) Serial Number: ee:61:db:02:41:ef:d1:06 Signature Algorithm: sha512WithRSAEncryption Issuer: C = GB, ST = Isle of Man, L = Douglas, O = Canonical Ltd., OU = Secure Boot, CN = "Canonical Ltd. Secure Boot Signing (ZIPL, 2019)" Validity Not Before: May 16 13:50:05 2019 GMT Not After : May 14 13:50:05 2049 GMT Subject: C = GB, ST = Isle of Man, L = Douglas, O = Canonical Ltd., OU = Secure Boot, CN = "Canonical Ltd. Secure Boot Signing (ZIPL, 2019)" .. this was tested on our Z16 machine No problems detected. Secure boot works as expected. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2077540 Title: [24.10] Please test secure-boot and lockdown on the 6.11 kernel (s390x) for Oracular Status in Ubuntu on IBM z Systems: New Status in linux package in Ubuntu: New Bug description: The Canonical kernel team is working on a new 6.11 kernel for 'oracular' (24.10) and has an early build ready for secure-boot and lockdown testing (version 6.11.0-4.4). To avoid potentially negative implications that a broken secure-boot lockdown functionality would cause (esp. using the production key), we ask to get secure-boot tested early in the cycle using Canonical kernel team's PPA key for signature. The early test build is available at: ppa:canonical-kernel-team/unstable (https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/unstable/) The PPA key used for signing can be found in the tarball available here: https://ppa.launchpad.net/canonical-kernel-team/unstable/ubuntu/dists/devel/main/signed/linux-generate-unstable-s390x/current/ (Please note that this kernel is coming from the 'canonical-kernel- team' PPA, hence it is NOT signed with the regular archive/release/production key, instead with the above PPA's key!) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2077540/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp