Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forwarding-porting and retesting of upstream intel patchset for SGX and OpenStack #246

Open
1 of 3 tasks
Tracked by #39
fkr opened this issue Jan 17, 2023 · 11 comments
Open
1 of 3 tasks
Tracked by #39
Assignees
Labels
IaaS Issues or pull requests relevant for Team1: IaaS
Milestone

Comments

@fkr
Copy link
Member

fkr commented Jan 17, 2023

The patchset from Intel (https://github.com/intel/secured-cloud-management-stack/) for bringing SGX needs to forward-porting and retesting. This story is about making sure stories that cover:

  • forward-porting
  • re-testing and
  • upstreaming

of the patchset exist.
The stories should be small enough so that each can be finished in one sprint.

Definition of Done:

@fkr fkr added the IaaS Issues or pull requests relevant for Team1: IaaS label Jan 17, 2023
@fkr fkr added this to the R4 (v5.0.0) milestone Jan 17, 2023
@berendt
Copy link
Member

berendt commented Jan 18, 2023

1st step:

  • nova
  • python-novaclient
  • python-openstackclient

2nd step:

  • ironic
  • kolla-ansible
  • skyline

@fkr fkr removed this from the R4 (v5.0.0) milestone Apr 27, 2023
@fkr fkr added this to the R6 (v7.0.0) milestone Oct 19, 2023
@fkr
Copy link
Member Author

fkr commented Dec 12, 2023

The unit tests are running successfully now, however launching sgx-enabled workloads is not possible, neither via horizon nor via api.

@fkr
Copy link
Member Author

fkr commented Dec 12, 2023

I will get in touch with @mleberec in order to establish contacts between OSISM and the intel engineers.

@mleberec
Copy link

@fkr - thanks. @berendt - give me a ping to follow up.

@berendt
Copy link
Member

berendt commented Dec 14, 2023

Prepared patch sets & first documentation is available in the https://github.com/osism/secured-cloud-management-stack repository.

@gndrmnn
Copy link

gndrmnn commented Jan 23, 2024

  • The forward porting of the nova patches to the latest commit required a lot of work. See initial commit of the above repo. All unit tests should pass, if the patches are applied to 167e3380c946ffb07622a8c8079fa1b22b8c5543
  • To get QEMU to canonically spawn SGX instances we need: Kernel 5.13+, QEMU 7+, libvirt 8.10+ therefore the host system was upgraded to Ubuntu 23.10.
  • There is an unsolved problem with the placement API, which automatically purges the CUSTOM_SGX_EPC_MB inventory class every few minutes. For development purposes we solved this by being fast with creating the class and spawning the instances. This needs a proper fix in the placement API long term.
  • We had problems spawning SGX instances from nova, because of cryptic permission errors. It turns out it was an AppArmor problem and the Intel documentation was not up to date. Solved by disabling the security_driver in libvirt for the time being.
  • With the changes to the patch set applied in Getting nova to spawn a SGX instance osism/secured-cloud-management-stack#1 we got to spawn an SGX instance using nova successfully.

@fkr
Copy link
Member Author

fkr commented Jan 26, 2024

We should probably see about getting in touch with nova people before vPTG so that we can discuss upstreaming the effort during the d-cycle.

@fkr
Copy link
Member Author

fkr commented Feb 7, 2024

Legal requirements have been solved, the Intel Repository now carries a valid LICENSE file.

@gndrmnn
Copy link

gndrmnn commented Feb 8, 2024

Nova patch set was rebased on an upstream commit from 2024

New base commit is 6531ed6310c4c11ee807e10d1a0fa91658c3afea

@gndrmnn
Copy link

gndrmnn commented Feb 21, 2024

@fkr
Copy link
Member Author

fkr commented Feb 21, 2024

thanks @gndrmnn for keeping this updated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
IaaS Issues or pull requests relevant for Team1: IaaS
Projects
Status: Doing
Development

No branches or pull requests

4 participants