Understanding the Linux startup process

Step 2: Booting with ESP

The UEFI utilizes a partition called EFI, which contains a boot code, to boot the system. The EFI System Partition (ESP) is a special partition on the GPT that stores EFI programs such as the bootloaders and utility software. Usually, the ESP mounts at /boot/efi. Therefore, /boot/efi/EFI is likely the beginning point for many of the EFI directory trees. The UEFI system looks for a partition with a unique GUID that distinguishes it as being the ESP. When more than one boot device (loadable kernel) is present, the UEFI boot manager chooses which ESP to utilize depending on the set boot manager order. Instead of using the predetermined order, you may choose an operating system to boot. You can specify your choice using the efibootmgr program.

Step 3: UEFI Secure Boot

Optionally, the UEFI boot manager makes sure to verify whether Secure Boot is turned on or off. In case Secure Boot is not set, the boot manager will cause the ESP to use the GRUB bootloader.

Other than that, the boot manager will ask the bootloader for a certificate. Then, the boot manager checks it against the keys in the UEFI Secure Boot key database before running the bootloader. Practically, to register the binary, most Linux systems utilize a small signed binary (Red Hat uses the shim package, for example). Additionally, the GRUB 2 loader can also be signed with a key that is user-managed via a Machine Owner Key (MOK) list. All boot binaries, including UEFI firmware drivers, EFI programs, and the OS, must have their digital signature validated by the firmware. Only after this step can the computer boot. This protects the OS from possible threats such as pre-boot malware, rootkits, and software upgrades that aren't secure [6].

Step 4: The Bootloader Phase

The GRUB 2 EFI boot loads after a successful Secure Boot verification process. The GRUB 2 bootloader, in turn, validates the kernel. In a nutshell, a bootloader is the very first piece of software that a computer's boot process activates. It is in charge of loading and handing off control to an OS kernel such as Linux.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • The State of Secure Boot

    Opinions differ on the UEFI boot security system, but one thing is certain: Secure Boot is here to stay. We thought it was time to ask, "How hard is it to boot a popular Linux distribution in a UEFI Secure Boot environment?"

  • UEFI and Secure Boot

    The coming Windows 8 implementation of UEFI with Secure Boot adds an extra layer of complexity for some Linux users. We look at the problem and two solutions from Fedora and Canonical.

  • UEFI Boot Fix

    A new universal workaround will keep Linux booting on the next generation of UEFI-enabled personal computers.

  • Linux Foundation Announces Secure Boot Solution

    Linux Foundation announces that Linux will continue to operate under Secure Boot-enabled systems.

  • Win8/Linux Dual-Boot

    Although getting Windows to play nice with an existing Linux installation is difficult, with a few tricks, you can set up Windows 8 to dual-boot with Linux.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News