/srv/irclogs.ubuntu.com/2016/06/22/#ubuntu-kernel.txt

=== cpaelzer is now known as cpaelzer_lunch
=== cpaelzer_lunch is now known as cpaelzer
=== inaddy is now known as tinoco
=== ara is now known as Guest21851
rtgcyphermox, there is a full suite of signed module enforcement kernels at ppa:canonical-kernel-team/unstable. Lemme know if there are any gaps.12:36
cyphermoxrtg: thanks. have you taken a look at the test matrix?13:34
rtgcyphermox, have you told me where it is ? if so, I've forgotten13:35
cyphermoxrtg: I sent it by email, but here it is: https://docs.google.com/spreadsheets/d/1GbyQDb4-sRv7OlIpbISiwVJ2ARHP3AkG2HbPTRk7p-E/edit#gid=013:36
cyphermoxfirst page is the matrix; second page is kernel test cases, last page (still needs to be fleshed out) is the userland-side tests13:36
cyphermoxI set up scripts to make it easy to spin up VMs with the right keys and Secure Boot enabled13:36
cyphermoxrtg: I'd still like to know if the test cases I wrote up there match up with however you were testing things on your side so far13:37
rtgcyphermox, k, lemme look through them13:37
rtgcyphermox, I actually used fwts-dkms, but bbswitch ought to produce the same result wrt secure boot13:38
cyphermoxright, I only picked that one because I knew this one built13:39
cyphermoxrtg: trusty lts-wily fails validation here -- everything looks as though SB is enabled; yet it loads the module14:06
rtgcyphermox, ok14:07
cyphermoxis there anything I can check?14:08
cyphermox /proc/sys/kernel/secure_boot  is 0, and so is moksbstate_disabled 14:08
rtgcyphermox, it should be working. I'll check in a  bit14:08
cyphermoxcould it be that the build I got is one that doesn't enforce?14:08
rtgcyphermox, oh, secure_boot shuold be 114:08
cyphermoxright, it should14:09
cyphermoxbut the firmware does show SecureBoot-(UUID) is 6 0 0 0 114:10
cyphermoxie. Secure Boot is enabled.14:10
rtgcyphermox, anything in dmesg ?14:10
cyphermoxwhat should I look for?14:10
rtgdmesg|grep Secure14:10
cyphermoxnope14:11
rtghmm. ok, gimme a bit to check it out14:11
cyphermoxI suppose it may be that MokSBState is still set wrong, but the kernel should have noticed and logged something14:11
rtgcyphermox, yes, it should say that SB is disabled because MOKSBState is non-zero14:12
cyphermoxwell, I don't know whether MokSBState is zero or not14:13
cyphermoxAre you checking the variable as MOKSBState or MokSBState? in case it's case-sensitive14:13
rtgMOKSBState14:14
cyphermoxshould be "MokSBState"14:14
cyphermoxbut I'm not sure if that's suppose to be case-sensitive.14:14
rtghuh14:15
cyphermoxI think the variable would *not* be there at all if SB is enabled14:15
=== tyhicks` is now known as tyhicks
cyphermoxif I'm to follow efivarfs code, looks like it might be case-sensitive, maybe that's the issue14:18
rtgcertainly couldn't hurt14:18
cyphermoxrtg: you're looking into whether this might be the issue?14:30
rtgcyphermox, soon14:30
rtgtrying to wrap up a rebase14:30
cyphermoxwhat worries me is that it looked like xenial did things correctly, but lts-xenial clearly doesn't14:31
cyphermoxie. on xenial if sb is enabled, modules are not loaded14:31
rtgyou said wily I thought14:31
cyphermoxoh, right14:32
cyphermoxbut it's irrelevant, they should be using pretty much the same code for the SB magic.14:32
rtgcyphermox, is there a difference in behavior between wily and lts-wily ?14:32
cyphermoxI will be able to tell you later (currently on a trusty install)14:33
cyphermoxI'm writing a xenial image to USB now, and upgrading the trusty machine to lts-xenial14:34
cyphermoxerr, I mean writing wily to usb14:34
cyphermoxtoo many releases14:34
cyphermoxhrm, well lts-xenial on trusty is also letting things through14:41
cyphermoxok, looks like the lts-wily kernel is looking for the right variable14:47
rtgcyphermox, case likely isn't the culprit (unless this is wrong):14:52
rtgarch/x86/boot/compressed/eboot.c:                               L"MokSBState", &var_guid, &attr, &datasize,14:52
rtgstill getting my trusty instance spooled up14:53
cyphermoxright, that's just what I was saying14:54
cyphermoxand anyway, the kernel seems to think SecureBoot is off14:54
cyphermoxexcept od -t u1 -An /sys/firmware/efi/efivars/SecureBoot-* shows it's set to 114:55
cyphermoxgoing to try to reset everything in the BIOS to see14:56
cyphermoxrtg: I don't know what to make of this, it looks at though none of the code is working -- the writing of the files in /proc should happen correctly regardless of whether enforcing is done or not, and  if enforcing is enabled, we should see something other than a sdhci message in dmesg | grep Secure15:07
cyphermoxie. looks like the enforcing isn't being enabled either.15:07
cyphermoxsource for lts-wily has 15:07
cyphermoxarch/x86/kernel/setup.c:#ifdef CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE15:08
cyphermoxdebian/changelog:  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:08
cyphermoxdebian.master/config/config.common.ubuntu:CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:08
cyphermoxdebian.master/changelog:  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:08
cyphermoxdebian.wily/config/config.common.ubuntu:CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:08
cyphermoxdebian.wily/changelog:  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:08
cyphermoxnot sure whether that's all it should have or if there should be a debian.trusty directory15:08
rtgcyphermox, looks like enforcement is enabled to me15:08
cyphermoxexcept that still won't fix the writing files to /proc part.15:08
cyphermoxright15:08
rtgdebian.wily/config/config.common.ubuntu:CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y15:09
cyphermoxI don't know, but something is clearly broken15:09
cyphermoxthat's for trusty's lts-wily though, is it correct for it to be set in a debian.wily directory?15:09
cyphermoxI'm grasping at straws, I have no idea how your build process works.15:09
rtgcyphermox, yes, that looks correct.15:09
cyphermoxvery well15:10
cyphermoxwell, moving on to testing wily itself now, and I'll leave the debugging in your hands.15:10
rtgcyphermox, looks like trusty isn't right either.15:11
rtgrtg@ubuntu:~$ dmesg|grep Secure15:11
rtg[    0.000000] Secure boot enabled15:11
rtgrtg@ubuntu:~$ cat /proc/sys/kernel/secure_boot 15:11
rtg015:11
rtgrtg@ubuntu:~$ cat /proc/sys/kernel/moksbstate_disabled 15:11
rtg015:11
cyphermoxthat's what I was just saying15:12
cyphermoxexcept I don't even get the Secure boot enabled message15:12
cyphermoxSecure Boot is most definitely enabled on my test machine15:12
rtgcyphermox, in my case it means the user keys are enrolled correctly, but the secure boot state isn't getting save 15:13
rtgsaved*15:13
rtgok, gimme a bit and I'll find it15:13
=== ara is now known as Guest30555
rtgcyphermox, should I expect the MOK util enable/disable dialog when installing a DKMS package on Trusty ?16:09
cyphermoxif you're using my PPA too, yes16:19
rtgcyphermox, oh, I'm not. that'll make a difference16:20
cyphermoxyeah, and you should take care when you install as it will removed grub2-signed; and change the efi BootEntry16:21
rtgcyphermox, what is your PPA ?16:22
cyphermoxI don't think the userland should make much of a difference for testing the kernel bits though16:22
cyphermoxppa:cyphermox/efi16:22
rtgI might as well test against it16:22
rtgcyphermox, I re-uploaded trusty. lts-utopic looks like it is working OK16:23
cyphermoxok, so to work around the fact that things are signed by my PPA key rather than the Canonical key, you'll want to go download http://archive.ubuntu.com/ubuntu/dists/trusty-updates/main/uefi/grub2-amd64/current/grubx64.efi.signed16:23
cyphermoxyou need to replace /boot/efi/EFI/ubuntu/grubx64.efi with that file.16:23
cyphermox(so grub is correctly signed)16:23
rtgcyphermox, can't I just re-sign using my local keys ?16:24
cyphermoxand also run:  sudo efibootmgr -b *whatever ubuntu is at, 0018 for instance, depends what efibootmgr -v says*; sudo efibootmgr -c -L ubuntu -l \\EFI\\ubuntu\\shimx64.efi16:24
cyphermoxrtg: well, sure, you can resign with your keys if you want16:24
rtgcyphermox, that is a lot easier in my setup16:25
cyphermoxthe efibootmgr commands still probably will need to be done though16:25
cyphermoxI'll fix that shortly16:26
cyphermoxrtg: I don't know, did you reupload lts-utopic earlier?16:28
rtgwhoops, forgot the efibootmgr command.16:28
cyphermoxoh, I didn't test lts-utopic I think16:29
rtgcyphermox, trusty is the only kernel I've re-uploaded16:29
ckingbjf, what's the story on the arm64 wily boot saga?16:43
bjfcking, checking16:44
cyphermoxrtg: have you looked at lts-wily though? doesn't look to me like the issue is the same at all16:58
cyphermoxie. there is that setbit call there.16:58
rtgcyphermox, still recovering from your grub package update. I think I'll not do that again.17:04
cyphermoxyou should be able to disable SB in BIOS to get booting17:06
cyphermoxrtg: can you ping me as soon as you have things working correctly for secure_boot and moksbstate_disabled; so I know where we're at?17:36
rtgcyphermox, I'll be testing lts-vivid here in a sec18:07
cyphermoxrtg: could we focus first and foremost on having trusty, lts-wily, lts-xenial, and xenial working correctly?18:09
rtgworking on it18:09
cyphermoxsince lts-wily is what's installed by default if you install from 14.04.4.18:09
rtgcyphermox, ok, I'm comfortable that all the LTS kernels work. 19:09
cyphermoxrtg: ok; are things in the ppa?19:23
rtgcyphermox, yeah, the trusty kernel is still building, but I'm pretty sure it'll be OK19:24
rtgI'm gonna work on vivid/wily just be be sure those kernels work as well, but they should since the LTS kernels are built from identical sources19:25
cyphermoxwell, they will only work if you just did some code change, it was very obviously broken19:29
rtgcyphermox, indeed. vivid seems to work just fine.19:38
cyphermoxwhat do you mean by "vivid"?19:39
rtgcyphermox, 15.04 19:40
cyphermox15.04 is EOL, we don't care about it.19:41
rtgcyphermox, lts-vivid is still built from the vivid kernel19:41
cyphermoxI'd really just like to see either trusty's linux-image-generic or linux-image-lts-wily-generic working so that I can feel like we did some kind of progress today19:41
rtglts-wily works for me19:42
cyphermoxcan you build all the kernels and signed kernels in the PPA so we can do one last pass tomorrow and be good to do the SRUs ?19:56
rtgcyphermox, they are already built.19:57
rtgI'm not sure what you mean19:57
cyphermoxwhat I mean is that to do proper testing, you should be able to add the PPA; then upgrade, and things would just work.19:57
rtgcyphermox, that is pretty much waht I've been doing19:58
cyphermoxand re-signing stuff? or doing some other steps?19:59
rtgcyphermox, oh, I've had to re-sign but I think that is acceptable19:59
rtgI can't build an archive signed kernel in a PPA anyways19:59
cyphermoxI do to, since you're building in a PPA; but any other steps would show that the process is broken20:00
rtgsigning the kernel after update is the only "extra" step20:00
cyphermoxfair enough20:00
cyphermoxthen let me finish this update and I'll check lts-wily again20:01
rtgcyphermox, I'm about EOD20:01
cyphermoxplease wait so you can know whether this is still exploding20:02
cyphermox2 minutes.20:02
cyphermoxI'm still getting secure_boot == 0 on lts-wily.20:03
cyphermoxoh, wait20:03
cyphermoxthat's without re-signing, hold on20:03
rtgcyphermox, is it signed ?20:03
rtgnever mind20:03
cyphermoxlooks fine, so to you we're good to SRU this crap?20:09
rtgcyphermox, all of the kernel patches have been accepted and applied. they'll appear in the next SRU cycle.20:10
cyphermoxand the corrolary to this is "can we upload it all to -proposed queues tomorrow rather than friday?"20:10
rtgcyphermox, for that you will have to coordinate with bjf or kamal20:11
cyphermoxwell, if it's automated stuff that will just land if the patches are accepted and whatnot and merged in the right places, then that's fine20:11
rtgcyphermox, I dare not get in the middle of the stable team process :)20:11
cyphermoxit doesn't have to be tomorrow; I'm just curious because friday is a national holiday for me.20:12
rtgyes, they are all on the master-next branch20:12
cyphermoxvery well20:12
cyphermoxfor all the relevant releases?20:12
rtgcyphermox, I think kamal packages everything beginning on Monday20:12
cyphermoxdoes that include precise too?20:12
cyphermoxok20:12
rtgyup20:12
kamalrtg, cyphermox: yes, we'll start a new cycle (for all of them) on Monday20:12
cyphermoxprecise is with enforcing disabled iirc?20:12
rtgcyphermox, yes, enforcement is disabled in lts-trusty (i.e., precise)20:13
cyphermoxok20:13
cyphermoxwell, sounds like we're good then, thanks!20:14
rtgcyphermox, yup, cheers.20:17
=== danjared_ is now known as danjared
=== JanC_ is now known as JanC

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!