There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Issues with rEFInd & Secure Boot

So two questions regarding some boot issues I've encountered on my dual-boot linux setup:

  1. I want to know if there is any way at all to reduce and ideally eliminate the screen flickering that happens when rEFInd initially boots? My screen flashes gray three times before rEFInd shows up and I've tried adding & removing linux from the use_graphics_for option and mess with resolutions to no avail.
  2. Is there anyway I can get an encrypted Garuda system to work with Secure Boot? I've gotten rEFInd and OpenSUSE Tumbleweed to work, but no lock with Garuda despite attempting all of the MOK enrollment and shim copying.
    Any help is greatly appreciated!
phx ,

I haven’t seen this one before but now I have to thank you for bringing it to my attention. I’m gonna try and find some time to apply it to one of my devices and see if I run into the same flicker issues with Debian/Mint systems

Exec ,
@Exec@pawb.social avatar

I’ve tried to set up rEFInd but couldn’t get the proper configs / kernel parameters to work for my LUKS-enabled setup. If you’re willing to try another loader out, I was able to make systemd-boot work with both plymouth (flicker-less loading), luks (with graphical prompt), and secure boot too.

DARbarian OP ,
@DARbarian@artemis.camp avatar

Oh man that sounds like exactly what I'm looking for: dual-booting two distros, one encrypted, all with secure boot and a nice graphical boot process. I just went through the fiasco of rebuilding my EFI partition and grub setups. Is switching to systemd-boot much harder?

Exec ,
@Exec@pawb.social avatar

Follow the Arch wiki. Just make sure that your distro has a hook for the package manager for signing the kernel. Eg. for Arch there’s the systemd-boot-pacman-hook aur package.
It’s not hard to set it up with a LUKS-enabled system, just put the relevant kernel parameters in your /esp/loader/entries/entry.conf file.
For example, here’s my arch.conf entry (with LVM on LUKS):


<span style="color:#323232;">title    Arch Linux
</span><span style="color:#323232;">linux   /vmlinuz-linux
</span><span style="color:#323232;">initrd  /intel-ucode.img
</span><span style="color:#323232;">initrd  /initramfs-linux.img
</span><span style="color:#323232;">options loglevel=2 quiet splash cryptdevice=PARTLABEL=partlabel-from-blkid:pvname root=/dev/mapper/rootlvname rw  
</span>

If your keys are already enrolled, you can just use sbctl sign-all once, your package manager hook should do the rest.

Overall, the general directory structure should look like this in the end (files omitted):


<span style="color:#323232;">/boot
</span><span style="color:#323232;">├── initramfs-linux-fallback.img
</span><span style="color:#323232;">├── initramfs-linux.img
</span><span style="color:#323232;">├── intel-ucode.img
</span><span style="color:#323232;">├── loader
</span><span style="color:#323232;">│   ├── entries
</span><span style="color:#323232;">│   │   ├── arch.conf
</span><span style="color:#323232;">│   │   └── arch-fallback.conf
</span><span style="color:#323232;">│   ├── entries.srel
</span><span style="color:#323232;">│   ├── loader.conf
</span><span style="color:#323232;">│   └── random-seed
</span><span style="color:#323232;">└── vmlinuz-linux
</span>
  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines