36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
# Blastproof boot process
|
|
|
|
Blastproof boot process follow a very rigid sequences of steps that are detailled below:
|
|
|
|
- Printing informations:
|
|
- Bootloader version
|
|
- Firmware informations
|
|
- CPU informations
|
|
- Reading boot password from EFI console
|
|
- Verifying integrity of integrated keys (see SBFIE)
|
|
- Acquiring access to ESP partition
|
|
- Acquiring loaded image handle
|
|
- Acquiring BlockIO protocol for ESP partition
|
|
- Acquiring filesystem protocol (Blastproof doesn't have an integrated FAT32 driver)
|
|
- Opening root folder
|
|
- Performing cryptographic checks with internal keys on his own files (see SBFIE)
|
|
- Readind, parsing and applying boot configuration
|
|
- Locating Simple Graphic Protocol (GOP) handle
|
|
- Identify a suitable graphic output format, based on configuration, or highest resolution available in case of fallback
|
|
- Loading and rendering bitmap font according to selected graphic output format
|
|
- Loading, rendering and playing boot animation if configuration allow it
|
|
- Loading InitFS and SignSyst
|
|
- Listing all availables BlockIO protocol
|
|
- Locating handles for InitFS and SignSyst
|
|
- Allocating memory for them
|
|
- Loading them into RAM
|
|
- Parsing their headers
|
|
- Performing cryptographic checks to validate their headers and contents
|
|
- Loading the kernel
|
|
- Loading Shelter and Keycard binary
|
|
- Generating Shelter boot configuration
|
|
- Allocating pages for kernel sections
|
|
- Creating page table
|
|
- Parsing EFI Memory Map and transforming it into a understandable format for Vystem
|
|
- Jumping to kernel
|