LamBoot v0.9.0 Released — Native /boot Reading, Native PE Loader, Pop!_OS Auto-Discovery
April 25, 2026 | Lamco Development
LamBoot v0.9.0 closes the long-standing shim 15.8 ShimLock-uninstall gap that previously broke stock distro /boot-on-ext4 under Secure Boot — structurally, not via a workaround. v0.8.3 said “use UKI as workaround”; v0.9.0 says “stock distros work.”
What shipped
- Native ext4 read backend (SDS-2) on top of the
ext4-viewRust crate — read-only by design - Native PE loader (SDS-3) — own image verification + load, no firmware
LoadImagechainload - Native trust chain (SDS-4) — covers what shim/firmware can’t see
- BLS multi-FS discovery (SDS-5) — scan BLS Type 1 entries on every mounted volume
- Pop!_OS / systemd-boot-discoverable-EFI auto-discovery — first non-systemd-boot bootloader to pick up Pop!_OS kernels
- EFI Fallback chainload self-loop guard — safe to write LamBoot to the firmware-fallback path repeatedly
- Append-mode trust log with per-image SHA-256
The Pop!_OS angle
Pop!_OS uses System76’s kernelstub to lay kernels out at \EFI\Pop_OS-<root-uuid>\vmlinuz.efi — a systemd-boot-style auto-discovered layout per the Boot Loader Specification, with no BLS Type 1 entries. Before v0.9.0, LamBoot’s discovery missed Pop!_OS entirely. Pop!_OS is the only mainstream distro shipping kernelstub-managed kernels-on-ESP without BLS Type 1 entries; LamBoot now picks it up first-class. Live evidence from VM 124: trust log shows entries_discovered total=7, Pop!_OS Recovery selected, image_verified verified_via=degraded_trust_sb_direct, image_loaded_native loader=native_pe_loader.
Read-only /boot guarantee
The ext4-view crate is read-only by design — LamBoot’s code literally cannot modify your /boot, backed by language and crate guarantees. This is a stronger claim than any other mainstream Linux bootloader can make.
Coordinated lamboot-tools v0.3.0
Shipped alongside: esp-deploy.sh as a canonical library sourced by other commands; a new offline lamboot-esp deploy subcommand for VM-template builders and offline repair; hardened foreign-bootloader detection at \EFI\BOOT\BOOTX64.EFI; first-class BootOrder reorder.
Coverage
Debian 13, Ubuntu 24.04 / 25.10, Fedora 43, and Pop!_OS 24.04 fully covered under specific Secure Boot + filesystem configs. Test suite: 137 host tests + 219 bats + verify-claims 84/0/1.
What’s next
v1.0’s anchor shifts to Path D — Microsoft shim-review submission, the first Rust bootloader through rhboot/shim-review. Removes per-system MOK enrollment; broadens trust baseline to Microsoft-signed level. Native btrfs and xfs read backends follow. Microsoft UEFI CA 2011 expires June 2026 — a timeline factor for fleet operators.
Download
Tag v0.9.0. Tarball: lamboot-0.9.0-x86_64.tar.gz. SHA-256: b7058cc5e58c5406d877cdb2991c75fe20919fef6c6b2b712c259bfaa0b9918d.