On Tue, 1 Oct 2019 at 12:01, Peter Humphrey <pe...@prh.myzen.co.uk> wrote: > > On Tuesday, 1 October 2019 10:47:59 BST Neil Bothwick wrote: > > On Tue, 01 Oct 2019 10:05:23 +0100, Peter Humphrey wrote: > > > > Are you setting UEFI to boot from systemd-bootx64.efi or from the > > > > kernel image? If the former, you don't need a copy of the kernel in > > > > the ESP. > > > > > > I could run some tests to find out, but after throwing so much time and > > > effort into reaching a stable setup (so far), I don't wish to do > > > anything to it but use it, thanks all the same. > > > > You appear to have set up two alternative boot methods. While they don't > > conflict, you are adding potential confusion when trying to find out what > > is wrong. > > All right, I've deleted the systemd directory and the system boots more-or- > less as expected.
The whole idea of a boot manager is that the UEFI firmware loads the boot manager's .efi executable from the ESP and the boot manager then provides a list of bootable images and boots them as selected. Unlike the UEFI boot manager which can only process ESP/FAT partitions, the boot manager of choice is able to load kernels from various different filesystems. In your use case where additional kernel(s) reside on a secondary disk, the use of systemd-boot's .efi binary would make sense. The UEFI firmware will not be able to load them on its own. BTW, I am not sure if bootctl will throw a wobbly when the systemd directory is missing ... :-/ > The differences from a few months ago are (i) the BIOS > spends a few seconds flickering the cursor around the screen before showing my > boot menu; Could it be the systemd-boot binary is looking for some of its files and not finding them where expected? Or, it may be related to some Secure Boot checks. > (ii) after I've chosen the image to boot, I see 'SHA256 verified' > at the top-left of the BIOS's part of the screen, until the kernel takes it > over. I don't know what to make of those. When using Secure Boot the UEFI firmware check the binaries to be loaded have been signed by Microsoft. The 'SHA256 verified' message indicates the systemd-boot binary is signed using a key which is ultimately signed by Microsoft and is contained in the whitelist (MokList). If the verification failed I think it would spit something back to allow you to enrol a valid hash or key. -- Regards, Mick