-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bad shim signature in 40.20240617.0 deployment #573
Comments
Yep, this is another variant of the aforementioned issues. Workaround from #543 (comment) helped. |
I just ran into this too - so am I now forced to run those workaround commands to get later deployments working? Might be better to keep this ticket open? |
You have to run those commands. Yeah, perhaps it would be better not to close this issue, so others affected will have it easier to find it. |
I've updated the title of #543 to mention this error. Closing to keep things in a single place. |
Those commands worked for me It would be nice to make it into a little shell script, which could be run with sudo |
I've just rolled back to image |
Same issue with Fedora Kinoite 40.20240618.0 on my Asus G14 2022 with Secure Boot. |
@dubst3pp4 You have to run those commands. AFAIU, updating bootloader, shims etc. is currently scheduled for rpm-ostree-based F41 and perhaps will be backported to F40: #120 (comment) . @JCenatus AFAIU, because the problem is with signatures, any deployment past And until the aforementioned issues are fixed, such problems can reoccur in the future. |
Thanks but I am reluctant to execute manual commands on a system that is supposed to be a model of stability and reliability due to its immutability system :/. I don't mind waiting for an official fix, especially since it seems this isn't the first time it's happened. Last time, it was fixed very quickly. Additionally, since I have version |
@JCenatus there won't be a fix (anytime soon by the looks of it) - I was also "scared" initially, but it's actually just copying a few deployed efi files over from /usr to /boot, so yeah it's not a seamless process but let's hope it will be once F41 is available in some months. |
@JCenatus I think @juhp's interpretation of the situation is on point. The workaround makes a backup copy of replaced files and then copies newer versions of those files from current deployment to efi partition. In future this will happen automatically, along with updating the bootloader itself. I didn't test that, but perhaps disabling secure boot until the fix is ready might allow you to skip the workaround, but I think it's not worth it to disable secure boot, given the workaround is simple and has helped me and other people. In general, I recommend reading the linked issues and their comments to better understand what's happening and what to expect... and what not to do. 😉 |
Let's keep things in a single place: #543 |
Describe the bug
The latest Silverblue deployment is unbootable, because of
OS version:
Additional context
The system has secure boot enabled, obviously.
The text was updated successfully, but these errors were encountered: