How to Build a UKI for Qubes Guide (Boot Security) revisions

Go back to topic: How to Build a UKI for Qubes Guide (Boot Security)

  1. v4 anchor; v4 full version
  2. v3 anchor; v3 full version
  3. v2 anchor; v2 full version

Revision #4

Edited on
2026-02-06
Edited by user
Noah-Raketic
During the creation of the UKI, you can permanently leave your existing EFI entry to boot to (with secure boot disabled) as a backup if anything fails. During the creation of the UKI, your original EFI entry is not modified, so you can still boot to that (with secure boot disabled) as a backup if anything fails.

Revision #3

Edited on
2026-02-06
Edited by user
Noah-Raketic

Revision #2

Edited on
2026-02-06
Edited by user
Noah-Raketic
Copying to dom0 is very sensitive, more so booting from a copied EFI entry; ensure you have built it securely before doing this step. Copying to dom0 is very sensitive, more so booting from a copied EFI entry; ensure you have built it securely before doing this step. In dom0: