From: Zhuoying Cai <zycai@linux.ibm.com>
To: Thomas Huth <thuth@redhat.com>,
berrange@redhat.com, richard.henderson@linaro.org,
jrossi@linux.ibm.com, qemu-s390x@nongnu.org,
qemu-devel@nongnu.org
Cc: david@kernel.org, walling@linux.ibm.com, jjherne@linux.ibm.com,
pasic@linux.ibm.com, borntraeger@linux.ibm.com,
farman@linux.ibm.com, mjrosato@linux.ibm.com, iii@linux.ibm.com,
eblake@redhat.com, armbru@redhat.com, alifm@linux.ibm.com,
brueckner@linux.ibm.com
Subject: Re: [PATCH v8 28/30] tests/functional/s390x: Add secure IPL functional test
Date: Tue, 3 Mar 2026 17:07:43 -0500 [thread overview]
Message-ID: <7582a154-7f9f-4161-bf39-8d20930a1d27@linux.ibm.com> (raw)
In-Reply-To: <8fe43e9c-45de-467f-89c0-241f87c5e716@redhat.com>
Thanks for the feedback.
On 3/2/26 8:35 AM, Thomas Huth wrote:
> On 12/02/2026 21.43, Zhuoying Cai wrote:
>> Add functional test for secure IPL.
>
> Thanks for adding it! Some comments below...
>
>> Signed-off-by: Zhuoying Cai <zycai@linux.ibm.com>
>> ---
>> tests/functional/s390x/meson.build | 2 +
>> tests/functional/s390x/test_secure_ipl.py | 142 ++++++++++++++++++++++
>> 2 files changed, 144 insertions(+)
>> create mode 100644 tests/functional/s390x/test_secure_ipl.py
>>
>> diff --git a/tests/functional/s390x/meson.build b/tests/functional/s390x/meson.build
>> index 70cd36e291..cb050f3c01 100644
>> --- a/tests/functional/s390x/meson.build
>> +++ b/tests/functional/s390x/meson.build
>> @@ -2,6 +2,7 @@
>>
>> test_s390x_timeouts = {
>> 'ccw_virtio' : 420,
>> + 'secure_ipl' : 280,
>> }
>>
>> tests_s390x_system_quick = [
>> @@ -12,6 +13,7 @@ tests_s390x_system_thorough = [
>> 'ccw_virtio',
>> 'pxelinux',
>> 'replay',
>> + 'secure_ipl',
>> 'topology',
>> 'tuxrun',
>> ]
>> diff --git a/tests/functional/s390x/test_secure_ipl.py b/tests/functional/s390x/test_secure_ipl.py
>> new file mode 100644
>
> chmod a+x please, so we can also run this test directly, without the meson
> test harness.
>
>> index 0000000000..c95553e4e9
>> --- /dev/null
>> +++ b/tests/functional/s390x/test_secure_ipl.py
>> @@ -0,0 +1,142 @@
>> +#!/usr/bin/env python3
>> +#
>> +# s390x Secure IPL functional test: validates secure-boot verification results
>> +#
>> +# SPDX-License-Identifier: GPL-2.0-or-later
>> +
>> +from qemu_test import QemuSystemTest, Asset
>> +from qemu_test import exec_command_and_wait_for_pattern, exec_command
>> +from qemu_test import wait_for_console_pattern, skipBigDataTest
>> +
>> +class S390xSecureIpl(QemuSystemTest):
>> + ASSET_F40_QCOW2 = Asset(
>> + ('https://archives.fedoraproject.org/pub/archive/'
>> + 'fedora-secondary/releases/40/Server/s390x/images/'
>> + 'Fedora-Server-KVM-40-1.14.s390x.qcow2'),
>> + '091c232a7301be14e19c76ce9a0c1cbd2be2c4157884a731e1fc4f89e7455a5f')
>> +
>> + def __init__(self, *args, **kwargs):
>> + super().__init__(*args, **kwargs)
>> + self.root_password = None
>> + self.qcow2_path = None
>> + self.cert_path = None
>> + self.prompt = None
>> +
>> + # Boot a temporary VM to set up secure IPL image:
>> + # - Create certificate
>> + # - Sign stage3 binary and kernel
>> + # - Run zipl
>> + # - Extract certificate
>> + def setup_s390x_secure_ipl(self):
>> + temp_vm = self.get_vm(name='sipl_setup')
>> + temp_vm.set_machine('s390-ccw-virtio')
>> +
>> + self.qcow2_path = self.ASSET_F40_QCOW2.fetch()
>> +
>> + temp_vm.set_console()
>> + temp_vm.add_args('-nographic',
>> + '-accel', 'kvm',
>> + '-m', '1024',
>> + '-drive',
>> + f'id=drive0,if=none,format=qcow2,file={self.qcow2_path}',
>
> Assets are stored as read-only in the cache, so this should fail? Did you
> maybe copy the asset manually into your cache?
>
> Anyway, I think you certainly want to operate on a "copy" of your asset
> instead (done with "qemu-img -b ..." to use the original asset as backing
> file), so you don't alter the original asset while running the test.
>
I’ll create a copy and set it up instead of using the original asset.
>> + '-device', 'virtio-blk-ccw,drive=drive0,bootindex=1')
>> + temp_vm.launch()
>> +
>> + # Initial root account setup (Fedora first boot screen)
>> + self.root_password = 'fedora40password'
>> + wait_for_console_pattern(self, 'Please make a selection from the above',
>> + vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self, '4', 'Password:', vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self, self.root_password,
>> + 'Password (confirm):', vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self, self.root_password,
>> + 'Please make a selection from the above',
>> + vm=temp_vm)
>> +
>> + # Login as root
>> + self.prompt = '[root@localhost ~]#'
>> + exec_command_and_wait_for_pattern(self, 'c', 'localhost login:', vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self, 'root', 'Password:', vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self, self.root_password, self.prompt,
>> + vm=temp_vm)
>> +
>> + # Certificate generation
>> + exec_command_and_wait_for_pattern(self,
>> + 'openssl version', 'OpenSSL 3.2.1 30',
>> + vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self,
>> + 'openssl req -new -x509 -newkey rsa:2048 '
>> + '-keyout mykey.pem -outform PEM -out mycert.pem '
>> + '-days 36500 -subj "/CN=My Name/" -nodes -verbose',
>> + 'Writing private key to \'mykey.pem\'', vm=temp_vm)
>> +
>> + # Install kernel-devel (needed for sign-file)
>> + exec_command_and_wait_for_pattern(self,
>> + 'sudo dnf install kernel-devel-$(uname -r) -y',
>> + 'Complete!', vm=temp_vm)
>> + wait_for_console_pattern(self, self.prompt, vm=temp_vm)
>> + exec_command_and_wait_for_pattern(self,
>> + 'ls /usr/src/kernels/$(uname -r)/scripts/',
>> + 'sign-file', vm=temp_vm)
>> +
>> + # Sign stage3 binary and kernel
>> + exec_command(self, '/usr/src/kernels/$(uname -r)/scripts/sign-file '
>> + 'sha256 mykey.pem mycert.pem /lib/s390-tools/stage3.bin',
>> + vm=temp_vm)
>> + wait_for_console_pattern(self, self.prompt, vm=temp_vm)
>> + exec_command(self, '/usr/src/kernels/$(uname -r)/scripts/sign-file '
>> + 'sha256 mykey.pem mycert.pem /boot/vmlinuz-$(uname -r)',
>> + vm=temp_vm)
>> + wait_for_console_pattern(self, self.prompt, vm=temp_vm)
>> +
>> + # Run zipl to prepare for secure boot
>> + exec_command_and_wait_for_pattern(self, 'zipl --secure 1 -VV', 'Done.',
>> + vm=temp_vm)
>> +
>> + # Extract certificate to host
>> + out = exec_command_and_wait_for_pattern(self, 'cat mycert.pem',
>> + '-----END CERTIFICATE-----',
>> + vm=temp_vm)
>> + # strip first line to avoid console echo artifacts
>> + cert = "\n".join(out.decode("utf-8").splitlines()[1:])
>> + self.log.info("%s", cert)
>> +
>> + self.cert_path = self.scratch_file("mycert.pem")
>> +
>> + with open(self.cert_path, 'w', encoding="utf-8") as file_object:
>> + file_object.write(cert)
>> +
>> + # Shutdown temp vm
>> + temp_vm.shutdown()
>> +
>> + @skipBigDataTest()
>> + def test_s390x_secure_ipl(self):
>> + self.require_accelerator('kvm')
>
> Could this test also be run with TCG?
>
> Thomas
>
>
No, this test will not work with TCG due to the test setup.
The Fedora Server qcow2 image has the root account locked by default.
Under TCG, the system boots much more slowly and drops into emergency
mode while the root account is still locked. As a result, the test
cannot proceed because login is not possible.
QEMU (TCG) log shows:
Cannot open access to console, the root account is locked.
See sulogin(8) man page for more details. Press Enter to continue.
...
There are also repeated SELinux AVC denials (e.g., access to z90crypt),
indicating the system reaches emergency state before completing normal
initialization.
Therefore, this test cannot run under TCG with the current image and setup.
>> + self.setup_s390x_secure_ipl()
>> +
>> + self.set_machine('s390-ccw-virtio')
>> +
>> + self.vm.set_console()
>> + self.vm.add_args('-nographic',
>> + '-machine', 's390-ccw-virtio,secure-boot=on,'
>> + f'boot-certs.0.path={self.cert_path}',
>> + '-accel', 'kvm',
>> + '-m', '1024',
>> + '-drive',
>> + f'id=drive1,if=none,format=qcow2,file={self.qcow2_path}',
>> + '-device', 'virtio-blk-ccw,drive=drive1,bootindex=1')
>> + self.vm.launch()
>> +
>> + # Expect two verified components
>> + verified_output = "Verified component"
>> + wait_for_console_pattern(self, verified_output)
>> + wait_for_console_pattern(self, verified_output)
>> +
>> + # Login and verify the vm is booted using secure boot
>> + wait_for_console_pattern(self, 'localhost login:')
>> + exec_command_and_wait_for_pattern(self, 'root', 'Password:')
>> + exec_command_and_wait_for_pattern(self, self.root_password, self.prompt)
>> + exec_command_and_wait_for_pattern(self, 'cat /sys/firmware/ipl/secure', '1')
>> +
>> +if __name__ == '__main__':
>> + QemuSystemTest.main()
>
next prev parent reply other threads:[~2026-03-03 22:08 UTC|newest]
Thread overview: 72+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-12 20:43 [PATCH v8 00/30] Secure IPL Support for SCSI Scheme of virtio-blk/virtio-scsi Devices Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 01/30] Add boot-certs to s390-ccw-virtio machine type option Zhuoying Cai
2026-02-17 8:30 ` Markus Armbruster
2026-02-12 20:43 ` [PATCH v8 02/30] crypto/x509-utils: Refactor with GNUTLS fallback Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 03/30] crypto/x509-utils: Add helper functions for certificate store Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 04/30] hw/s390x/ipl: Create " Zhuoying Cai
2026-02-26 16:02 ` Thomas Huth
2026-02-28 1:45 ` Zhuoying Cai
2026-03-05 21:34 ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 05/30] s390x/diag: Introduce DIAG 320 for Certificate Store Facility Zhuoying Cai
2026-02-27 12:41 ` Thomas Huth
2026-02-28 1:47 ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 06/30] s390x/diag: Refactor address validation check from diag308_parm_check Zhuoying Cai
2026-02-27 12:46 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 07/30] s390x/diag: Implement DIAG 320 subcode 1 Zhuoying Cai
2026-02-27 12:58 ` Thomas Huth
2026-02-28 2:15 ` Zhuoying Cai
2026-02-28 12:51 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 08/30] crypto/x509-utils: Add helper functions for DIAG 320 subcode 2 Zhuoying Cai
2026-02-28 13:43 ` Thomas Huth
2026-03-03 21:02 ` Zhuoying Cai
2026-03-04 7:26 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 09/30] s390x/diag: Implement " Zhuoying Cai
2026-02-17 8:18 ` Markus Armbruster
2026-02-17 21:29 ` Zhuoying Cai
2026-02-28 2:25 ` Zhuoying Cai
2026-02-28 14:07 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 10/30] s390x/diag: Introduce DIAG 508 for secure IPL operations Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 11/30] crypto/x509-utils: Add helper functions for DIAG 508 subcode 1 Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 12/30] s390x/diag: Implement DIAG 508 subcode 1 for signature verification Zhuoying Cai
2026-03-03 20:22 ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 13/30] s390x/ipl: Introduce IPL Information Report Block (IIRB) Zhuoying Cai
2026-03-03 20:38 ` Farhan Ali
2026-02-12 20:43 ` [PATCH v8 14/30] pc-bios/s390-ccw: Define memory for IPLB and convert IPLB to pointers Zhuoying Cai
2026-03-02 9:56 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 15/30] hw/s390x/ipl: Add IPIB flags to IPL Parameter Block Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 16/30] s390x: Guest support for Secure-IPL Facility Zhuoying Cai
2026-03-02 10:03 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 17/30] pc-bios/s390-ccw: Refactor zipl_run() Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 18/30] pc-bios/s390-ccw: Rework zipl_load_segment function Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 19/30] pc-bios/s390-ccw: Add signature verification for secure IPL in audit mode Zhuoying Cai
2026-03-02 10:48 ` Thomas Huth
2026-03-03 21:46 ` Farhan Ali
2026-03-04 22:17 ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 20/30] pc-bios/s390-ccw: Add signed component address overlap checks Zhuoying Cai
2026-03-02 11:01 ` Thomas Huth
2026-03-03 22:07 ` Farhan Ali
2026-03-03 22:36 ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 21/30] s390x: Guest support for Secure-IPL Code Loading Attributes Facility (SCLAF) Zhuoying Cai
2026-02-17 8:06 ` Markus Armbruster
2026-02-17 8:19 ` Markus Armbruster
2026-02-12 20:43 ` [PATCH v8 22/30] pc-bios/s390-ccw: Add additional security checks for secure boot Zhuoying Cai
2026-03-02 11:24 ` Thomas Huth
2026-03-03 21:17 ` Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 23/30] Add secure-boot to s390-ccw-virtio machine type option Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 24/30] hw/s390x/ipl: Set IPIB flags for secure IPL Zhuoying Cai
2026-03-02 11:34 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 25/30] pc-bios/s390-ccw: Handle true secure IPL mode Zhuoying Cai
2026-03-02 12:53 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 26/30] hw/s390x/ipl: Handle secure boot with multiple boot devices Zhuoying Cai
2026-03-02 12:59 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 27/30] hw/s390x/ipl: Handle secure boot without specifying a boot device Zhuoying Cai
2026-02-12 20:43 ` [PATCH v8 28/30] tests/functional/s390x: Add secure IPL functional test Zhuoying Cai
2026-03-02 13:35 ` Thomas Huth
2026-03-03 22:07 ` Zhuoying Cai [this message]
2026-02-12 20:43 ` [PATCH v8 29/30] docs/specs: Add secure IPL documentation Zhuoying Cai
2026-03-02 13:45 ` Thomas Huth
2026-02-12 20:43 ` [PATCH v8 30/30] docs/system/s390x: " Zhuoying Cai
2026-02-17 8:06 ` Markus Armbruster
2026-02-17 8:20 ` Markus Armbruster
2026-02-17 20:29 ` Zhuoying Cai
2026-03-02 16:24 ` Thomas Huth
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7582a154-7f9f-4161-bf39-8d20930a1d27@linux.ibm.com \
--to=zycai@linux.ibm.com \
--cc=alifm@linux.ibm.com \
--cc=armbru@redhat.com \
--cc=berrange@redhat.com \
--cc=borntraeger@linux.ibm.com \
--cc=brueckner@linux.ibm.com \
--cc=david@kernel.org \
--cc=eblake@redhat.com \
--cc=farman@linux.ibm.com \
--cc=iii@linux.ibm.com \
--cc=jjherne@linux.ibm.com \
--cc=jrossi@linux.ibm.com \
--cc=mjrosato@linux.ibm.com \
--cc=pasic@linux.ibm.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-s390x@nongnu.org \
--cc=richard.henderson@linaro.org \
--cc=thuth@redhat.com \
--cc=walling@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.