]> git.proxmox.com Git - pve-docs.git/blame - system-booting.adoc
secure boot: mention proxmox-secure-boot-support metapackage
[pve-docs.git] / system-booting.adoc
CommitLineData
69055103
TL
1[[sysboot]]
2Host Bootloader
3---------------
62de1c14
SI
4ifdef::wiki[]
5:pve-toplevel:
6endif::wiki[]
7
69055103
TL
8{pve} currently uses one of two bootloaders depending on the disk setup
9selected in the installer.
62de1c14
SI
10
11For EFI Systems installed with ZFS as the root filesystem `systemd-boot` is
952ee606 12used, unless Secure Boot is enabled. All other deployments use the standard
7c73a209 13GRUB bootloader (this usually also applies to systems which are installed on
952ee606 14top of Debian).
62de1c14 15
dfa919a3
TL
16
17[[sysboot_installer_part_scheme]]
18Partitioning Scheme Used by the Installer
19~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20
cb04e768
SI
21The {pve} installer creates 3 partitions on all disks selected for
22installation.
dfa919a3
TL
23
24The created partitions are:
25
26* a 1 MB BIOS Boot Partition (gdisk type EF02)
27
28* a 512 MB EFI System Partition (ESP, gdisk type EF00)
29
30* a third partition spanning the set `hdsize` parameter or the remaining space
31 used for the chosen storage type
32
cb04e768 33Systems using ZFS as root filesystem are booted with a kernel and initrd image
952ee606 34stored on the 512 MB EFI System Partition. For legacy BIOS systems, and EFI
7c73a209 35systems with Secure Boot enabled, GRUB is used, for EFI systems without
952ee606
FG
36Secure Boot, `systemd-boot` is used. Both are installed and configured to point
37to the ESPs.
cb04e768 38
7c73a209
CH
39GRUB in BIOS mode (`--target i386-pc`) is installed onto the BIOS Boot
40Partition of all selected disks on all systems booted with GRUB
cb04e768
SI
41footnote:[These are all installs with root on `ext4` or `xfs` and installs
42with root on ZFS on non-EFI systems].
43
44
45[[sysboot_proxmox_boot_tool]]
46Synchronizing the content of the ESP with `proxmox-boot-tool`
47~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
48
49`proxmox-boot-tool` is a utility used to keep the contents of the EFI System
50Partitions properly configured and synchronized. It copies certain kernel
51versions to all ESPs and configures the respective bootloader to boot from
52the `vfat` formatted ESPs. In the context of ZFS as root filesystem this means
53that you can use all optional features on your root pool instead of the subset
7c73a209
CH
54which is also present in the ZFS implementation in GRUB or having to create a
55separate small boot-pool footnote:[Booting ZFS on root with GRUB
cb04e768
SI
56https://github.com/zfsonlinux/zfs/wiki/Debian-Stretch-Root-on-ZFS].
57
58In setups with redundancy all disks are partitioned with an ESP, by the
59installer. This ensures the system boots even if the first boot device fails
60or if the BIOS can only boot from a particular disk.
61
62The ESPs are not kept mounted during regular operation. This helps to prevent
63filesystem corruption to the `vfat` formatted ESPs in case of a system crash,
64and removes the need to manually adapt `/etc/fstab` in case the primary boot
65device fails.
66
67`proxmox-boot-tool` handles the following tasks:
68
69* formatting and setting up a new partition
70* copying and configuring new kernel images and initrd images to all listed ESPs
71* synchronizing the configuration on kernel upgrades and other maintenance tasks
72* managing the list of kernel versions which are synchronized
a9a2cdbe 73* configuring the boot-loader to boot a particular kernel version (pinning)
cb04e768
SI
74
75
76You can view the currently configured ESPs and their state by running:
77
78----
79# proxmox-boot-tool status
80----
81
82[[sysboot_proxmox_boot_setup]]
83.Setting up a new partition for use as synced ESP
84
85To format and initialize a partition as synced ESP, e.g., after replacing a
86failed vdev in an rpool, or when converting an existing system that pre-dates
3ad9d61c 87the sync mechanism, `proxmox-boot-tool` from `proxmox-kernel-helper` can be used.
cb04e768
SI
88
89WARNING: the `format` command will format the `<partition>`, make sure to pass
90in the right device/partition!
91
92For example, to format an empty partition `/dev/sda2` as ESP, run the following:
93
94----
95# proxmox-boot-tool format /dev/sda2
96----
97
98To setup an existing, unmounted ESP located on `/dev/sda2` for inclusion in
99{pve}'s kernel update synchronization mechanism, use the following:
100
101----
102# proxmox-boot-tool init /dev/sda2
103----
104
952ee606
FG
105or
106
107----
108# proxmox-boot-tool init /dev/sda2 grub
109----
110
7c73a209 111to force initialization with GRUB instead of `systemd-boot`, for example for
952ee606
FG
112Secure Boot support.
113
cb04e768
SI
114Afterwards `/etc/kernel/proxmox-boot-uuids` should contain a new line with the
115UUID of the newly added partition. The `init` command will also automatically
116trigger a refresh of all configured ESPs.
117
118[[sysboot_proxmox_boot_refresh]]
119.Updating the configuration on all ESPs
120
121To copy and configure all bootable kernels and keep all ESPs listed in
122`/etc/kernel/proxmox-boot-uuids` in sync you just need to run:
123
124----
125# proxmox-boot-tool refresh
126----
127(The equivalent to running `update-grub` systems with `ext4` or `xfs` on root).
128
129This is necessary should you make changes to the kernel commandline, or want to
130sync all kernels and initrds.
131
132NOTE: Both `update-initramfs` and `apt` (when necessary) will automatically
133trigger a refresh.
134
135.Kernel Versions considered by `proxmox-boot-tool`
136The following kernel versions are configured by default:
137
138* the currently running kernel
139* the version being newly installed on package updates
140* the two latest already installed kernels
141* the latest version of the second-to-last kernel series (e.g. 5.0, 5.3), if applicable
142* any manually selected kernels
143
144.Manually keeping a kernel bootable
145
146Should you wish to add a certain kernel and initrd image to the list of
147bootable kernels use `proxmox-boot-tool kernel add`.
148
149For example run the following to add the kernel with ABI version `5.0.15-1-pve`
150to the list of kernels to keep installed and synced to all ESPs:
151
152----
153# proxmox-boot-tool kernel add 5.0.15-1-pve
154----
155
156`proxmox-boot-tool kernel list` will list all kernel versions currently selected
157for booting:
158
159----
160# proxmox-boot-tool kernel list
161Manually selected kernels:
1625.0.15-1-pve
163
164Automatically selected kernels:
1655.0.12-1-pve
1664.15.18-18-pve
167----
168
169Run `proxmox-boot-tool kernel remove` to remove a kernel from the list of
170manually selected kernels, for example:
171
172----
173# proxmox-boot-tool kernel remove 5.0.15-1-pve
174----
175
176NOTE: It's required to run `proxmox-boot-tool refresh` to update all EFI System
177Partitions (ESPs) after a manual kernel addition or removal from above.
dfa919a3
TL
178
179
48a1482b 180[[sysboot_determine_bootloader_used]]
dfa919a3 181Determine which Bootloader is Used
48a1482b
AL
182~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
183
184[thumbnail="screenshot/boot-grub.png", float="left"]
185
186The simplest and most reliable way to determine which bootloader is used, is to
187watch the boot process of the {pve} node.
188
7c73a209 189You will either see the blue box of GRUB or the simple black on white
48a1482b
AL
190`systemd-boot`.
191
192[thumbnail="screenshot/boot-systemdboot.png"]
193
194Determining the bootloader from a running system might not be 100% accurate. The
195safest way is to run the following command:
196
197
198----
199# efibootmgr -v
200----
201
7c73a209 202If it returns a message that EFI variables are not supported, GRUB is used in
48a1482b
AL
203BIOS/Legacy mode.
204
7c73a209 205If the output contains a line that looks similar to the following, GRUB is
48a1482b
AL
206used in UEFI mode.
207
208----
209Boot0005* proxmox [...] File(\EFI\proxmox\grubx64.efi)
210----
211
cb04e768 212If the output contains a line similar to the following, `systemd-boot` is used.
48a1482b
AL
213
214----
215Boot0006* Linux Boot Manager [...] File(\EFI\systemd\systemd-bootx64.efi)
216----
217
cb04e768
SI
218By running:
219
220----
221# proxmox-boot-tool status
222----
223
224you can find out if `proxmox-boot-tool` is configured, which is a good
225indication of how the system is booted.
226
48a1482b 227
69055103 228[[sysboot_grub]]
7c73a209 229GRUB
62de1c14
SI
230~~~~
231
7c73a209 232GRUB has been the de-facto standard for booting Linux systems for many years
62de1c14 233and is quite well documented
7c73a209 234footnote:[GRUB Manual https://www.gnu.org/software/grub/manual/grub/grub.html].
62de1c14 235
62de1c14
SI
236Configuration
237^^^^^^^^^^^^^
7c73a209 238Changes to the GRUB configuration are done via the defaults file
62de1c14 239`/etc/default/grub` or config snippets in `/etc/default/grub.d`. To regenerate
cb04e768
SI
240the configuration file after a change to the configuration run:
241footnote:[Systems using `proxmox-boot-tool` will call `proxmox-boot-tool
242refresh` upon `update-grub`.]
62de1c14
SI
243
244----
cb04e768 245# update-grub
62de1c14
SI
246----
247
cb04e768 248
69055103 249[[sysboot_systemd_boot]]
62de1c14
SI
250Systemd-boot
251~~~~~~~~~~~~
252
253`systemd-boot` is a lightweight EFI bootloader. It reads the kernel and initrd
254images directly from the EFI Service Partition (ESP) where it is installed.
255The main advantage of directly loading the kernel from the ESP is that it does
cb04e768
SI
256not need to reimplement the drivers for accessing the storage. In {pve}
257xref:sysboot_proxmox_boot_tool[`proxmox-boot-tool`] is used to keep the
258configuration on the ESPs synchronized.
62de1c14 259
69055103 260[[sysboot_systemd_boot_config]]
62de1c14
SI
261Configuration
262^^^^^^^^^^^^^
263
264`systemd-boot` is configured via the file `loader/loader.conf` in the root
265directory of an EFI System Partition (ESP). See the `loader.conf(5)` manpage
266for details.
267
268Each bootloader entry is placed in a file of its own in the directory
269`loader/entries/`
270
271An example entry.conf looks like this (`/` refers to the root of the ESP):
272
273----
274title Proxmox
275version 5.0.15-1-pve
276options root=ZFS=rpool/ROOT/pve-1 boot=zfs
277linux /EFI/proxmox/5.0.15-1-pve/vmlinuz-5.0.15-1-pve
278initrd /EFI/proxmox/5.0.15-1-pve/initrd.img-5.0.15-1-pve
279----
280
281
69055103 282[[sysboot_edit_kernel_cmdline]]
dfa919a3 283Editing the Kernel Commandline
62de1c14
SI
284~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
285
286You can modify the kernel commandline in the following places, depending on the
f11fb629 287bootloader used:
62de1c14 288
7c73a209 289.GRUB
62de1c14
SI
290
291The kernel commandline needs to be placed in the variable
292`GRUB_CMDLINE_LINUX_DEFAULT` in the file `/etc/default/grub`. Running
293`update-grub` appends its content to all `linux` entries in
294`/boot/grub/grub.cfg`.
295
296.Systemd-boot
297
0aebb0d9 298The kernel commandline needs to be placed as one line in `/etc/kernel/cmdline`.
cb04e768 299To apply your changes, run `proxmox-boot-tool refresh`, which sets it as the
0aebb0d9 300`option` line for all config files in `loader/entries/proxmox-*.conf`.
a9a2cdbe 301
9dbab4f8
NU
302A complete list of kernel parameters can be found at
303'https://www.kernel.org/doc/html/v<YOUR-KERNEL-VERSION>/admin-guide/kernel-parameters.html'.
c9f91b12
TL
304replace <YOUR-KERNEL-VERSION> with the major.minor version, for example, for
305kernels based on version 6.5 the URL would be:
306https://www.kernel.org/doc/html/v6.5/admin-guide/kernel-parameters.html
307
308You can find your kernel version by checking the web interface ('Node ->
309Summary'), or by running
9dbab4f8
NU
310
311----
312# uname -r
313----
a9a2cdbe 314
c9f91b12
TL
315Use the first two numbers at the front of the output.
316
a9a2cdbe 317[[sysboot_kernel_pin]]
027bbe9a
TL
318Override the Kernel-Version for next Boot
319~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
320
321To select a kernel that is not currently the default kernel, you can either:
322
323* use the boot loader menu that is displayed at the beginning of the boot
324 process
325* use the `proxmox-boot-tool` to `pin` the system to a kernel version either
326 once or permanently (until pin is reset).
327
328This should help you work around incompatibilities between a newer kernel
329version and the hardware.
a9a2cdbe 330
027bbe9a
TL
331NOTE: Such a pin should be removed as soon as possible so that all current
332security patches of the latest kernel are also applied to the system.
333
334For example: To permanently select the version `5.15.30-1-pve` for booting you
335would run:
a9a2cdbe
SI
336
337----
338# proxmox-boot-tool kernel pin 5.15.30-1-pve
339----
340
027bbe9a
TL
341TIP: The pinning functionality works for all {pve} systems, not only those using
342`proxmox-boot-tool` to synchronize the contents of the ESPs, if your system
343does not use `proxmox-boot-tool` for synchronizing you can also skip the
344`proxmox-boot-tool refresh` call in the end.
345
346You can also set a kernel version to be booted on the next system boot only.
347This is for example useful to test if an updated kernel has resolved an issue,
348which caused you to `pin` a version in the first place:
a9a2cdbe
SI
349
350----
027bbe9a 351# proxmox-boot-tool kernel pin 5.15.30-1-pve --next-boot
a9a2cdbe
SI
352----
353
354To remove any pinned version configuration use the `unpin` subcommand:
355
356----
357# proxmox-boot-tool kernel unpin
358----
359
360While `unpin` has a `--next-boot` option as well, it is used to clear a pinned
027bbe9a
TL
361version set with `--next-boot`. As that happens already automatically on boot,
362invonking it manually is of little use.
363
364After setting, or clearing pinned versions you also need to synchronize the
365content and configuration on the ESPs by running the `refresh` subcommand.
a9a2cdbe 366
027bbe9a
TL
367TIP: You will be prompted to automatically do for `proxmox-boot-tool` managed
368systems if you call the tool interactively.
a9a2cdbe
SI
369
370----
371# proxmox-boot-tool refresh
372----
952ee606
FG
373
374[[sysboot_secure_boot]]
375Secure Boot
376~~~~~~~~~~~
377
378Since {pve} 8.1, Secure Boot is supported out of the box via signed packages
379and integration in `proxmox-boot-tool`.
380
6eb73a3f
SI
381The following packages needed for Secure Boot to work, are installed as
382dependency of `proxmox-secure-boot-support`:
952ee606 383
c1ffc458
AZ
384- `shim-signed` (shim bootloader signed by Microsoft)
385- `shim-helpers-amd64-signed` (fallback bootloader and MOKManager, signed by
386 Proxmox)
7c73a209 387- `grub-efi-amd64-signed` (GRUB EFI bootloader, signed by Proxmox)
c1ffc458 388- `proxmox-kernel-6.X.Y-Z-pve-signed` (Kernel image, signed by Proxmox)
952ee606 389
7c73a209 390Only GRUB as bootloader is supported out of the box, since there are no other
952ee606
FG
391pre-signed bootloader packages available. Any new installation of {pve} will
392automatically have all of the above packages included.
393
394More details about how Secure Boot works, and how to customize the setup, are
395available in https://pve.proxmox.com/wiki/Secure_Boot_Setup[our wiki].
bb94283b 396
5cea6ab1 397Switching an Existing Installation to Secure Boot
bb94283b
CH
398^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
399
263533e4 400WARNING: This can lead to an unbootable installation in some cases if not done
bb94283b
CH
401correctly. Reinstalling the host will setup Secure Boot automatically if
402available, without any extra interactions. **Make sure you have a working and
403well-tested backup of your {pve} host!**
404
405An existing UEFI installation can be switched over to Secure Boot if desired,
406without having to reinstall {pve} from scratch.
407
6eb73a3f
SI
408First, ensure all your system is up-to-date. Next, install
409`proxmox-secure-boot-support`. GRUB automatically creates the needed EFI boot
410entry for booting via the default shim.
bb94283b
CH
411
412.systemd-boot
413
414If `systemd-boot` is used as a bootloader (see
415xref:sysboot_determine_bootloader_used[Determine which Bootloader is used]),
416some additional setup is needed. This is only the case if {pve} was installed
417with ZFS-on-root.
418
419To check the latter, run:
420----
421# findmnt /
422----
423
c1ffc458 424If the host is indeed using ZFS as root filesystem, the `FSTYPE` column
bb94283b
CH
425should contain `zfs`:
426----
427TARGET SOURCE FSTYPE OPTIONS
428/ rpool/ROOT/pve-1 zfs rw,relatime,xattr,noacl,casesensitive
429----
430
431Next, a suitable potential ESP (EFI system partition) must be found. This can be
432done using the `lsblk` command as following:
433----
434# lsblk -o +FSTYPE
435----
436
437The output should look something like this:
438----
439NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS FSTYPE
440sda 8:0 0 32G 0 disk
441├─sda1 8:1 0 1007K 0 part
442├─sda2 8:2 0 512M 0 part vfat
443└─sda3 8:3 0 31.5G 0 part zfs_member
444sdb 8:16 0 32G 0 disk
445├─sdb1 8:17 0 1007K 0 part
446├─sdb2 8:18 0 512M 0 part vfat
447└─sdb3 8:19 0 31.5G 0 part zfs_member
448----
449
450In this case, the partitions `sda2` and `sdb2` are the targets. They can be
451identified by the their size of 512M and their `FSTYPE` being `vfat`, in this
452case on a ZFS RAID-1 installation.
453
7c73a209 454These partitions must be properly set up for booting through GRUB using
bb94283b
CH
455`proxmox-boot-tool`. This command (using `sda2` as an example) must be run
456separately for each individual ESP:
457----
458# proxmox-boot-tool init /dev/sda2 grub
459----
460
461Afterwards, you can sanity-check the setup by running the following command:
462----
463# efibootmgr -v
464----
465
466This list should contain an entry looking similar to this:
467----
468[..]
469Boot0009* proxmox HD(2,GPT,..,0x800,0x100000)/File(\EFI\proxmox\shimx64.efi)
470[..]
471----
472
7c73a209
CH
473NOTE: The old `systemd-boot` bootloader will be kept, but GRUB will be
474preferred. This way, if booting using GRUB in Secure Boot mode does not work for
bb94283b
CH
475any reason, the system can still be booted using `systemd-boot` with Secure Boot
476turned off.
477
478Now the host can be rebooted and Secure Boot enabled in the UEFI firmware setup
479utility.
480
481On reboot, a new entry named `proxmox` should be selectable in the UEFI firmware
482boot menu, which boots using the pre-signed EFI shim.
483
484If, for any reason, no `proxmox` entry can be found in the UEFI boot menu, you
485can try adding it manually (if supported by the firmware), by adding the file
486`\EFI\proxmox\shimx64.efi` as a custom boot entry.
487
a1b77797 488NOTE: Some UEFI firmwares are known to drop the `proxmox` boot option on reboot.
7c73a209 489This can happen if the `proxmox` boot entry is pointing to a GRUB installation
c1ffc458
AZ
490on a disk, where the disk itself is not a boot option. If possible, try adding
491the disk as a boot option in the UEFI firmware setup utility and run
a1b77797
CH
492`proxmox-boot-tool` again.
493
bb94283b
CH
494TIP: To enroll custom keys, see the accompanying
495https://pve.proxmox.com/wiki/Secure_Boot_Setup#Setup_instructions_for_db_key_variant[Secure
496Boot wiki page].
22f9f3e4 497
4235b3f9 498Using DKMS/Third Party Modules With Secure Boot
22f9f3e4
FG
499^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
500
501On systems with Secure Boot enabled, the kernel will refuse to load modules
502which are not signed by a trusted key. The default set of modules shipped with
503the kernel packages is signed with an ephemeral key embedded in the kernel
504image which is trusted by that specific version of the kernel image.
505
506In order to load other modules, such as those built with DKMS or manually, they
507need to be signed with a key trusted by the Secure Boot stack. The easiest way
508to achieve this is to enroll them as Machine Owner Key (`MOK`) with `mokutil`.
509
510The `dkms` tool will automatically generate a keypair and certificate in
511`/var/lib/dkms/mok.key` and `/var/lib/dkms/mok.pub` and use it for signing
512the kernel modules it builds and installs.
513
514You can view the certificate contents with
515
516----
517# openssl x509 -in /var/lib/dkms/mok.pub -noout -text
518----
519
520and enroll it on your system using the following command:
521
522----
523# mokutil --import /var/lib/dkms/mok.pub
524input password:
525input password again:
526----
527
528The `mokutil` command will ask for a (temporary) password twice, this password
529needs to be entered one more time in the next step of the process! Rebooting
530the system should automatically boot into the `MOKManager` EFI binary, which
531allows you to verify the key/certificate and confirm the enrollment using the
532password selected when starting the enrollment using `mokutil`. Afterwards, the
533kernel should allow loading modules built with DKMS (which are signed with the
534enrolled `MOK`). The `MOK` can also be used to sign custom EFI binaries and
535kernel images if desired.
536
537The same procedure can also be used for custom/third-party modules not managed
538with DKMS, but the key/certificate generation and signing steps need to be done
539manually in that case.