Limine: Difference between revisions

Klinger (talk | contribs)
m Link to Limine added, category:booting added, motivation added (a sentence at least)
0x4A6F (talk | contribs)
Moved from SecureBoot page with some minor fixups
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{expand}}
{{expand}}


[https://limine-bootloader.org/ Limine] is a modern, advanced, portable, multiprotocol bootloader and boot manager. It aims to be more robust alternative to bootloaders like [[GNU GRUB]].
[https://limine-bootloader.org/ Limine] is a modern, advanced, portable, multiprotocol bootloader and boot manager. It aims to be more robust alternative to bootloaders like [[GNU GRUB]]. It can be configured via NixOS options under
[https://search.nixos.org/options?channel=unstable&show=boot.loader.limine. boot.loader.limine.]


== SecureBoot ==
Limine Secure Boot support is principally controlled by the [https://search.nixos.org/options?channel=unstable&show=boot.loader.limine.secureBoot.enable&query=boot.loader.limine.secureBoot.enable module options].
{{warning|Limine SecureBoot is still in development and requires some prerequisites and precautions. Currently it's only available for nixos-unstable. For more information, please see the Limine GitHub repository and documentation.}}
To enable Secure Boot, first switch to Limine as your bootloader. You may find the existing [[Bootloader]] documentation helpful.
Then add <code>sbctl</code> to you systems packages. It must be installed on a system level.
Generate keys with <code>sbctl create-keys</code>
Enable Secure Boot Setup Mode. This usually involves entering the BIOS and selecting an option to do so. On some BIOS implementations, there is not an explicit option to do so, but it will enter setup mode if one clears all Secure Boot keys.
Now, run <code>sbctl enroll-keys -m -f</code> to actually enroll your keys.
You can now rebuild with <code>boot.loader.limine.secureBoot.enable</code> set to true, and disable Secure Boot setup mode.
If this has been successful, you can check using <code>bootctl status</code>
<syntaxHighlight lang=console>
$ bootctl status
systemd-boot not installed in ESP.
System:
      Firmware: n/a (n/a)
Firmware Arch: x64
  Secure Boot: enabled (user)
...
</syntaxHighlight>
[[Category:Booting]]
[[Category:Booting]]