You are not logged in.

#1 2025-10-02 14:34:00

zhihuiyuze
Member
Registered: 2022-12-27
Posts: 28
Website

Cannot sign kernel with sbctl after kernel reinstallation

Hi everyone,

I'm experiencing a persistent issue with sbctl after a failed kernel update, and I need help understanding what went wrong and how to recover my TPM auto-unlock setup.

During a pacman kernel update, the process hung and I forcefully terminated it. After reinstalling the kernel, the automated signing workflow consistently fails with:

failed validating signature: crypto/rsa: verification error 

The log at that time was the same as it is now by using mkinitcpio

[root@archlinux-laptop ~]# mkinitcpio -P
==> Building image from preset: /etc/mkinitcpio.d/linux-g14.preset: 'default'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux-g14 -U /boot/EFI/Linux/arch-linux-g14.efi
==> Starting build: '6.16.8-arch3-1.1-g14'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [autodetect]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Creating unified kernel image: '/boot/EFI/Linux/arch-linux-g14.efi'
  -> Using ukify to build UKI
  -> Using cmdline file: '/etc/kernel/cmdline'
Using config file: /etc/kernel/uki.conf
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /boot/vmlinuz-linux-g14 --output /tmp/linux-signedbxju6xsr
Wrote signed PE binary to /tmp/linux-signedbxju6xsr
+ /usr/lib/systemd/systemd-measure sign --osrel=/tmp/mkinitcpio.V6Zcat --cmdline=/tmp/mkinitcpio.YMElvl --uname=/tmp/tmp.unamezkewcka2 --pcrpkey=/etc/tpm/pcr_policy_public.key --linux=/tmp/linux-signedbxju6xsr --initrd=/tmp/mkinitcpio.zlg3HX --sbat=/tmp/tmp.sbatsqpgssju --bank=sha256 --private-key=/etc/tpm/pcr_policy_private.key --public-key=/etc/tpm/pcr_policy_public.key --phase=enter-initrd
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /tmp/uki_srudkz9 --output /boot/EFI/Linux/arch-linux-g14.efi
Wrote signed PE binary to /boot/EFI/Linux/arch-linux-g14.efi
Wrote signed /boot/EFI/Linux/arch-linux-g14.efi
==> Unified kernel image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/EFI/Linux/arch-linux-g14.efi
failed validating signature: crypto/rsa: verification error
==> ERROR: '/usr/lib/initcpio/post/sbctl' failed with exit code 1
==> Building image from preset: /etc/mkinitcpio.d/linux-g14.preset: 'fallback'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux-g14 -U /boot/EFI/Linux/arch-linux-g14-fallback.efi -S autodetect
==> Starting build: '6.16.8-arch3-1.1-g14'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
==> WARNING: Possibly missing firmware for module: 'bfa'
==> WARNING: Possibly missing firmware for module: 'aic94xx'
==> WARNING: Possibly missing firmware for module: 'qla2xxx'
==> WARNING: Possibly missing firmware for module: 'qla1280'
==> WARNING: Possibly missing firmware for module: 'wd719x'
==> WARNING: Possibly missing firmware for module: 'qed'
==> WARNING: Possibly missing firmware for module: 'xhci_pci_renesas'
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Creating unified kernel image: '/boot/EFI/Linux/arch-linux-g14-fallback.efi'
  -> Using ukify to build UKI
  -> Using cmdline file: '/etc/kernel/cmdline'
Using config file: /etc/kernel/uki.conf
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /boot/vmlinuz-linux-g14 --output /tmp/linux-signedjlr5kn8c
Wrote signed PE binary to /tmp/linux-signedjlr5kn8c
+ /usr/lib/systemd/systemd-measure sign --osrel=/tmp/mkinitcpio.vbMdxp --cmdline=/tmp/mkinitcpio.ww8qd9 --uname=/tmp/tmp.unamex20qtj3t --pcrpkey=/etc/tpm/pcr_policy_public.key --linux=/tmp/linux-signedjlr5kn8c --initrd=/tmp/mkinitcpio.7XosYu --sbat=/tmp/tmp.sbatt_0j0q7x --bank=sha256 --private-key=/etc/tpm/pcr_policy_private.key --public-key=/etc/tpm/pcr_policy_public.key --phase=enter-initrd
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /tmp/ukir_relaas --output /boot/EFI/Linux/arch-linux-g14-fallback.efi
Wrote signed PE binary to /boot/EFI/Linux/arch-linux-g14-fallback.efi
Wrote signed /boot/EFI/Linux/arch-linux-g14-fallback.efi
==> Unified kernel image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/EFI/Linux/arch-linux-g14-fallback.efi
failed validating signature: crypto/rsa: verification error
==> ERROR: '/usr/lib/initcpio/post/sbctl' failed with exit code 1
==> Building image from preset: /etc/mkinitcpio.d/linux.preset: 'default'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux -g /boot/initramfs-linux.img
==> Starting build: '6.16.8-arch3-1'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [autodetect]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image: '/boot/initramfs-linux.img'
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/vmlinuz-linux
File has already been signed /boot/vmlinuz-linux
==> Post processing done
==> Building image from preset: /etc/mkinitcpio.d/linux.preset: 'fallback'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux -g /boot/initramfs-linux-fallback.img -S autodetect
==> Starting build: '6.16.8-arch3-1'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
==> WARNING: Possibly missing firmware for module: 'aic94xx'
==> WARNING: Possibly missing firmware for module: 'qla2xxx'
==> WARNING: Possibly missing firmware for module: 'bfa'
==> WARNING: Possibly missing firmware for module: 'wd719x'
==> WARNING: Possibly missing firmware for module: 'qed'
==> WARNING: Possibly missing firmware for module: 'qla1280'
==> WARNING: Possibly missing firmware for module: 'xhci_pci_renesas'
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image: '/boot/initramfs-linux-fallback.img'
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/vmlinuz-linux
File has already been signed /boot/vmlinuz-linux
==> Post processing done
==> Building image from preset: /etc/mkinitcpio.d/linux-zen.preset: 'default'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux-zen -U /boot/EFI/Linux/arch-linux-zen.efi
==> Starting build: '6.16.8-zen3-1-zen'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [autodetect]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Creating unified kernel image: '/boot/EFI/Linux/arch-linux-zen.efi'
  -> Using ukify to build UKI
  -> Using cmdline file: '/etc/kernel/cmdline'
Using config file: /etc/kernel/uki.conf
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /boot/vmlinuz-linux-zen --output /tmp/linux-signedpw3pu8ck
Wrote signed PE binary to /tmp/linux-signedpw3pu8ck
+ /usr/lib/systemd/systemd-measure sign --osrel=/tmp/mkinitcpio.WoVxOR --cmdline=/tmp/mkinitcpio.eSIq2K --uname=/tmp/tmp.unamex0ng4hzr --pcrpkey=/etc/tpm/pcr_policy_public.key --linux=/tmp/linux-signedpw3pu8ck --initrd=/tmp/mkinitcpio.eElsBY --sbat=/tmp/tmp.sbatwtradz7_ --bank=sha256 --private-key=/etc/tpm/pcr_policy_private.key --public-key=/etc/tpm/pcr_policy_public.key --phase=enter-initrd
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /tmp/uki7389d04e --output /boot/EFI/Linux/arch-linux-zen.efi
Wrote signed PE binary to /boot/EFI/Linux/arch-linux-zen.efi
Wrote signed /boot/EFI/Linux/arch-linux-zen.efi
==> Unified kernel image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/EFI/Linux/arch-linux-zen.efi
failed validating signature: crypto/rsa: verification error
==> ERROR: '/usr/lib/initcpio/post/sbctl' failed with exit code 1
==> Building image from preset: /etc/mkinitcpio.d/linux-zen.preset: 'fallback'
==> Using default configuration file: '/etc/mkinitcpio.conf'
  -> -k /boot/vmlinuz-linux-zen -U /boot/EFI/Linux/arch-linux-zen-fallback.efi -S autodetect
==> Starting build: '6.16.8-zen3-1-zen'
  -> Running build hook: [base]
  -> Running build hook: [systemd]
  -> Running build hook: [modconf]
  -> Running build hook: [block]
==> WARNING: Possibly missing firmware for module: 'qla2xxx'
==> WARNING: Possibly missing firmware for module: 'qed'
==> WARNING: Possibly missing firmware for module: 'wd719x'
==> WARNING: Possibly missing firmware for module: 'bfa'
==> WARNING: Possibly missing firmware for module: 'aic94xx'
==> WARNING: Possibly missing firmware for module: 'qla1280'
==> WARNING: Possibly missing firmware for module: 'xhci_pci_renesas'
  -> Running build hook: [sd-encrypt]
==> WARNING: Possibly missing firmware for module: 'qat_6xxx'
  -> Running build hook: [lvm2]
  -> Running build hook: [filesystems]
  -> Running build hook: [keyboard]
  -> Running build hook: [fsck]
  -> Running build hook: [sd-vconsole]
==> Generating module dependencies
==> Creating zstd-compressed initcpio image
  -> Early uncompressed CPIO image generation successful
==> Initcpio image generation successful
==> Creating unified kernel image: '/boot/EFI/Linux/arch-linux-zen-fallback.efi'
  -> Using ukify to build UKI
  -> Using cmdline file: '/etc/kernel/cmdline'
Using config file: /etc/kernel/uki.conf
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /boot/vmlinuz-linux-zen --output /tmp/linux-signedcbplcpqg
Wrote signed PE binary to /tmp/linux-signedcbplcpqg
+ /usr/lib/systemd/systemd-measure sign --osrel=/tmp/mkinitcpio.0xgk0B --cmdline=/tmp/mkinitcpio.zuBFqa --uname=/tmp/tmp.unameoljir1k2 --pcrpkey=/etc/tpm/pcr_policy_public.key --linux=/tmp/linux-signedcbplcpqg --initrd=/tmp/mkinitcpio.s09a7j --sbat=/tmp/tmp.sbat4qxm3xrf --bank=sha256 --private-key=/etc/tpm/pcr_policy_private.key --public-key=/etc/tpm/pcr_policy_public.key --phase=enter-initrd
+ /usr/lib/systemd/systemd-sbsign sign --private-key /var/lib/sbctl/keys/db/db.key --certificate /var/lib/sbctl/keys/db/db.pem /tmp/ukimad1wtbv --output /boot/EFI/Linux/arch-linux-zen-fallback.efi
Wrote signed PE binary to /boot/EFI/Linux/arch-linux-zen-fallback.efi
Wrote signed /boot/EFI/Linux/arch-linux-zen-fallback.efi
==> Unified kernel image generation successful
==> Running post hooks
  -> Running post hook: [sbctl]
Signing /boot/EFI/Linux/arch-linux-zen-fallback.efi
failed validating signature: crypto/rsa: verification error
==> ERROR: '/usr/lib/initcpio/post/sbctl' failed with exit code 1

Despite this error, TPM auto-unlock with PIN still works perfectly after reboot (using PCR 7+11 policy). This suggests Secure Boot is actually functioning correctly, right?

But I want to understand why this happened, because I tried deleting the built kernel files and rebuilding them. Then I re-signed with sbctl and got the same error, so I attempted to reset Secure Boot. As a result, both TPM and Secure Boot stopped working.

What I've tried:

1 . Deleted kernel files and rebuilt with mkinitcpio -P - same error persists
2.  Suspected the interrupted update corrupted sbctl's keys, so I cleared Platform Keys (PK) and other settings in BIOS Secure Boot menu (I may have accidentally cleared TPM keys too?)
3 . Regenerated keys with:

   sbctl create-keys
   sbctl enroll-keys --microsoft
   sbctl sign-all

Still getting the same signature verification error

Envirement

[root@archlinux-laptop ~]# sbctl status
Installed:      ✓ sbctl is installed
Owner GUID:     0470fa84-7514-4b14-8e22-089b34b206a4
Setup Mode:     ✓ Disabled
Secure Boot:    ✗ Disabled
Vendor Keys:    microsoft
[root@archlinux-laptop ~]# 
[UKI]
SecureBootSigningTool=systemd-sbsign
SignKernel=true
SecureBootPrivateKey=/var/lib/sbctl/keys/db/db.key
SecureBootCertificate=/var/lib/sbctl/keys/db/db.pem

PCRBanks=sha256
PCRPKey=/etc/tpm/pcr_policy_public.key

[PCRSignature:initrd]
PCRPrivateKey=/etc/tpm/pcr_policy_private.key
PCRPublicKey=/etc/tpm/pcr_policy_public.key
Phases=enter-initrd
[root@archlinux-laptop mkinitcpio.d]# ls
linux-g14.preset  linux.preset  linux-zen.preset
[root@archlinux-laptop mkinitcpio.d]# cat linux-g14.preset
# mkinitcpio preset file for the 'linux-g14' package

#ALL_config="/etc/mkinitcpio.conf"
ALL_kver="/boot/vmlinuz-linux-g14"

PRESETS=('default' 'fallback')

#default_config="/etc/mkinitcpio.conf"
#default_image="/boot/initramfs-linux-g14.img"
default_uki="/boot/EFI/Linux/arch-linux-g14.efi"
#default_options="--splash /usr/share/systemd/bootctl/splash-arch.bmp"

#fallback_config="/etc/mkinitcpio.conf"
#fallback_image="/boot/initramfs-linux-g14-fallback.img"
fallback_uki="/boot/EFI/Linux/arch-linux-g14-fallback.efi"
fallback_options="-S autodetect"
[root@archlinux-laptop mkinitcpio.d]# cat linux.preset
# mkinitcpio preset file for the 'linux' package

#ALL_config="/etc/mkinitcpio.conf"
ALL_kver="/boot/vmlinuz-linux"

PRESETS=('default' 'fallback')

#default_config="/etc/mkinitcpio.conf"
default_image="/boot/initramfs-linux.img"
#default_uki="/efi/EFI/Linux/arch-linux.efi"
#default_options="--splash /usr/share/systemd/bootctl/splash-arch.bmp"

#fallback_config="/etc/mkinitcpio.conf"
fallback_image="/boot/initramfs-linux-fallback.img"
#fallback_uki="/efi/EFI/Linux/arch-linux-fallback.efi"
fallback_options="-S autodetect"
[root@archlinux-laptop mkinitcpio.d]# cat linux-zen.preset
# mkinitcpio preset file for the 'linux-zen' package

#ALL_config="/etc/mkinitcpio.conf"
ALL_kver="/boot/vmlinuz-linux-zen"

PRESETS=('default' 'fallback')

#default_config="/etc/mkinitcpio.conf"
#default_image="/boot/initramfs-linux-zen.img"
default_uki="/boot/EFI/Linux/arch-linux-zen.efi"
#default_options="--splash /usr/share/systemd/bootctl/splash-arch.bmp"

#fallback_config="/etc/mkinitcpio.conf"
#fallback_image="/boot/initramfs-linux-zen-fallback.img"
fallback_uki="/boot/EFI/Linux/arch-linux-zen-fallback.efi"
fallback_options="-S autodetect"
[root@archlinux-laptop mkinitcpio.d]# 


Any insights would be greatly appreciated!

Edit:

# Configuration for encrypted block devices.
# See crypttab(5) for details.

# NOTE: Do not list your root (/) partition here, it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf).

# <name>       <device>                                     <password>              <options>
# home         UUID=b8ad5c18-f445-495d-9095-c9ec4f9d2f37    /etc/mypassword1
# data1        /dev/sda3                                    /etc/mypassword2
# data2        /dev/sda5                                    /etc/cryptfs.key
# swap         /dev/sdx4                                    /dev/urandom            swap,cipher=aes-cbc-essiv:sha256,size=256
# vol          /dev/sdb7                                    none
archlinux-laptop% sudo cryptsetup luksDump /dev/nvme0n1p2
LUKS header information
Version:        2
Epoch:          74
Metadata area:  16384 [bytes]
Keyslots area:  16744448 [bytes]
UUID:           1101ff97-2720-4676-8561-8693ca7ae6da
Label:          (no label)
Subsystem:      (no subsystem)
Flags:          (no flags)

Data segments:
  0: crypt
        offset: 16777216 [bytes]
        length: (whole device)
        cipher: aes-xts-plain64
        sector: 512 [bytes]

Keyslots:
  0: luks2
        Key:        512 bits
        Priority:   normal
        Cipher:     aes-xts-plain64
        Cipher key: 512 bits
        PBKDF:      argon2id
        Time cost:  12
        Memory:     1048576
        Threads:    4
        Salt:       93 bc e1 4f 8e e6 91 64 ca 65 c2 32 d3 bb bc 39 
                    95 64 b9 dd bf 35 4b 1c 8f e7 a1 70 06 b9 68 e4 
        AF stripes: 4000
        AF hash:    sha256
        Area offset:32768 [bytes]
        Area length:258048 [bytes]
        Digest ID:  0
  1: luks2
        Key:        512 bits
        Priority:   normal
        Cipher:     aes-xts-plain64
        Cipher key: 512 bits
        PBKDF:      pbkdf2
        Hash:       sha512
        Iterations: 1000
        Salt:       70 fe 4a c5 36 67 14 0f 6d 80 32 6c 44 78 de d7 
                    e3 31 62 9c e8 fe b8 6e 04 71 7d 40 bd 8c cb d1 
        AF stripes: 4000
        AF hash:    sha512
        Area offset:290816 [bytes]
        Area length:258048 [bytes]
        Digest ID:  0
  7: luks2
        Key:        512 bits
        Priority:   normal
        Cipher:     aes-xts-plain64
        Cipher key: 512 bits
        PBKDF:      argon2id
        Time cost:  12
        Memory:     1048576
        Threads:    4
        Salt:       94 23 6d de 73 01 a0 00 f1 7f 3c 46 d2 da dd cb 
                    12 4f 29 e8 4a 66 33 71 d2 29 8a 7b f5 b9 d2 87 
        AF stripes: 4000
        AF hash:    sha256
        Area offset:806912 [bytes]
        Area length:258048 [bytes]
        Digest ID:  0
Tokens:
  0: systemd-tpm2
        tpm2-hash-pcrs:   7
        tpm2-pcr-bank:    sha256
        tpm2-pubkey:
                    2d 2d 2d 2d 2d 42 45 47 49 4e 20 50 55 42 4c 49
                    43 20 4b 45 59 2d 2d 2d 2d 2d 0a 4d 49 49 42 49
                    6a 41 4e 42 67 6b 71 68 6b 69 47 39 77 30 42 41
                    51 45 46 41 41 4f 43 41 51 38 41 4d 49 49 42 43
                    67 4b 43 41 51 45 41 76 69 68 6f 62 50 39 6e 66
                    38 63 4b 73 31 49 6b 2b 4b 48 31 0a 38 77 35 59
                    41 34 42 34 38 4e 67 67 4d 78 61 4e 70 32 6c 70
                    39 42 5a 53 59 76 31 4e 67 47 38 49 57 6d 63 77
                    63 49 66 66 4b 5a 69 2f 49 77 30 41 77 66 39 59
                    6c 64 32 65 38 51 42 58 42 56 38 5a 0a 39 70 47
                    48 32 65 31 39 31 2f 71 70 6f 42 2f 62 4a 6f 76
                    66 39 6d 74 69 4d 52 77 58 6e 2b 78 36 4e 55 52
                    4b 35 55 44 78 39 47 53 6b 65 6c 39 39 2b 4c 74
                    43 34 6e 36 6b 52 54 65 69 6d 30 42 55 0a 4c 57
                    78 6b 63 74 47 4e 66 37 31 47 68 67 48 66 32 33
                    36 32 41 75 52 46 43 4a 2f 75 50 5a 78 36 71 56
                    42 53 79 6d 58 4b 48 67 79 36 4e 65 31 66 77 4a
                    33 42 49 76 30 31 48 34 6c 34 56 51 65 57 0a 37
                    41 6a 7a 62 41 64 39 67 5a 6a 74 65 54 67 58 73
                    53 48 31 49 56 78 2f 67 50 64 58 6f 6b 64 68 70
                    37 71 34 70 38 63 6e 61 36 48 32 4f 31 70 5a 4d
                    68 2f 33 53 61 61 51 73 39 6c 5a 67 46 46 6a 0a
                    54 4a 70 53 71 4a 5a 47 58 66 43 52 47 50 43 51
                    5a 72 70 4e 74 59 68 39 33 39 32 70 2f 52 30 53
                    64 73 39 2f 59 6e 4a 33 38 57 47 79 33 30 39 57
                    77 5a 2f 74 32 4c 63 79 4c 61 75 6d 6c 38 2b 6e
                    0a 34 77 49 44 41 51 41 42 0a 2d 2d 2d 2d 2d 45
                    4e 44 20 50 55 42 4c 49 43 20 4b 45 59 2d 2d 2d
                    2d 2d 0a
        tpm2-pubkey-pcrs: 11
        tpm2-primary-alg: ecc
        tpm2-pin:         true
        tpm2-pcrlock:     false
        tpm2-salt:        true
        tpm2-srk:         true
        tpm2-pcrlock-nv:  false
        tpm2-policy-hash:
                    c6 f2 d3 ef 2c 33 fb 8e d6 fe bb 4b 63 7d 87 50
                    4a e6 d5 02 f6 e2 4b 28 86 6d 43 76 31 46 58 ff
        tpm2-blob:  00 9e 00 20 8f 66 0a 30 72 95 05 60 33 0c 9e d9
                    60 9f 2c 61 50 b6 ad 48 31 01 19 f4 5c f3 ef 22
                    3f b3 04 21 00 10 74 89 2b 8b aa 8f 88 7a b5 c3
                    3d 39 10 c3 de 01 7b b4 c1 db 3a d1 61 d6 8f 1d
                    a2 cf e6 3e 93 fc 70 4e 9f a3 c4 36 df e3 6b d9
                    30 c7 b3 a5 c1 7c de d4 96 ff 31 4b 9e 5e 48 ed
                    2c 47 da c9 0c 7c 9a d3 66 2d bd 89 0c 4e 99 88
                    07 1e 02 0c 07 64 7d 5e ea 93 35 bb ec 77 c5 7e
                    97 cd 78 34 5b 34 8d 47 b2 03 52 b5 ee bf 7a f8
                    36 b4 7f a8 8c c9 38 3e f6 57 68 a4 34 25 8c 89
                    00 4e 00 08 00 0b 00 00 00 12 00 20 c6 f2 d3 ef
                    2c 33 fb 8e d6 fe bb 4b 63 7d 87 50 4a e6 d5 02
                    f6 e2 4b 28 86 6d 43 76 31 46 58 ff 00 10 00 20
                    11 37 e2 84 72 12 87 73 d2 a1 84 bb 58 3a da ae
                    16 7b 82 89 d1 3e 83 85 bc 7d 84 4c 39 19 d4 85
        Keyslot:    1
Digests:
  0: pbkdf2
        Hash:       sha256
        Iterations: 694421
        Salt:       3c c7 ba 9d 69 81 fe 4b 40 b6 cf bc d9 c5 4b 56 
                    73 af 7f 70 7f 4e 3e 36 64 6c 0a ba 29 72 ed fb 
        Digest:     61 1e 10 bb 3b bf 18 76 ff 0b 17 b5 47 0b 94 65 
                    6c 6e 0b 41 b5 d0 7e a4 54 e3 a9 ba d2 95 97 9a 
archlinux-laptop% 

After re-enabling Secure Boot, everything functions normally, but I still get failed validating signature: crypto/rsa: verification error when signing the kernel - the same issue as before. However, since PCR 7+11 validates the Secure Boot state, could this be a false positive from sbctl?

Last edited by zhihuiyuze (2025-10-02 14:54:27)

Offline

Board footer

Powered by FluxBB