Hi,

On 28/06/2024 12:52, Cyril Brulebois wrote:
> Cyril Brulebois <k...@debian.org> (2024-06-28):
>> I've just built a netboot-gtk mini.iso against unstable, including the
>> new kernel. A regular “almost all defaults” (except French to check
>> things like translations, keymap fun, etc.) install on UEFI gave an
>> overall successful installation according to d-i, but it doesn't boot:
>>
>>      Verifying shim SBAT data failed: Security Policy Violation

I see this too in my QEMU with UEFI secure boot turned on (I am running testing on my host). I've used an older live ISO image, which I have successfully booted in the past, and it shows the same error message, before turning the VM off.

I've rebuilt some live images (standard) [2], and only the sid image is booting fine. The official debian-live-12.6.0-amd64-standard.iso has the same issue (I've verified the sha256sum)

The error message originate from shim:
https://sources.debian.org/src/shim/15.8-1/shim.c/#L1932
https://sources.debian.org/src/shim/15.7-1/shim.c/#L1736

It turns out, that my UEFI variables are causing this issue.
When I use the unmodified OVMF_VARS_4M.ms.fd, all images I mentioned earlier boot properly.

The offending file could not be attached, it is too big for this mailing list. I can send it by private mail.

Who can find out which part in this file is causing the issue? Or which tools do I need to use to debug this?

With kind regards,
Roland Clobus

[1] debian-live-12.4.0-amd64-gnome.iso
[2] bookworm, testing and sid

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to