Skip to content

Commit e0cb9ea

Browse files
committed
Merge remote-tracking branch 'origin/pull/300'
* origin/pull/300: Add Option ROM warning to Usage section of the manpage
2 parents 0ef7b8f + 127bf28 commit e0cb9ea

File tree

1 file changed

+11
-8
lines changed

1 file changed

+11
-8
lines changed

docs/sbctl.8.txt

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ If this step is not completed, enrolling custom keys will be rejected by the fir
295295
Next is creating the keys for secure boot. 'create-keys' creates the key
296296
hierarchy needed for secure boot into "/usr/share/secureboot".
297297

298-
$ sbctl create-keys
298+
# sbctl create-keys
299299
Created Owner UUID a9fbbdb7-a05f-48d5-b63a-08c5df45ee70
300300
Creating secure boot keys...✔
301301
Secure boot keys created!
@@ -305,9 +305,12 @@ on a live system instead of having to boot or run a key management tool from the
305305
UEFI shell.
306306

307307
'Note': This can fail because of firmware issues and unique options in the
308-
machine BIOS menu.
308+
machine BIOS menu. Also, some devices have hardware firmware that is signed and
309+
validated when Secure Boot is enabled. Failing to validate this firmware could
310+
brick devices. It's recommended to enroll your own keys with Microsoft
311+
certificates using the '-m' option. See **Option ROM*** above.
309312

310-
$ sbctl enroll-keys
313+
# sbctl enroll-keys
311314
Enrolling keys to EFI variables...✔
312315
Enrolled keys to the EFI variables!
313316

@@ -323,19 +326,19 @@ store the file path, so we don't need to manually sign it later.
323326
Note that *sbctl* can only keep track of file paths. On versioned kernels this
324327
might prove tricky.
325328

326-
$ sbctl sign --save /efi/vmlinuz-linux
329+
# sbctl sign --save /efi/vmlinuz-linux
327330
✔ Signed /efi/vmlinuz-linux
328331

329332
Next is to sign the bootloader. This can usually be found on the standard path
330333
below, but might differ between installations.
331334

332-
$ sbctl sign --save /efi/EFI/BOOT/BOOTX64.EFI
335+
# sbctl sign --save /efi/EFI/BOOT/BOOTX64.EFI
333336
✔ Signed /efi/EFI/BOOT/BOOTX64.EFI
334337

335338
*sbctl* is able to find and verify the ESP, along with any saved files to verify
336339
we have signed the files we need.
337340

338-
$ sbctl verify
341+
# sbctl verify
339342
Verifying file database and EFI images in /efi...
340343
✔ /efi/EFI/BOOT/BOOTX64.EFI is signed
341344
✔ /efi/vmlinuz-linux is signed
@@ -353,7 +356,7 @@ Secure Boot or enter User Mode in the firmware.
353356
When we do a system update, we can run 'sign-all' to resign all the saved files
354357
from earlier.
355358

356-
$ sbctl sign-all
359+
# sbctl sign-all
357360
File has already been signed /boot/vmlinuz-linux
358361
✓ Signed /efi/EFI/BOOT/BOOTX64.EFI
359362

@@ -362,7 +365,7 @@ the initramfs, kernel and cmdline into one executable which can be signed for
362365
secure boot. This allows you to authenticate larger parts of the bootchain
363366
instead of only signing the kernel.
364367

365-
$ sbctl bundle -i /boot/intel-ucode.img
368+
# sbctl bundle -i /boot/intel-ucode.img
366369
-l /usr/share/systemd/bootctl/splash-arch.bmp
367370
-k /boot/vmlinuz-linux
368371
-f /boot/initramfs-linux-lts.img

0 commit comments

Comments
 (0)