]> git.proxmox.com Git - pve-docs.git/blob - system-booting.adoc
bump version to 8.2.1
[pve-docs.git] / system-booting.adoc
1 [[sysboot]]
2 Host Bootloader
3 ---------------
4 ifdef::wiki[]
5 :pve-toplevel:
6 endif::wiki[]
7
8 {pve} currently uses one of two bootloaders depending on the disk setup
9 selected in the installer.
10
11 For EFI Systems installed with ZFS as the root filesystem `systemd-boot` is
12 used, unless Secure Boot is enabled. All other deployments use the standard
13 GRUB bootloader (this usually also applies to systems which are installed on
14 top of Debian).
15
16
17 [[sysboot_installer_part_scheme]]
18 Partitioning Scheme Used by the Installer
19 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20
21 The {pve} installer creates 3 partitions on all disks selected for
22 installation.
23
24 The created partitions are:
25
26 * a 1 MB BIOS Boot Partition (gdisk type EF02)
27
28 * a 512 MB EFI System Partition (ESP, gdisk type EF00)
29
30 * a third partition spanning the set `hdsize` parameter or the remaining space
31 used for the chosen storage type
32
33 Systems using ZFS as root filesystem are booted with a kernel and initrd image
34 stored on the 512 MB EFI System Partition. For legacy BIOS systems, and EFI
35 systems with Secure Boot enabled, GRUB is used, for EFI systems without
36 Secure Boot, `systemd-boot` is used. Both are installed and configured to point
37 to the ESPs.
38
39 GRUB in BIOS mode (`--target i386-pc`) is installed onto the BIOS Boot
40 Partition of all selected disks on all systems booted with GRUB
41 footnote:[These are all installs with root on `ext4` or `xfs` and installs
42 with root on ZFS on non-EFI systems].
43
44
45 [[sysboot_proxmox_boot_tool]]
46 Synchronizing the content of the ESP with `proxmox-boot-tool`
47 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
48
49 `proxmox-boot-tool` is a utility used to keep the contents of the EFI System
50 Partitions properly configured and synchronized. It copies certain kernel
51 versions to all ESPs and configures the respective bootloader to boot from
52 the `vfat` formatted ESPs. In the context of ZFS as root filesystem this means
53 that you can use all optional features on your root pool instead of the subset
54 which is also present in the ZFS implementation in GRUB or having to create a
55 separate small boot-pool footnote:[Booting ZFS on root with GRUB
56 https://github.com/zfsonlinux/zfs/wiki/Debian-Stretch-Root-on-ZFS].
57
58 In setups with redundancy all disks are partitioned with an ESP, by the
59 installer. This ensures the system boots even if the first boot device fails
60 or if the BIOS can only boot from a particular disk.
61
62 The ESPs are not kept mounted during regular operation. This helps to prevent
63 filesystem corruption to the `vfat` formatted ESPs in case of a system crash,
64 and removes the need to manually adapt `/etc/fstab` in case the primary boot
65 device fails.
66
67 `proxmox-boot-tool` handles the following tasks:
68
69 * formatting and setting up a new partition
70 * copying and configuring new kernel images and initrd images to all listed ESPs
71 * synchronizing the configuration on kernel upgrades and other maintenance tasks
72 * managing the list of kernel versions which are synchronized
73 * configuring the boot-loader to boot a particular kernel version (pinning)
74
75
76 You can view the currently configured ESPs and their state by running:
77
78 ----
79 # proxmox-boot-tool status
80 ----
81
82 [[sysboot_proxmox_boot_setup]]
83 .Setting up a new partition for use as synced ESP
84
85 To format and initialize a partition as synced ESP, e.g., after replacing a
86 failed vdev in an rpool, or when converting an existing system that pre-dates
87 the sync mechanism, `proxmox-boot-tool` from `proxmox-kernel-helper` can be used.
88
89 WARNING: the `format` command will format the `<partition>`, make sure to pass
90 in the right device/partition!
91
92 For example, to format an empty partition `/dev/sda2` as ESP, run the following:
93
94 ----
95 # proxmox-boot-tool format /dev/sda2
96 ----
97
98 To setup an existing, unmounted ESP located on `/dev/sda2` for inclusion in
99 {pve}'s kernel update synchronization mechanism, use the following:
100
101 ----
102 # proxmox-boot-tool init /dev/sda2
103 ----
104
105 or
106
107 ----
108 # proxmox-boot-tool init /dev/sda2 grub
109 ----
110
111 to force initialization with GRUB instead of `systemd-boot`, for example for
112 Secure Boot support.
113
114 Afterwards `/etc/kernel/proxmox-boot-uuids` should contain a new line with the
115 UUID of the newly added partition. The `init` command will also automatically
116 trigger a refresh of all configured ESPs.
117
118 [[sysboot_proxmox_boot_refresh]]
119 .Updating the configuration on all ESPs
120
121 To copy and configure all bootable kernels and keep all ESPs listed in
122 `/etc/kernel/proxmox-boot-uuids` in sync you just need to run:
123
124 ----
125 # proxmox-boot-tool refresh
126 ----
127 (The equivalent to running `update-grub` systems with `ext4` or `xfs` on root).
128
129 This is necessary should you make changes to the kernel commandline, or want to
130 sync all kernels and initrds.
131
132 NOTE: Both `update-initramfs` and `apt` (when necessary) will automatically
133 trigger a refresh.
134
135 .Kernel Versions considered by `proxmox-boot-tool`
136 The following kernel versions are configured by default:
137
138 * the currently running kernel
139 * the version being newly installed on package updates
140 * the two latest already installed kernels
141 * the latest version of the second-to-last kernel series (e.g. 5.0, 5.3), if applicable
142 * any manually selected kernels
143
144 .Manually keeping a kernel bootable
145
146 Should you wish to add a certain kernel and initrd image to the list of
147 bootable kernels use `proxmox-boot-tool kernel add`.
148
149 For example run the following to add the kernel with ABI version `5.0.15-1-pve`
150 to the list of kernels to keep installed and synced to all ESPs:
151
152 ----
153 # proxmox-boot-tool kernel add 5.0.15-1-pve
154 ----
155
156 `proxmox-boot-tool kernel list` will list all kernel versions currently selected
157 for booting:
158
159 ----
160 # proxmox-boot-tool kernel list
161 Manually selected kernels:
162 5.0.15-1-pve
163
164 Automatically selected kernels:
165 5.0.12-1-pve
166 4.15.18-18-pve
167 ----
168
169 Run `proxmox-boot-tool kernel remove` to remove a kernel from the list of
170 manually selected kernels, for example:
171
172 ----
173 # proxmox-boot-tool kernel remove 5.0.15-1-pve
174 ----
175
176 NOTE: It's required to run `proxmox-boot-tool refresh` to update all EFI System
177 Partitions (ESPs) after a manual kernel addition or removal from above.
178
179
180 [[sysboot_determine_bootloader_used]]
181 Determine which Bootloader is Used
182 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
183
184 [thumbnail="screenshot/boot-grub.png", float="left"]
185
186 The simplest and most reliable way to determine which bootloader is used, is to
187 watch the boot process of the {pve} node.
188
189 You will either see the blue box of GRUB or the simple black on white
190 `systemd-boot`.
191
192 [thumbnail="screenshot/boot-systemdboot.png"]
193
194 Determining the bootloader from a running system might not be 100% accurate. The
195 safest way is to run the following command:
196
197
198 ----
199 # efibootmgr -v
200 ----
201
202 If it returns a message that EFI variables are not supported, GRUB is used in
203 BIOS/Legacy mode.
204
205 If the output contains a line that looks similar to the following, GRUB is
206 used in UEFI mode.
207
208 ----
209 Boot0005* proxmox [...] File(\EFI\proxmox\grubx64.efi)
210 ----
211
212 If the output contains a line similar to the following, `systemd-boot` is used.
213
214 ----
215 Boot0006* Linux Boot Manager [...] File(\EFI\systemd\systemd-bootx64.efi)
216 ----
217
218 By running:
219
220 ----
221 # proxmox-boot-tool status
222 ----
223
224 you can find out if `proxmox-boot-tool` is configured, which is a good
225 indication of how the system is booted.
226
227
228 [[sysboot_grub]]
229 GRUB
230 ~~~~
231
232 GRUB has been the de-facto standard for booting Linux systems for many years
233 and is quite well documented
234 footnote:[GRUB Manual https://www.gnu.org/software/grub/manual/grub/grub.html].
235
236 Configuration
237 ^^^^^^^^^^^^^
238 Changes to the GRUB configuration are done via the defaults file
239 `/etc/default/grub` or config snippets in `/etc/default/grub.d`. To regenerate
240 the configuration file after a change to the configuration run:
241 footnote:[Systems using `proxmox-boot-tool` will call `proxmox-boot-tool
242 refresh` upon `update-grub`.]
243
244 ----
245 # update-grub
246 ----
247
248
249 [[sysboot_systemd_boot]]
250 Systemd-boot
251 ~~~~~~~~~~~~
252
253 `systemd-boot` is a lightweight EFI bootloader. It reads the kernel and initrd
254 images directly from the EFI Service Partition (ESP) where it is installed.
255 The main advantage of directly loading the kernel from the ESP is that it does
256 not need to reimplement the drivers for accessing the storage. In {pve}
257 xref:sysboot_proxmox_boot_tool[`proxmox-boot-tool`] is used to keep the
258 configuration on the ESPs synchronized.
259
260 [[sysboot_systemd_boot_config]]
261 Configuration
262 ^^^^^^^^^^^^^
263
264 `systemd-boot` is configured via the file `loader/loader.conf` in the root
265 directory of an EFI System Partition (ESP). See the `loader.conf(5)` manpage
266 for details.
267
268 Each bootloader entry is placed in a file of its own in the directory
269 `loader/entries/`
270
271 An example entry.conf looks like this (`/` refers to the root of the ESP):
272
273 ----
274 title Proxmox
275 version 5.0.15-1-pve
276 options root=ZFS=rpool/ROOT/pve-1 boot=zfs
277 linux /EFI/proxmox/5.0.15-1-pve/vmlinuz-5.0.15-1-pve
278 initrd /EFI/proxmox/5.0.15-1-pve/initrd.img-5.0.15-1-pve
279 ----
280
281
282 [[sysboot_edit_kernel_cmdline]]
283 Editing the Kernel Commandline
284 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
285
286 You can modify the kernel commandline in the following places, depending on the
287 bootloader used:
288
289 .GRUB
290
291 The kernel commandline needs to be placed in the variable
292 `GRUB_CMDLINE_LINUX_DEFAULT` in the file `/etc/default/grub`. Running
293 `update-grub` appends its content to all `linux` entries in
294 `/boot/grub/grub.cfg`.
295
296 .Systemd-boot
297
298 The kernel commandline needs to be placed as one line in `/etc/kernel/cmdline`.
299 To apply your changes, run `proxmox-boot-tool refresh`, which sets it as the
300 `option` line for all config files in `loader/entries/proxmox-*.conf`.
301
302 A complete list of kernel parameters can be found at
303 'https://www.kernel.org/doc/html/v<YOUR-KERNEL-VERSION>/admin-guide/kernel-parameters.html'.
304 replace <YOUR-KERNEL-VERSION> with the major.minor version, for example, for
305 kernels based on version 6.5 the URL would be:
306 https://www.kernel.org/doc/html/v6.5/admin-guide/kernel-parameters.html
307
308 You can find your kernel version by checking the web interface ('Node ->
309 Summary'), or by running
310
311 ----
312 # uname -r
313 ----
314
315 Use the first two numbers at the front of the output.
316
317 [[sysboot_kernel_pin]]
318 Override the Kernel-Version for next Boot
319 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
320
321 To select a kernel that is not currently the default kernel, you can either:
322
323 * use the boot loader menu that is displayed at the beginning of the boot
324 process
325 * use the `proxmox-boot-tool` to `pin` the system to a kernel version either
326 once or permanently (until pin is reset).
327
328 This should help you work around incompatibilities between a newer kernel
329 version and the hardware.
330
331 NOTE: Such a pin should be removed as soon as possible so that all current
332 security patches of the latest kernel are also applied to the system.
333
334 For example: To permanently select the version `5.15.30-1-pve` for booting you
335 would run:
336
337 ----
338 # proxmox-boot-tool kernel pin 5.15.30-1-pve
339 ----
340
341 TIP: The pinning functionality works for all {pve} systems, not only those using
342 `proxmox-boot-tool` to synchronize the contents of the ESPs, if your system
343 does not use `proxmox-boot-tool` for synchronizing you can also skip the
344 `proxmox-boot-tool refresh` call in the end.
345
346 You can also set a kernel version to be booted on the next system boot only.
347 This is for example useful to test if an updated kernel has resolved an issue,
348 which caused you to `pin` a version in the first place:
349
350 ----
351 # proxmox-boot-tool kernel pin 5.15.30-1-pve --next-boot
352 ----
353
354 To remove any pinned version configuration use the `unpin` subcommand:
355
356 ----
357 # proxmox-boot-tool kernel unpin
358 ----
359
360 While `unpin` has a `--next-boot` option as well, it is used to clear a pinned
361 version set with `--next-boot`. As that happens already automatically on boot,
362 invonking it manually is of little use.
363
364 After setting, or clearing pinned versions you also need to synchronize the
365 content and configuration on the ESPs by running the `refresh` subcommand.
366
367 TIP: You will be prompted to automatically do for `proxmox-boot-tool` managed
368 systems if you call the tool interactively.
369
370 ----
371 # proxmox-boot-tool refresh
372 ----
373
374 [[sysboot_secure_boot]]
375 Secure Boot
376 ~~~~~~~~~~~
377
378 Since {pve} 8.1, Secure Boot is supported out of the box via signed packages
379 and integration in `proxmox-boot-tool`.
380
381 The following packages are required for secure boot to work. You can
382 install them all at once by using the `proxmox-secure-boot-support'
383 meta-package.
384
385 - `shim-signed` (shim bootloader signed by Microsoft)
386 - `shim-helpers-amd64-signed` (fallback bootloader and MOKManager, signed by
387 Proxmox)
388 - `grub-efi-amd64-signed` (GRUB EFI bootloader, signed by Proxmox)
389 - `proxmox-kernel-6.X.Y-Z-pve-signed` (Kernel image, signed by Proxmox)
390
391 Only GRUB is supported as bootloader out of the box, since other bootloader are
392 currently not eligible for secure boot code-signing.
393
394 Any new installation of {pve} will automatically have all of the above packages
395 included.
396
397 More details about how Secure Boot works, and how to customize the setup, are
398 available in https://pve.proxmox.com/wiki/Secure_Boot_Setup[our wiki].
399
400 Switching an Existing Installation to Secure Boot
401 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
402
403 WARNING: This can lead to an unbootable installation in some cases if not done
404 correctly. Reinstalling the host will setup Secure Boot automatically if
405 available, without any extra interactions. **Make sure you have a working and
406 well-tested backup of your {pve} host!**
407
408 An existing UEFI installation can be switched over to Secure Boot if desired,
409 without having to reinstall {pve} from scratch.
410
411 First, ensure all your system is up-to-date. Next, install
412 `proxmox-secure-boot-support`. GRUB automatically creates the needed EFI boot
413 entry for booting via the default shim.
414
415 .systemd-boot
416
417 If `systemd-boot` is used as a bootloader (see
418 xref:sysboot_determine_bootloader_used[Determine which Bootloader is used]),
419 some additional setup is needed. This is only the case if {pve} was installed
420 with ZFS-on-root.
421
422 To check the latter, run:
423 ----
424 # findmnt /
425 ----
426
427 If the host is indeed using ZFS as root filesystem, the `FSTYPE` column
428 should contain `zfs`:
429 ----
430 TARGET SOURCE FSTYPE OPTIONS
431 / rpool/ROOT/pve-1 zfs rw,relatime,xattr,noacl,casesensitive
432 ----
433
434 Next, a suitable potential ESP (EFI system partition) must be found. This can be
435 done using the `lsblk` command as following:
436 ----
437 # lsblk -o +FSTYPE
438 ----
439
440 The output should look something like this:
441 ----
442 NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS FSTYPE
443 sda 8:0 0 32G 0 disk
444 ├─sda1 8:1 0 1007K 0 part
445 ├─sda2 8:2 0 512M 0 part vfat
446 └─sda3 8:3 0 31.5G 0 part zfs_member
447 sdb 8:16 0 32G 0 disk
448 ├─sdb1 8:17 0 1007K 0 part
449 ├─sdb2 8:18 0 512M 0 part vfat
450 └─sdb3 8:19 0 31.5G 0 part zfs_member
451 ----
452
453 In this case, the partitions `sda2` and `sdb2` are the targets. They can be
454 identified by the their size of 512M and their `FSTYPE` being `vfat`, in this
455 case on a ZFS RAID-1 installation.
456
457 These partitions must be properly set up for booting through GRUB using
458 `proxmox-boot-tool`. This command (using `sda2` as an example) must be run
459 separately for each individual ESP:
460 ----
461 # proxmox-boot-tool init /dev/sda2 grub
462 ----
463
464 Afterwards, you can sanity-check the setup by running the following command:
465 ----
466 # efibootmgr -v
467 ----
468
469 This list should contain an entry looking similar to this:
470 ----
471 [..]
472 Boot0009* proxmox HD(2,GPT,..,0x800,0x100000)/File(\EFI\proxmox\shimx64.efi)
473 [..]
474 ----
475
476 NOTE: The old `systemd-boot` bootloader will be kept, but GRUB will be
477 preferred. This way, if booting using GRUB in Secure Boot mode does not work for
478 any reason, the system can still be booted using `systemd-boot` with Secure Boot
479 turned off.
480
481 Now the host can be rebooted and Secure Boot enabled in the UEFI firmware setup
482 utility.
483
484 On reboot, a new entry named `proxmox` should be selectable in the UEFI firmware
485 boot menu, which boots using the pre-signed EFI shim.
486
487 If, for any reason, no `proxmox` entry can be found in the UEFI boot menu, you
488 can try adding it manually (if supported by the firmware), by adding the file
489 `\EFI\proxmox\shimx64.efi` as a custom boot entry.
490
491 NOTE: Some UEFI firmwares are known to drop the `proxmox` boot option on reboot.
492 This can happen if the `proxmox` boot entry is pointing to a GRUB installation
493 on a disk, where the disk itself is not a boot option. If possible, try adding
494 the disk as a boot option in the UEFI firmware setup utility and run
495 `proxmox-boot-tool` again.
496
497 TIP: To enroll custom keys, see the accompanying
498 https://pve.proxmox.com/wiki/Secure_Boot_Setup#Setup_instructions_for_db_key_variant[Secure
499 Boot wiki page].
500
501 Using DKMS/Third Party Modules With Secure Boot
502 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
503
504 On systems with Secure Boot enabled, the kernel will refuse to load modules
505 which are not signed by a trusted key. The default set of modules shipped with
506 the kernel packages is signed with an ephemeral key embedded in the kernel
507 image which is trusted by that specific version of the kernel image.
508
509 In order to load other modules, such as those built with DKMS or manually, they
510 need to be signed with a key trusted by the Secure Boot stack. The easiest way
511 to achieve this is to enroll them as Machine Owner Key (`MOK`) with `mokutil`.
512
513 The `dkms` tool will automatically generate a keypair and certificate in
514 `/var/lib/dkms/mok.key` and `/var/lib/dkms/mok.pub` and use it for signing
515 the kernel modules it builds and installs.
516
517 You can view the certificate contents with
518
519 ----
520 # openssl x509 -in /var/lib/dkms/mok.pub -noout -text
521 ----
522
523 and enroll it on your system using the following command:
524
525 ----
526 # mokutil --import /var/lib/dkms/mok.pub
527 input password:
528 input password again:
529 ----
530
531 The `mokutil` command will ask for a (temporary) password twice, this password
532 needs to be entered one more time in the next step of the process! Rebooting
533 the system should automatically boot into the `MOKManager` EFI binary, which
534 allows you to verify the key/certificate and confirm the enrollment using the
535 password selected when starting the enrollment using `mokutil`. Afterwards, the
536 kernel should allow loading modules built with DKMS (which are signed with the
537 enrolled `MOK`). The `MOK` can also be used to sign custom EFI binaries and
538 kernel images if desired.
539
540 The same procedure can also be used for custom/third-party modules not managed
541 with DKMS, but the key/certificate generation and signing steps need to be done
542 manually in that case.