Restrictions Imposed by UEFI Secure Boot

Updated -

When UEFI Secure Boot is enabled, all loadable kernel modules (device drivers) must be signed and authenticated with a key that is on the system keyring. Kernel modules that are not authenticated will not load. That is, the system behaves as if the kernel parameter module.sig_enforce is set.

When UEFI Secure Boot is enabled, GRUB 2 module loading is disabled. Since there is...

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In