2021-07-21 16:21:58 |
Leó Kolbeinsson |
bug |
|
|
added bug |
2021-07-21 16:26:26 |
Leó Kolbeinsson |
summary |
Unable to install Impish daily in UEFI boot mode |
Unable to install Ubuntu Impish daily in UEFI boot mode |
|
2021-07-21 17:03:44 |
Ubuntu QA Website |
tags |
|
iso-testing |
|
2021-07-21 18:01:27 |
Leó Kolbeinsson |
summary |
Unable to install Ubuntu Impish daily in UEFI boot mode |
Unable to install Impish daily in UEFI boot mode |
|
2021-07-21 18:46:48 |
Leó Kolbeinsson |
bug |
|
|
added subscriber Lubuntu Packages Team |
2021-07-22 01:54:29 |
Launchpad Janitor |
syslinux (Ubuntu): status |
New |
Confirmed |
|
2021-07-22 03:46:39 |
Chris Guiver |
summary |
Unable to install Impish daily in UEFI boot mode |
Unable to boot/install Impish daily in UEFI boot mode |
|
2021-07-22 06:47:27 |
Chris Guiver |
tags |
iso-testing |
amd64 impish iso-testing |
|
2021-07-23 20:59:45 |
Brian Murray |
tags |
amd64 impish iso-testing |
amd64 impish iso-testing rls-ii-incoming |
|
2021-07-25 12:40:40 |
Leó Kolbeinsson |
attachment added |
|
20210725_112354.jpg https://bugs.launchpad.net/ubuntu/+source/syslinux/+bug/1937115/+attachment/5513520/+files/20210725_112354.jpg |
|
2021-07-26 00:15:21 |
Michael Hudson-Doyle |
affects |
syslinux (Ubuntu) |
grub2 (Ubuntu) |
|
2021-07-26 07:13:40 |
Julian Andres Klode |
affects |
grub2 (Ubuntu) |
shim (Ubuntu) |
|
2021-07-26 07:16:02 |
Julian Andres Klode |
shim (Ubuntu): status |
Confirmed |
Incomplete |
|
2021-07-26 08:18:43 |
Julian Andres Klode |
tags |
amd64 impish iso-testing rls-ii-incoming |
amd64 impish iso-testing regression-proposed rls-ii-incoming |
|
2021-07-26 12:39:22 |
Dimitri John Ledkov |
bug task added |
|
cd-boot-images-amd64 (Ubuntu) |
|
2021-07-28 19:32:53 |
Launchpad Janitor |
cd-boot-images-amd64 (Ubuntu): status |
New |
Confirmed |
|
2021-07-29 15:17:36 |
Matthieu Clemenceau |
tags |
amd64 impish iso-testing regression-proposed rls-ii-incoming |
amd64 fr-1533 impish iso-testing regression-proposed rls-ii-incoming |
|
2021-07-29 15:23:42 |
Łukasz Zemczak |
shim (Ubuntu): importance |
Undecided |
Critical |
|
2021-07-29 15:23:44 |
Łukasz Zemczak |
cd-boot-images-amd64 (Ubuntu): importance |
Undecided |
Critical |
|
2021-07-29 16:09:44 |
Brian Murray |
nominated for series |
|
Ubuntu Impish |
|
2021-07-29 16:09:44 |
Brian Murray |
bug task added |
|
shim (Ubuntu Impish) |
|
2021-07-29 16:09:44 |
Brian Murray |
bug task added |
|
cd-boot-images-amd64 (Ubuntu Impish) |
|
2021-07-29 16:09:55 |
Brian Murray |
tags |
amd64 fr-1533 impish iso-testing regression-proposed rls-ii-incoming |
amd64 fr-1533 impish iso-testing regression-proposed |
|
2021-07-29 16:10:20 |
Brian Murray |
nominated for series |
|
Ubuntu Focal |
|
2021-07-29 16:10:20 |
Brian Murray |
bug task added |
|
shim (Ubuntu Focal) |
|
2021-07-29 16:10:20 |
Brian Murray |
bug task added |
|
cd-boot-images-amd64 (Ubuntu Focal) |
|
2021-07-29 16:10:29 |
Brian Murray |
shim (Ubuntu Focal): milestone |
|
ubuntu-20.04.3 |
|
2021-07-29 20:32:54 |
Julian Andres Klode |
shim (Ubuntu Impish): status |
Incomplete |
Triaged |
|
2021-07-29 20:32:57 |
Julian Andres Klode |
shim (Ubuntu Impish): status |
Triaged |
In Progress |
|
2021-07-29 20:33:01 |
Julian Andres Klode |
cd-boot-images-amd64 (Ubuntu Impish): status |
Confirmed |
Triaged |
|
2021-07-29 22:46:30 |
Chris Guiver |
attachment added |
|
sudo tar -zcvf sony_crap.gz /sys/firmware/efi/efivars/Boot* https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1937115/+attachment/5514658/+files/sony_crap.gz |
|
2021-07-30 09:08:27 |
sudodus |
attachment added |
|
dell-latitude-e7240.tar.gz https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1937115/+attachment/5514824/+files/dell-latitude-e7240.tar.gz |
|
2021-07-30 09:15:50 |
Leó Kolbeinsson |
attachment added |
|
opti7060.gz https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1937115/+attachment/5514825/+files/opti7060.gz |
|
2021-08-04 18:49:47 |
Launchpad Janitor |
cd-boot-images-amd64 (Ubuntu Focal): status |
New |
Confirmed |
|
2021-08-04 18:49:47 |
Launchpad Janitor |
shim (Ubuntu Focal): status |
New |
Confirmed |
|
2021-08-04 18:54:30 |
Adam Reviczky |
attachment added |
|
tarball of EFI boot https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1937115/+attachment/5515877/+files/boot.tar |
|
2021-08-05 09:35:08 |
Julian Andres Klode |
description |
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
|
2021-08-05 09:35:28 |
Julian Andres Klode |
tags |
amd64 fr-1533 impish iso-testing regression-proposed |
amd64 fr-1533 impish iso-testing regression-proposed regression-update |
|
2021-08-05 09:35:54 |
Julian Andres Klode |
description |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
|
2021-08-05 09:36:08 |
Julian Andres Klode |
description |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471 introduced in shim 15.4-0ubuntu7.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
|
2021-08-05 09:36:55 |
Julian Andres Klode |
description |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471 introduced in shim 15.4-0ubuntu7.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471 introduced in shim 15.4-0ubuntu7.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 (https://github.com/rhboot/shim/pull/399) disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
|
2021-08-06 11:16:16 |
Julian Andres Klode |
description |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471 introduced in shim 15.4-0ubuntu7.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply three patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patch 3 (https://github.com/rhboot/shim/pull/399) disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
[Impact]
Removable media fail to boot on some machines due to garbage in firmware generated boot entries. This is a regression from LP: #1929471 introduced in shim 15.4-0ubuntu7.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/365 to fix a potential buffer overflow.
In addition we also cherry-pick https://github.com/rhboot/shim/pull/396 to fix possible firmware corruption in the fallback loader due to out-of-bounds access to the boot order array.
[Test plan]
I'm sure someone can test a new daily impish ISO on an affected machine. Verification is not necessary for individual SRU releases.
We will also do boot of an installed system, and perform the usual chainloaded netbooting test, prior to uploading.
[Regression potential]
We'll apply four patches for the main issue:
Patches 1/2 (https://github.com/rhboot/shim/pull/393) add a fallback to the default loader (with 2s timeout) if we failed to load any specified loader. This ensures we can always boot our default loader, and hence installed systems, even if there is garbage around. It also adds debugging output for the load option that is being parsed, such that people can debug why it failed.
Patches 3 and 4 (https://github.com/rhboot/shim/pull/399) disables parsing load options entirely when booting via the removable media path (boot*.efi). This means that any system where admins generate boot entries like bootx64.efi fwupdx64.efi to load a specific second stage will fail to load that second stage and load grubx64.efi instead.
is this a problem in practice?
On installed systems, we install \EFI\BOOT\bootx64.efi in addition to \EFI\ubuntu\shimx64.efi, and generate boot loader entries for the latter. The former will always use the fbx64.efi fallback loader to add missing boot loader entries and load grub, hence it doesn't seem to support custom options anyway (you'd have to delete fbx64.efi; and even then - you still have the shimx64.efi binary).
On installer media, we do not expect you to specify another second stage loader anyway. It's arguably only problematic there, as those could be read-only and hence you can't rename the binary to shimx64.efi.
For the overflow, the fix is trivially correct.
For the fallback loader, the fix is reasonably trivial; regression potential there could be failure to add a boot entry which is not super critical.
[Original bug report]
Testing Ubuntu Impish daily ISO= http://cdimage.ubuntu.com/daily-live/20210721/impish-desktop-amd64.iso
The test machines are:
1. Dell [ Optiplex] MT 7040 i7-6700 booting in UEFI mode
2. Dell [ Optiplex] MT 7060, i7-8700 booting in UEFI+secure boot mode
Boot from USB media fails with the message:
Failed to open /EFI/boot/? invalid parameter
No further info available |
|
2021-08-06 14:58:21 |
David Hewitt |
attachment added |
|
dell-xps-9343-bootvars.tar https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1937115/+attachment/5516355/+files/dell-xps-9343-bootvars.tar |
|
2021-08-11 09:33:22 |
Yuan-Chen Cheng |
bug task added |
|
oem-priority |
|
2021-08-11 09:33:47 |
Yuan-Chen Cheng |
tags |
amd64 fr-1533 impish iso-testing regression-proposed regression-update |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update |
|
2021-08-11 11:21:13 |
Robert Kasanický |
bug |
|
|
added subscriber Robert Kasanický |
2021-08-11 23:25:20 |
Yuan-Chen Cheng |
oem-priority: importance |
Undecided |
Critical |
|
2021-08-11 23:25:23 |
Yuan-Chen Cheng |
oem-priority: status |
New |
Confirmed |
|
2021-08-12 21:47:26 |
Andreas |
bug watch added |
|
https://bugzilla.redhat.com/show_bug.cgi?id=1954245 |
|
2021-08-13 18:53:17 |
Brian Murray |
shim (Ubuntu Focal): status |
Confirmed |
Fix Committed |
|
2021-08-13 18:53:20 |
Brian Murray |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2021-08-13 18:53:23 |
Brian Murray |
bug |
|
|
added subscriber SRU Verification |
2021-08-13 18:53:28 |
Brian Murray |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-needed verification-needed-focal |
|
2021-08-13 18:58:00 |
Launchpad Janitor |
shim (Ubuntu Impish): status |
In Progress |
Fix Released |
|
2021-08-13 19:00:45 |
Brian Murray |
bug task added |
|
shim-signed (Ubuntu) |
|
2021-08-13 20:33:46 |
Brian Murray |
shim-signed (Ubuntu Focal): status |
New |
Fix Committed |
|
2021-08-14 02:38:22 |
Launchpad Janitor |
shim-signed (Ubuntu Impish): status |
New |
Fix Released |
|
2021-08-16 10:59:04 |
Julian Andres Klode |
bug task deleted |
cd-boot-images-amd64 (Ubuntu Focal) |
|
|
2021-08-16 11:01:46 |
Julian Andres Klode |
cd-boot-images-amd64 (Ubuntu Impish): status |
Triaged |
Fix Committed |
|
2021-08-16 17:35:52 |
Launchpad Janitor |
cd-boot-images-amd64 (Ubuntu Impish): status |
Fix Committed |
Fix Released |
|
2021-08-16 18:08:56 |
Julian Andres Klode |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-needed verification-needed-focal |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done verification-done-focal |
|
2021-08-19 08:37:55 |
Launchpad Janitor |
shim (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2021-08-19 08:37:59 |
Launchpad Janitor |
shim-signed (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2021-08-19 08:38:04 |
Łukasz Zemczak |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2021-08-19 14:39:55 |
Julian Andres Klode |
nominated for series |
|
Ubuntu Xenial |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
shim (Ubuntu Xenial) |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
shim-signed (Ubuntu Xenial) |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
cd-boot-images-amd64 (Ubuntu Xenial) |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
nominated for series |
|
Ubuntu Bionic |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
shim (Ubuntu Bionic) |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
shim-signed (Ubuntu Bionic) |
|
2021-08-19 14:39:55 |
Julian Andres Klode |
bug task added |
|
cd-boot-images-amd64 (Ubuntu Bionic) |
|
2021-08-30 10:08:11 |
Yuan-Chen Cheng |
oem-priority: status |
Confirmed |
Fix Released |
|
2021-09-06 08:06:29 |
Łukasz Zemczak |
shim (Ubuntu Hirsute): status |
New |
Fix Committed |
|
2021-09-06 08:06:31 |
Łukasz Zemczak |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2021-09-06 08:06:37 |
Łukasz Zemczak |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done verification-done-focal |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-needed verification-needed-hirsute |
|
2021-09-06 08:07:09 |
Łukasz Zemczak |
shim-signed (Ubuntu Hirsute): status |
New |
Fix Committed |
|
2021-09-07 10:16:41 |
Łukasz Zemczak |
shim (Ubuntu Bionic): status |
New |
Fix Committed |
|
2021-09-07 10:16:49 |
Łukasz Zemczak |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-needed verification-needed-hirsute |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-needed verification-needed-bionic verification-needed-hirsute |
|
2021-09-07 10:45:37 |
Łukasz Zemczak |
shim-signed (Ubuntu Bionic): status |
New |
Fix Committed |
|
2021-09-10 07:49:14 |
Julian Andres Klode |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-needed verification-needed-bionic verification-needed-hirsute |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done verification-done-bionic verification-done-focal verification-done-hirsute |
|
2021-09-13 07:24:43 |
Launchpad Janitor |
shim (Ubuntu Hirsute): status |
Fix Committed |
Fix Released |
|
2021-09-13 07:24:47 |
Launchpad Janitor |
shim-signed (Ubuntu Hirsute): status |
Fix Committed |
Fix Released |
|
2021-09-13 07:25:04 |
Launchpad Janitor |
shim-signed (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2021-09-13 11:39:53 |
Launchpad Janitor |
shim (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2021-09-14 17:17:51 |
Paride Legovini |
bug |
|
|
added subscriber Paride Legovini |
2021-09-14 21:35:17 |
Steve Langasek |
cd-boot-images-amd64 (Ubuntu Xenial): status |
New |
Invalid |
|
2021-09-14 21:35:31 |
Steve Langasek |
cd-boot-images-amd64 (Ubuntu Bionic): status |
New |
Invalid |
|
2021-09-14 21:35:44 |
Steve Langasek |
bug task added |
|
debian-installer (Ubuntu) |
|
2021-09-14 21:37:11 |
Steve Langasek |
debian-installer (Ubuntu Impish): status |
New |
Invalid |
|
2021-09-14 21:37:24 |
Steve Langasek |
debian-installer (Ubuntu Xenial): status |
New |
Invalid |
|
2021-09-14 21:37:59 |
Steve Langasek |
debian-installer (Ubuntu Bionic): status |
New |
In Progress |
|
2021-09-14 21:38:19 |
Launchpad Janitor |
branch linked |
|
lp:~ubuntu-core-dev/debian-installer/bionic-proposed |
|
2021-09-14 21:42:02 |
Brian Murray |
debian-installer (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2021-09-14 21:42:16 |
Brian Murray |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done verification-done-bionic verification-done-focal verification-done-hirsute |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-done-hirsute verification-needed verification-needed-bionic |
|
2021-09-15 09:41:18 |
David Hewitt |
bug |
|
|
added subscriber David Hewitt |
2021-09-15 15:09:31 |
Launchpad Janitor |
debian-installer (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2021-10-03 09:15:57 |
Mathew Hodson |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-done-hirsute verification-needed verification-needed-bionic |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-done-hirsute |
|
2021-10-03 09:17:15 |
Mathew Hodson |
bug task deleted |
debian-installer (Ubuntu Impish) |
|
|
2021-10-03 09:17:25 |
Mathew Hodson |
bug task deleted |
debian-installer (Ubuntu) |
|
|
2021-10-03 09:19:58 |
Mathew Hodson |
bug task deleted |
cd-boot-images-amd64 (Ubuntu Xenial) |
|
|
2021-10-03 09:20:23 |
Mathew Hodson |
bug task deleted |
cd-boot-images-amd64 (Ubuntu Bionic) |
|
|
2021-10-03 09:28:48 |
Mathew Hodson |
tags |
amd64 fr-1533 impish iso-testing oem-priority regression-proposed regression-update verification-done-focal verification-done-hirsute |
amd64 fr-1533 impish iso-testing oem-priority regression-update verification-done-focal verification-done-hirsute |
|
2021-10-03 09:33:43 |
Mathew Hodson |
bug task deleted |
debian-installer (Ubuntu Xenial) |
|
|