Skip to content

Commit 4fc16bc

Browse files
committed
secure_boot_setup: Add special steps for Limine
Using sbctl-batch-sign is not applicable for Limine when checksum verification is enabled (default). Limine also doesn't need kernel images to be signed so rely on `limine-enroll-config` and signing that other EFI path manually for secure boot on Limine. Signed-off-by: Eric Naim <dnaim@cachyos.org>
1 parent e51134d commit 4fc16bc

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

src/content/docs/configuration/secure_boot_setup.mdx

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,28 @@ pacman hook will **not** sign the updated EFI binaries. As a workaround, we can
116116
❯ sudo sbctl sign -s -o /usr/lib/systemd/boot/efi/systemd-bootx64.efi.signed /usr/lib/systemd/boot/efi/systemd-bootx64.efi
117117
```
118118

119+
### Limine
120+
121+
Limine is a special boot manager that allows for checking the hash of kernel
122+
images and other files that Limine uses during boot. This means that any sort of
123+
manual configuration done by the user, e.g. signing the image via
124+
`sbctl-batch-sign`, will modify the hash of the corresponding files and will
125+
fail Limine's checksum verification.
126+
127+
However, this is not a problem for Limine because it has a special boot process
128+
that bypasses EFI chainloading and signature checks. The only EFI binaries that
129+
need to be signed are Limine itself and the backup EFI binary found in all UEFI
130+
systems.
131+
132+
```sh
133+
# Use limine-enroll-config to sign Limine's EFI binary
134+
# This uses sbctl under the hood
135+
❯ sudo limine-enroll-config
136+
137+
# Sign the special EFI binary
138+
❯ sudo sbctl sign -s /boot/EFI/BOOT/BOOTX64.EFI
139+
```
140+
119141
## Verify that Secure Boot is Enabled
120142

121143
To check that secure boot is indeed enabled. You can run one of the following commands

0 commit comments

Comments
 (0)