[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#990158: shim-signed-common: No UEFI boot with error "Could not create MokListXRT"



Package: shim-signed-common
Version: 1.33+15+1533136590.3beb971-7
Severity: critical
Justification: breaks the whole system

Dear Maintainer,


## What led up to the situation?

Upgrade:

* shim-signed:amd64 (1.33+15+1533136590.3beb971-7,
1.36~1+deb10u1+15.4-5~deb10u1)
* shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7,
1.36~1+deb10u1+15.4-5~deb10u1)

System: Dell T5600 with BIOS Revision A19


## What was the outcome of this action?

System is unbootable on booting via UEFI. System shows error message and then
powers off immediately:

"Could not create MokListXRT: Out of Resources
Something has gone seriously wrong: import_mok_state() failed: Out of
Resources"


## What outcome did you expect instead?

A normal booting system loading GRUB.


## Also reproducible with Debian Live-Installations-Image

On affected hardware like "Dell T5600" doing a UEFI boot from USB with …

* debian-live-10.10.0-amd64-standard.iso does *not* work.
* debian-live-10.9.0-amd64-standard.iso works.


## Related resources

Might be related to:

* https://bugzilla.suse.com/show_bug.cgi?id=1185261



-- System Information:
Debian Release: 10.10
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-0.bpo.7-amd64 (SMP w/32 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages shim-signed-common depends on:
ii  debconf [debconf-2.0]  1.5.71
ii  mokutil                0.3.0+1538710437.fb6250f-1

shim-signed-common recommends no packages.

shim-signed-common suggests no packages.

-- debconf information:
  shim/title/secureboot:
  shim/error/secureboot_key_mismatch:
  shim/secureboot_explanation:
  shim/error/bad_secureboot_key:
  shim/disable_secureboot: true
  shim/enable_secureboot: false

Reply to: