Booting `Debian GNU/Linux'
Loading Linux 6.1.0-33-arm64 ...
Loading initial ramdisk ...
Synchronous Exception at 0x000000006D79AF60
control: retitle -1 qemu-efi-aarch64: Secure Boot regression for some
arm64 VMs
control: reassign -1 qemu-efi-aarch64 2025.02-7
control: severity -1 serious
control: affects -1 incus
Release 2025.02-5 of src:edk2 dropped the patch Revert-ArmVirtPkg- make-EFI_LOADER_DATA-non-executabl.patch. This has caused a regression
for (at least) Debian bookworm and Ubuntu 22.04 arm64 VMs when booting
with Secure Boot enabled.
I have verified that re-applying that patch to src:edk2 2025.02-7
allows these VMs to boot once again.
Please see NEWS.Debian:https://salsa.debian.org/qemu-team/edk2/-/blob/08d4411d458eefc4df5d48acce4f995d4ae6087d/debian/qemu-efi-aarch64.NEWS
<div dir="auto">Please see NEWS.Debian:</div><div dir="auto"></div><div dir="auto"><a href="https://salsa.debian.org/qemu-team/edk2/-/blob/08d4411d458eefc4df5d48acce4f995d4ae6087d/debian/qemu-efi-aarch64.NEWS">https://salsa.debian.org/qemu-team/edk2/-/blob/08d4411d458eefc4df5d48acce4f995d4ae6087d/debian/qemu-efi-aarch64.NEWS</a></div><div dir="auto"><br></div><div dir="auto"></div></div>
On Wed, Apr 23, 2025, 17:41 Mathias Gibbens <gibmat@debian.org> wrote:
control: retitle -1 qemu-efi-aarch64: Secure Boot regression for some
arm64 VMs
control: reassign -1 qemu-efi-aarch64 2025.02-7
control: severity -1 serious
control: affects -1 incus
Release 2025.02-5 of src:edk2 dropped the patch Revert-ArmVirtPkg- make-EFI_LOADER_DATA-non-executabl.patch. This has caused a regression
for (at least) Debian bookworm and Ubuntu 22.04 arm64 VMs when booting
with Secure Boot enabled.
I have verified that re-applying that patch to src:edk2 2025.02-7
allows these VMs to boot once again.
Please see NEWS.Debian:https://salsa.debian.org/qemu-team/edk2/-/blob/08d4411d458eefc4df5d48acce4f995d4ae6087d/debian/qemu-efi-aarch64.NEWS
The EFI_MEMORY_ATTRIBUTE_PROTOCOL is now enabled by default in the AAVMF_CODE.secboot.fd image. This is a security feature that will
cause crashes for operating systems with bootloaders that do not
observe proper memory access semantics. Users that experience issues
with such bootloaders have the options to either append the following
to the qemu-system-aarch64 command line:
-fw_cfg name=opt/org.tianocore/UninstallMemAttrProtocol,string=y
or switch to the no-secboot image, which uninstalls this protocol by
default.
control: tags -1 + confirmed
Hi Antonio,
I have successfully reproduced the issue on a RaspberryPi 5 with its
apt sources set to trixie. While not a pure Debian environment, it's
the only arm64 system I have full access to. :)
TL;DR: As a workaround, try disabling secure boot:
$ incus create images:debian/12 --vm foobar
$ incus config set foobar security.secureboot=false
$ incus start foobar
With kernel 1:6.12.20-1+rpt1 and arm64 bookworm VM image
20250422_05:24 (fingerprint f6e1ffebdc1c), I get the following boot
error when running `incus launch images:debian/12 --vm deb12 --console=vga`:
Booting `Debian GNU/Linux'
Loading Linux 6.1.0-33-arm64 ...
Loading initial ramdisk ...
Synchronous Exception at 0x000000006D79AF60
Can you try starting your bookworm VM with the `--console=vga` option
and see if you get the same error? (You might have to install spice- client-gtk or similar spice client first.)
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 481 |
Nodes: | 16 (2 / 14) |
Uptime: | 14:50:22 |
Calls: | 9,540 |
Files: | 13,653 |
Messages: | 6,139,625 |