Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1438397 - EFI stub: ERROR: Could not determine UEFI Secure Boot status.
Summary: EFI stub: ERROR: Could not determine UEFI Secure Boot status.
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 26
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Paolo Bonzini
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-04-03 10:50 UTC by poma
Modified: 2023-09-12 01:15 UTC (History)
17 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-05-29 12:05:56 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description poma 2017-04-03 10:50:16 UTC
With OVMF:
$ rpm -qf /usr/share/edk2/ovmf/OVMF_CODE.secboot.fd
edk2-ovmf-20170209git296153c5-2.fc24.noarch

...........................................

$ uname -r
4.9.17-100.fc24.x86_64

$ dmesg -t | grep -i 'edk\|secure'
efi: EFI v2.60 by EDK II
Secure boot enabled
ACPI: BGRT 0x000000006E815000 000038 (v01 INTEL  EDK2     00000002      01000013)
EFI: Loaded cert 'Fedora Secure Boot CA: fde32599c2d61db1bf5807335d7b20e4cd963b42' linked to '.builtin_trusted_keys'

........................................


EFI stub: ERROR: Could not determine UEFI Secure Boot status.

$ uname -r
4.10.8-100.fc24.x86_64

$ dmesg -t | grep -i 'edk\|secure'
efi: EFI v2.60 by EDK II
Secure boot disabled
ACPI: BGRT 0x000000006E815000 000038 (v01 INTEL  EDK2     00000002      01000013)


ovmf.png
https://bugzilla.redhat.com/attachment.cgi?id=1267832
EFI stub: ERROR: Could not determine UEFI Secure Boot status.
>= 4.10.x

Comment 1 poma 2017-04-03 11:02:14 UTC
Something relevant is obviously changed in the kernel >= 4.10.x,
be it upstream or downstream,
considering that Secure boot works seamlessly with the kernel <= 4.9.x.

Comment 2 David Howells 2017-04-03 16:06:55 UTC
Actually, secure boot doesn't work since a bug in grub causes the secure boot flag worked out in the efi boot wrapper to get sanitised away before the main kernel gets to see it.  See bug 1418360.

Comment 3 poma 2017-04-04 14:38:44 UTC
(In reply to David Howells from comment #2)
> Actually, secure boot doesn't work since a bug in grub causes the secure
> boot flag worked out in the efi boot wrapper to get sanitised away before
> the main kernel gets to see it.  See bug 1418360.

Thank you for your response, I left a comment there.

*** This bug has been marked as a duplicate of bug 1418360 ***

Comment 4 David Howells 2017-04-04 15:37:58 UTC
This bz isn't really a duplicate of the grub bug.  The error message you have an issue with is from the kernel's EFI boot wrapper, saying that it can't manage to determine the secure boot status from the UEFI BIOS.

What happens in the kernel is:

 (1) The EFI boot wrapper stores a flag in boot_params to note the outcome of the secure boot mode determination.  This is where the "EFI stub: ERROR: Could not determine UEFI Secure Boot status." is emitted.

 (2) The decompressor calls sanitize_boot_params(), which sees that the boot_params were incorrectly set up by grub and clears parts of boot_params, including the secure_boot flag.  This is bug 1418360.

 (3) In the main kernel, setup_arch() looks at the flag and sees the cleared value.

Comment 6 Laura Abbott 2018-02-28 03:52:23 UTC
We apologize for the inconvenience.  There is a large number of bugs to go through and several of them have gone stale. The kernel moves very fast so bugs may get fixed as part of a kernel update. Due to this, we are doing a mass bug update across all of the Fedora 26 kernel bugs.
 
Fedora 26 has now been rebased to 4.15.4-200.fc26.  Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.
 
If you have moved on to Fedora 27, and are still experiencing this issue, please change the version to Fedora 27.
 
If you experience different issues, please open a new bug report for those.

Comment 7 Fedora End Of Life 2018-05-03 08:24:51 UTC
This message is a reminder that Fedora 26 is nearing its end of life.
Approximately 4 (four) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 26. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '26'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 26 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged  change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.

Comment 8 Fedora End Of Life 2018-05-29 12:05:56 UTC
Fedora 26 changed to end-of-life (EOL) status on 2018-05-29. Fedora 26
is no longer maintained, which means that it will not receive any
further security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.

Comment 9 Red Hat Bugzilla 2023-09-12 01:15:03 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days


Note You need to log in before you can comment on or make changes to this bug.