-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Qubes 4.0 is not booting with boot parameters "lockdown=integrity" or "lockdown=confidentiality" #5497
Comments
We don't fully support kernel lockdown yet (that's why it's disabled by default). Can you give more details about the problem? Try booting without |
Hi,
(which apparently can't be found with man on Dom0 : If this is not enough, please, tell me how to save the log messages which appears during the boot process (I am using AEM with an external USB drive). Cheers. |
That's interesting, indeed dom0 kernel modules in this package are not signed, but VM modules built at the same time are. Something is wrong with the packaging process. |
Looks like signatures are stripped together with debug symbols... |
While the above solves module signatures issue,
This makes it impossible to start |
Hello and thanks for the time you have spent in order to investigate the issue. Apologies for my ignorance but I am curious about it: does this mean that lockdown is not compatible with Qubes OS? Cheers |
Yes, this is what it means, at least right now. |
Hi, thanks for your answer.
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Hello, Now, I am using lockdown in integrity mode. According to
Cheers |
That's interesting, maybe libvirt need to access PCI config space depends on the hardware (and options like permissive mode, strict reset). We'll need to investigate it if/when we'll want to enable it by default. |
@marmarek , thanks a lot for your help. I will keep testing lockdown in the next days. If something changes, I will report it here promptly. |
Hi, Cheers. |
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Qubes OS version:
Qubes 4.0 with AEM enabled.
Affected component(s) or functionality:
Boot.
Steps to reproduce the behavior:
lockdown=integrity
orlockdown=confidentuality
in /etc/default/grubgrub2-mkconfig -o /boot/grub2/grub.cfg
Expected or desired behavior:
The system boots and seals the keys for AEM.
Actual behavior:
The system hangs on. On the monitor I can see
Waiting for device XXX to be attached
Nevertheless, the USB drive with /boot partition is ALREADY attached.
I've also tried to boot the system from the USB drive without AEM, but without success.
General notes:
It is totally possible that this is not a bug, but it is actually how the lockdown feature is supposed to work (and thus, it is not compatible with AEM or booting with an external device). TBH I have no idea and I am not tech-savvy enough to give an answer to this question.
I have consulted the following relevant documentation:
I am aware of the following related, non-duplicate issues:
The text was updated successfully, but these errors were encountered: