Skip to content

Unified Kernel Image (UKI)

A Unified Kernel Image (UKI) is a single, signed EFI executable that contains all components needed to boot Linux securely under UEFI, Secure Boot, and TPM environments.

Athena OS builds and uses UKIs for each installed kernel (LTS and Hardened) to guarantee measurable integrity and tamper-proof booting.

A UKI bundles these components into one signed .efi file:

ComponentDescription
EFI StubSmall loader that allows the image to be directly executed by UEFI firmware
Linux KernelThe main kernel binary
InitramfsEarly userspace environment for mounting the root filesystem
Kernel Command LineStatic boot parameters, embedded in the image
Metadata SectionOptional signature, OS release information, and PCR policy data

All of these are cryptographically signed and measured by Secure Boot and TPM at startup.

Traditional boot setups load multiple files (bootloader → kernel → initramfs), each potentially modifiable. With UKI, the kernel, initramfs, and parameters are unified and signed together.

Tampering with any component invalidates the entire signature.

Because a UKI is a standalone EFI executable, it is directly validated by UEFI Secure Boot.

This eliminates risks from:

  • Unsigned kernel/initramfs mismatches
  • Modified kernel command lines
  • Malicious injected initramfs content

Each UKI is measured into PCR11, PCR12, and PCR13 by systemd-stub, creating an attestation trail. When used with LUKS + TPM, this ensures:

  • The TPM will only unseal secrets if the measured UKI matches the enrolled trusted state.
  • Any modification in kernel, parameters, or initramfs will invalidate the PCRs.

Every UKI is reproducible from deterministic build metadata.
Versioned entries in /boot/loader/entries/ ensure that updates create new signed UKIs, leaving older ones intact for rollback.

No external bootloader scripting or initramfs juggling, the firmware directly executes the UKI:

UEFI → systemd-boot → UKI (kernel+initramfs+cmdline)

This reduces attack vectors and improves reliability.

Athena OS automatically generates and signs UKIs during kernel installation and updates.
For example:

EntryKernelDescription
Athena OS LTSLinux LTSStable, long-term kernel for compatibility and pentesting
Athena OS HardenedLinux HardenedExtra protections for high-security environments

Each entry corresponds to a UKI file stored in:

/boot/efi/EFI/Linux/athena-lts.efi
/boot/efi/EFI/Linux/athena-hardened.efi

These are automatically signed with the same MOK keys used by Secure Boot and measured by the TPM.