<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Thu, Jun 16, 2016 at 4:49 PM, Tim Gardner <span dir="ltr"><<a href="mailto:tim.gardner@canonical.com" target="_blank">tim.gardner@canonical.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">These patches in support of<br>
(<a href="https://blueprints.launchpad.net/ubuntu/+spec/foundations-x-installing-unsigned-secureboot" rel="noreferrer" target="_blank">https://blueprints.launchpad.net/ubuntu/+spec/foundations-x-installing-unsigned-secureboot</a>)<br>
have languished on this list since late April. All of the kernels have<br>
been built and tested by myself and Mathieu Trudel-Lapierre. Andy<br>
Whitcroft has asserted to me in private that they are difficult to<br>
review and can only really be tested for functionality. Furthermore,<br>
this patch set has been released in Xenial in a substantially similar form.<br>
<br>
Therefore I propose to apply them for this SRU cycle with the<br>
enforcement config option disabled. This at least exercises some of the<br>
more complex code that accesses the UEFI firmware.<br>
<br>
git://<a href="http://kernel.ubuntu.com/rtg/ubuntu-trusty.git" rel="noreferrer" target="_blank">kernel.ubuntu.com/rtg/ubuntu-trusty.git</a><br>
lts-backport-utopic-enforce-signed-modules<br>
git://<a href="http://kernel.ubuntu.com/rtg/ubuntu-wily.git" rel="noreferrer" target="_blank">kernel.ubuntu.com/rtg/ubuntu-wily.git</a> enforce-signed-modules<br>
git://<a href="http://kernel.ubuntu.com/rtg/ubuntu-vivid.git" rel="noreferrer" target="_blank">kernel.ubuntu.com/rtg/ubuntu-vivid.git</a> enforce-signed-modules<br>
<br>
All opposed say Aye.<br>
<br clear="all"></blockquote><div><br></div><div>Aye, provisionally.<br><br></div><div>I've tested xenial and trusty to some level of confidence; both seem to work correctly at least with the latest lts-* kernels where appropriate. I have yet to test wily and precise -- trusty and xenial did take time to carefully make sure you could upgrade packages within the release (either installing dkms packages after the SRU applied, or installing DKMS and then the SRU) and then upgrading to a newer release (trusty->xenial and xenial->yakkety). All of these are upgrade paths that need to continue to work.<br><br></div><div>I'm not opposed to doing the SRU for these two releases, but it does need to land *along* with the useland packages that allow using the functionality.<br><br></div></div><br>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><br>Mathieu Trudel-Lapierre <<a href="mailto:mathieu.trudel-lapierre@canonical.com" target="_blank">mathieu.trudel-lapierre@canonical.com</a>><br>Freenode: cyphermox, Jabber: <a href="mailto:mathieu.tl@gmail.com" target="_blank">mathieu.tl@gmail.com</a><br>4096R/65B58DA1 818A D123 0992 275B 23C2 CF89 C67B B4D6 65B5 8DA1<br></div></div></div></div></div></div>
</div></div>