[Bug 2089320] Re: Secure boot variables full, unable to boot

Mate Kukri 2089320 at bugs.launchpad.net
Fri Nov 22 08:12:40 UTC 2024


@Pedro Avalos

if you could run `mokutil --set-verbosity` true then boot again to see
if the verbose log really includes tpm_measure_variable stuff, that
would be nice.

But i am 99% sure it's that, we havent seen the UEFI varstore proper
fill up on modern systems in a long time.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to shim in Ubuntu.
https://bugs.launchpad.net/bugs/2089320

Title:
  Secure boot variables full, unable to boot

Status in shim package in Ubuntu:
  New

Bug description:
  Deploying 22.04 fills up the secure boot variable Forbidden
  Signatures. The system is still able to boot, but there are warnings
  when booting. However, deploying with 24.04 seems to fill the secure
  boot variable so much that the Ubuntu install is unable to start.

  This behavior was noticed when deploying through MAAS to a Supermicro
  - SYS-6028U-TR4+
  (https://www.supermicro.com/products/system/2u/6028/SYS-6028U-TR4_.cfm?parts=SHOW)
  system.

  
  This is the output I was able to capture from the terminal:

  ```
  Could not create MokListTrustedRT: Volume full
  Something has gone seriously wrong: import_mok_state() failed: Volume full
  ```

  The error messages were similar to the ones found in this upstream
  issue: https://github.com/rhboot/shim/issues/654.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shim/+bug/2089320/+subscriptions




More information about the foundations-bugs mailing list