Search Criteria
Package Details: chkboot 1.3-1
Package Actions
| Git Clone URL: | https://aur.archlinux.org/chkboot.git (read-only, click to copy) |
|---|---|
| Package Base: | chkboot |
| Description: | Create hashes of all files under /boot and warns the user if they are modified |
| Upstream URL: | https://github.com/grazzolini/chkboot |
| Keywords: | boot check security |
| Licenses: | GPL |
| Submitter: | None |
| Maintainer: | grazzolini |
| Last Packager: | grazzolini |
| Votes: | 18 |
| Popularity: | 0.30 |
| First Submitted: | 2012-02-23 08:55 (UTC) |
| Last Updated: | 2019-04-16 21:41 (UTC) |
Dependencies (4)
- bash (bash-devel-gitAUR, bash-gitAUR)
- util-linux (util-linux-selinuxAUR, util-linux-aesAUR)
- xorg-xmessage (optional) – Graphical notifications
- zenity (zenity-gtk3AUR, zenity-gitAUR, qarma-gitAUR) (optional) – Graphical notifications
Latest Comments
1 2 Next › Last »
wolfk commented on 2025-09-17 14:16 (UTC)
@grazzolini IMO the chkboot hook for mkinicpio is wrong: This is being run before the last step of mkinitcpio: Creating zstd-compressed initcpio image: '/boot/initramfs-linux-fallback.img' which is why chkboot is always complaining about this file upon reboot after a new kernel has been deployed on my system Instead of using the mkinitcpio install hook in /usr/lib/initcpio/install/chkboot a mkinitcpio post script in /usr/lib/initcpio/post should be used, then the fallback image will be included in the last /var/lib/chkboot/BOOTFILES-* file
grazzolini commented on 2019-11-01 14:27 (UTC)
@pancakes,
It looks like systemd started updating this random-seed filed recently, hence why it started triggering chkboot. I personally mount the ESP to /boot/efi, so I get chkboot check for free on my efistub.
But, since I don't use systemd-boot, I don't have this issue. I really suggest you don't mount your ESP under /boot or use another bootloader.
pancakes commented on 2019-10-28 19:59 (UTC) (edited on 2019-10-28 20:09 (UTC) by pancakes)
Hi @grazzolini, and thanks for the very helpful link!
I don't quite understand the implications of mounting the ESP to a non
/bootpartition very well, so I'm hesitant to do that for now.Since I don't really mind a delay in boot speed on my machine, I thought I'd disable this systemd feature instead, at least as a test:
I tried removing
/sys/firmware/efi/efivars/LoaderSystemToken-*which cleared the variable according toefivars -l. However, and for some reason, the var was repopulated on boot, which is against my understanding of what the RANDOM_SEEDS documentation states (I didn't re-runbootctl random-seed, of course).I tried adding
random-seed-mode offto myloader.conffile, and for some reason, that setting is also being totally ignored! Theloader/random-seedfile still gets regenerated on boot.So the issue remains unresolved for now.
I'm still curious why it only started happening recently, and whether other users have experienced the same issue. I may take it to the forums if it keeps eating at me :) - Cheers!
grazzolini commented on 2019-09-14 04:19 (UTC)
@pancakes,
This seems to be used by systemd-boot, see https://systemd.io/RANDOM_SEEDS. Looks like if you have a seed on the efivar, it'll merge that with the file, triggering chkboot on every boot. My suggestion would be to not mount the ESP under the same path as your /boot partition. If you mount your ESP to /boot/efi, try mounting it to /efi.
pancakes commented on 2019-09-12 08:57 (UTC)
I recently started getting a new /boot/loader/random-seed file on boot on every reboot, triggering chbkoot's warnings. Anyone has an idea on what's the cause behind this? I suspect a systemd update, in which case, is it happening to others as well?
DefaultSpatula commented on 2019-04-16 22:11 (UTC)
I appreciate you taking the time to update this package; thanks!
Notice to everyone: After updating to 1.3, chkboot will warn you about changed hashes. This is because the hashing algorithm has been updated to use SHA512.
grazzolini commented on 2019-04-15 16:51 (UTC)
@DefaultSpatula
I'm going through your PR's. But please, don't advise anyone on using then, specially the EFI one.
DefaultSpatula commented on 2019-04-13 15:05 (UTC)
A heads up for anyone trying to use this on an EFI system: Manually apply pull requests #9, #10, and #11 from github and it'll work perfectly.
Additionally, pull request #13 includes pacman hooks to automate the process when your boot images, systemd, or kernel microcode receive updates.
grazzolini commented on 2015-08-17 15:02 (UTC)
noxpo commented on 2015-08-16 08:25 (UTC)
1 2 Next › Last »