[Bug 1476882] Re: arm64: synchronous abort booting linux

Launchpad Bug Tracker 1476882 at bugs.launchpad.net
Thu Dec 10 18:13:19 UTC 2015


This bug was fixed in the package grub2 - 2.02~beta2-9ubuntu1.5

---------------
grub2 (2.02~beta2-9ubuntu1.5) trusty; urgency=medium

  * d/p/arm64-set-correct-length-of-device-path-end-entry.patch: Fixes
    booting arm64 kernels on certain UEFI implementations. (LP: #1476882)
  * progress: avoid NULL dereference for net files. (LP: #1459872)
  * arm64/setjmp: Add missing license macro. (LP: #1459871)
  * Cherry-pick patch to add SAS disks to the device list from the ofdisk
    module. (LP: #1517586)
  * Cherry-pick patch to open Simple Network Protocol exclusively.
    (LP: #1508893)

 -- dann frazier <dannf at ubuntu.com>  Wed, 25 Nov 2015 13:13:35 -0700

** Changed in: grub2 (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to grub2 in Ubuntu.
https://bugs.launchpad.net/bugs/1476882

Title:
  arm64: synchronous abort booting linux

Status in grub2 package in Ubuntu:
  Fix Released
Status in grub2 source package in Trusty:
  Fix Released
Status in grub2 source package in Vivid:
  Fix Committed
Status in grub2 source package in Wily:
  Fix Released

Bug description:
  [Impact]
  On some UEFI firmware implementations for ARM64 (debug versions of Tianocore, as well as builds from AMI), GRUB will fail with Synchronous Aborts when starting the Linux kernel. It is therefore not possible to install or run Ubuntu on these systems.

  [Test Case]
  Download the Ubuntu debian-installer netboot.tar.gz  and boot and direct a system to boot from the grubnet image within. (Currently only 15.10 and newer have this tarball, though it should eventually appear in 14.04 as an SRU).

  [Regression Risk]
  The proposed patch touches only arm64 code, which limits the impact to just arm64 systems. There are few ARM64/UEFI systems on the market/supported by Ubuntu, so the risk is quite contained.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1476882/+subscriptions



More information about the foundations-bugs mailing list