docs: update sharp edges after Linux kernel signing changes

This commit is contained in:
Julian Stecklina 2023-02-02 23:28:18 +01:00
parent 37ccc5d578
commit cc2af0a081
1 changed files with 22 additions and 13 deletions

View File

@ -167,18 +167,20 @@ Verifying file database and EFI images in /boot...
✓ /boot/EFI/BOOT/BOOTX64.EFI is signed ✓ /boot/EFI/BOOT/BOOTX64.EFI is signed
✓ /boot/EFI/Linux/nixos-generation-355.efi is signed ✓ /boot/EFI/Linux/nixos-generation-355.efi is signed
✓ /boot/EFI/Linux/nixos-generation-356.efi is signed ✓ /boot/EFI/Linux/nixos-generation-356.efi is signed
/boot/EFI/nixos/0n01vj3mq06pc31i2yhxndvhv4kwl2vp-linux-6.1.3-bzImage.efi is signed /boot/EFI/nixos/0n01vj3mq06pc31i2yhxndvhv4kwl2vp-linux-6.1.3-bzImage.efi is not signed
✓ /boot/EFI/systemd/systemd-bootx64.efi is signed ✓ /boot/EFI/systemd/systemd-bootx64.efi is signed
``` ```
🔪 **Sharp edge:** 🔪 In case something is **not** signed in the It is expected that the files ending with `bzImage.efi` are _not_
`sbctl verify` output, you have hit a bug signed.
([#39](https://github.com/nix-community/lanzaboote/issues/39)). You
**have to fix this** to avoid ending up with an unbootable system 🔪 **Sharp edge:** 🔪 In case any of the `nixos-generation-*.efi`
([#58](https://github.com/nix-community/lanzaboote/issues/58)). The files are not signed, you have hit a bug
way to solve this is **deleting** the unsigned files indicated by ([#39](https://github.com/nix-community/lanzaboote/issues/39)). This
`sbctl` and switching to the configuration again. This will copy and issue will prevent the system from booting successfully when Secure
sign the missing files. Boot is enabled. The way to solve this is **deleting** the unsigned
files indicated by `sbctl` and switching to the configuration
again. This will copy and sign the missing files.
## Part 2: Enabling Secure Boot ## Part 2: Enabling Secure Boot
@ -236,12 +238,19 @@ System:
That's all! 🥳 That's all! 🥳
## Troubleshooting
If your system doesn't boot with Secure Boot enabled, the most likely
issue is that Lanzaboote could not verify a cryptographic hash. To
recover from this, disable Secure Boot in your firmware
settings. Please file a bug, if you hit this issue.
## Disabling Secure Boot and Lanzaboote ## Disabling Secure Boot and Lanzaboote
When you want to get back to a system without the Secure Boot stack, When you want to permanently get back to a system without the Secure
**first** disable Secure Boot in your firmware settings. Then you can Boot stack, **first** disable Secure Boot in your firmware
disable the Lanzaboote related settings in the NixOS configuration and settings. Then you can disable the Lanzaboote related settings in the
rebuild. NixOS configuration and rebuild.
You may need to clean up the `EFI/Linux` directory in the ESP manually You may need to clean up the `EFI/Linux` directory in the ESP manually
to get rid of stale boot entries. **Please backup your ESP, before you to get rid of stale boot entries. **Please backup your ESP, before you