Install & Config GRUB
GRUB (GRand Unified Bootloader) is a boot loader. The current GRUB is also referred to as GRUB 2. The original GRUB, or GRUB Legacy, corresponds to versions 0.9x. This page exclusively describes GRUB 2.
Note: In the entire article esp denotes the mount point of the EFI system partition aka ESP.
Supported file systems
GRUB bundles its own support for multiple file systems, notably FAT32, ext4, Btrfs or XFS. See #Unsupported file systems for some caveats.
Warning: File systems can get new features not yet supported by GRUB, making them unsuitable for /boot unless disabling incompatible features. This can be typically avoided by using a separate /boot partition with a universally supported file system such as FAT32.
UEFI systems
- Note:
-
- It is recommended to read and understand the Unified Extensible Firmware Interface, Partitioning#GUID Partition Table and Arch boot process#UEFI 2 pages.
- When installing to use UEFI it is important to boot the installation media in UEFI mode, otherwise efibootmgr will not be able to add the GRUB UEFI boot entry. Installing to the fallback boot path will still work even in BIOS mode since it does not touch the NVRAM.
- To boot from a disk using UEFI, an EFI system partition is required. Follow EFI system partition#Check for an existing partition to find out if you have one already, otherwise you need to create it.
- This whole article assumes that inserting additional GRUB2 modules via
insmodis possible. As discussed in #Shim-lock, this is not the case on UEFI systems with Secure Boot enabled. If you want to use any additional GRUB module that is not included in the standard GRUB EFI filegrubx64.efion a Secure Boot system, you have to re-generate the GRUB EFIgrubx64.efiwithgrub-mkstandaloneor reinstall GRUB usinggrub-installwith the additional GRUB modules included.
Installation
- Note:
-
- UEFI firmwares are not implemented consistently across manufacturers. The procedure described below is intended to work on a wide range of UEFI systems but those experiencing problems despite applying this method are encouraged to share detailed information, and if possible the workarounds found, for their hardware-specific case. A /EFI examples article has been provided for such cases.
- The section assumes you are installing GRUB for x64 (64-bit) UEFI. For IA32 (32-bit) UEFI (not to be confused with 32-bit CPUs), replace
x86_64-efiwithi386-efiwhere appropriate. Follow the instructions in Unified Extensible Firmware Interface#Checking the firmware bitness to figure out your UEFI's bitness.
First, install the packages grub and efibootmgr: GRUB is the boot loader while efibootmgr is used by the GRUB installation script to write boot entries to NVRAM.
Then follow the below steps to install GRUB to your disk:
- Mount the EFI system partition and in the remainder of this section, substitute
espwith its mount point. - Choose a boot loader identifier, here named
GRUB. A directory of that name will be created inesp/EFI/to store the EFI binary and this is the name that will appear in the UEFI boot menu to identify the GRUB boot entry. - Execute the following command to install the GRUB EFI application
grubx64.efitoesp/EFI/GRUB/and install its modules to/boot/grub/x86_64-efi/.
- Note:
-
- Make sure to install the packages and run the
grub-installcommand from the system in which GRUB will be installed as the boot loader. That means if you are booting from the live installation environment, you need to be inside the chroot when runninggrub-install.
If for some reason it is necessary to rungrub-installfrom outside of the installed system, append the--boot-directory=option with the path to the mounted/bootdirectory, e.g--boot-directory=/mnt/boot. - Some motherboards cannot handle
bootloader-idwith spaces in it.
- Make sure to install the packages and run the
# grub-install --target=x86_64-efi --efi-directory=esp --bootloader-id=GRUB
After the above installation completed, the main GRUB directory is located at /boot/grub/. Read /Tips and tricks#Alternative install method for how to specify an alternative location. Note that grub-install also tries to create an entry in the firmware boot manager, named GRUB in the above example – this will, however, fail if your boot entries are full or the systems prevents the boot order from being manipulated (e.g. Thinkpad BIOSs have a setting called "Boot Order Lock" which needs to be disabled for efibootmgr to be able to add/remove entries); use efibootmgr to remove unnecessary entries.
Remember to #Generate the main configuration file after finalizing the configuration.
- Tip:
- If you use the option
--removablethen GRUB will be installed toesp/EFI/BOOT/BOOTX64.EFI(oresp/EFI/BOOT/BOOTIA32.EFIfor thei386-efitarget) and you will have the additional ability of being able to boot from the drive in case EFI variables are reset or you move the drive to another computer. Usually you can do this by selecting the drive itself, similar to how you would using BIOS.- If dual booting with Windows, be aware Windows usually places an EFI executable there, but its only purpose is to recreate the UEFI boot entry for Windows. If you are installing GRUB on a Mac, you will have to use this option.
- Some desktop motherboards will only look for an EFI executable in this location, making this option mandatory, in particular with MSI boards. If you execute a UEFI update, this update might delete the existing UEFI boot entries. Therefore, it is a potential fallback strategy to have the "removable" boot entry enabled.
- Note:
-
--efi-directoryand--bootloader-idare specific to GRUB UEFI,--efi-directoryreplaces--root-directorywhich is deprecated.- You might note the absence of a device_path option (e.g.:
/dev/sda) in thegrub-installcommand. In fact any device_path provided will be ignored by the GRUB UEFI install script. Indeed, UEFI boot loaders do not use a MBR bootcode or partition boot sector at all.
See UEFI troubleshooting in case of problems. Additionally see /Tips and tricks#UEFI further reading.
Secure Boot support
GRUB fully supports secure boot utilising either CA keys or shim; the installation command, however, is different depending on which you intend to use.
- Warning:
-
- Incorrectly configuring Secure Boot can render your system unbootable. If for any reason you cannot boot after enabling secure boot then you should disable it in firmware and reboot the system.
- Loading unnecessary modules in your boot loader has the potential to present a security risk, only use these commands if you need them.
CA Keys
To make use of CA Keys the command is:
# grub-install --target=x86_64-efi --efi-directory=esp --bootloader-id=GRUB --modules="tpm" --disable-shim-lock
Shim-lock
Note: Before following this section you should make sure you have followed the instructions at Secure Boot#shim and have sbsigntools set-up and ready to receive keys.
When using Shim-lock, GRUB can only be successfully booted in Secure Boot mode if its EFI binary includes all of the modules necessary to read the filesystem containing the vmlinuz and initramfs images.
Since GRUB version 2.06.r261.g2f4430cc0, loading modules in Secure Boot Mode via insmod is no longer allowed, as this would violate the expectation to not sideload arbitrary code. If the GRUB modules are not embedded in the EFI binary, and GRUB tries to sideload/insmod them, GRUB will fail to boot with the message:
error: prohibited by secure boot policy
Ubuntu, according to its official build script, embeds the following GRUB modules in its signed GRUB EFI binary grubx64.efi:
- the "basic" modules, necessary for booting from a CD or from a simple-partitioned disk:
all_video,boot,btrfs,cat,chain,configfile,echo,efifwsetup,efinet,ext2,fat,font,gettext,gfxmenu,gfxterm,gfxterm_background,gzio,halt,help,hfsplus,iso9660,jpeg,keystatus,loadenv,loopback,linux,ls,lsefi,lsefimmap,lsefisystab,lssal,memdisk,minicmd,normal,ntfs,part_apple,part_msdos,part_gpt,password_pbkdf2,png,probe,reboot,regexp,search,search_fs_uuid,search_fs_file,search_label,sleep,smbios,squash4,test,true,video,xfs,zfs,zfscrypt,zfsinfo - the "platform-specific" modules for x86_64-efi architecture, necessary for e.g.:
play: to play sounds during bootcpuid: to the CPU at boottpm: to support Measured Boot / Trusted Platform Modules
- the "advanced" modules, consisting of modules:
cryptodisk: to boot from plain-mode encrypted disksgcry_algorithm: to support particular hashing and encryption algorithmsluks: to boot from LUKS-encrypted disks:lvm: to boot from LVM logical volume disksmdraid09,mdraid1x,raid5rec,raid6rec: to boot from RAID virtual disks
You must construct your list of GRUB modules in the form of a shell variable that we denote as GRUB_MODULES. You can use the latest Ubuntu script as a starting point, and trim away modules that are not necessary on your system. Omitting modules will make the boot process relatively faster, and save some space on the ESP partition.
You also need a Secure Boot Advanced Targeting (SBAT) file/section included in the EFI binary, to improve the security; if GRUB is launched from the UEFI shim loader. This SBAT file/section contains metadata about the GRUB binary (version, maintainer, developer, upstream URL) and makes it easier for shim to block certain GRUB versions from being loaded if they have security vulnerabilities[1][2], as explained in the UEFI shim boot loader secure boot life-cycle improvements document from shim.
The first-stage UEFI boot loader shim will fail to launch grubx64.efi if the SBAT section from grubx64.efi is missing!
If GRUB is installed, a sample SBAT .csv file is provided under /usr/share/grub/sbat.csv.
Reinstall GRUB using the provided /usr/share/grub/sbat.csv file and all the needed GRUB_MODULES and sign it:
# grub-install --target=x86_64-efi --efi-directory=esp --modules=${GRUB_MODULES} --sbat /usr/share/grub/sbat.csv # sbsign --key MOK.key --cert MOK.crt --output esp/EFI/GRUB/grubx64.efi esp/EFI/GRUB/grubx64.efi # cp esp/EFI/GRUB/grubx64.efi esp/EFI/BOOT/grubx64.efi
Reboot, select the key in MokManager, and Secure Boot should be working.
Using Secure Boot
After installation see Secure Boot#Implementing Secure Boot for instructions on enabling it.
If you are using the CA Keys method then key management, enrolment and file signing can be automated by using sbctl, see Secure Boot#Assisted process with sbctl for details.
BIOS systems
GUID Partition Table (GPT)
On a BIOS/GPT configuration, a BIOS boot partition is required. GRUB embeds its core.img into this partition.
- Note:
-
- Before attempting this method keep in mind that not all systems will be able to support this partitioning scheme. Read more on Partitioning#GUID Partition Table.
- The BIOS boot partition is only needed by GRUB on a BIOS/GPT setup. On a BIOS/MBR setup, GRUB uses the post-MBR gap for the embedding the
core.img. On GPT, however, there is no guaranteed unused space before the first partition. - For UEFI systems this extra partition is not required, since no embedding of boot sectors takes place in that case. However, UEFI systems still require an EFI system partition.
Create a mebibyte partition (+1M with fdisk or gdisk) on the disk with no file system and with partition type GUID 21686148-6449-6E6F-744E-656564454649.
This partition can be in any position order but has to be on the first 2 TiB of the disk. This partition needs to be created before GRUB installation. When the partition is ready, install the boot loader as per the instructions below.
The space before the first partition can also be used as the BIOS boot partition though it will be out of GPT alignment specification. Since the partition will not be regularly accessed performance issues can be disregarded, though some disk utilities will display a warning about it. In fdisk or gdisk create a new partition starting at sector 34 and spanning to 2047 and set the type. To have the viewable partitions begin at the base consider adding this partition last.
Master Boot Record (MBR)
Usually the post-MBR gap (after the 512 byte MBR region and before the start of the first partition) in many MBR partitioned systems is 31 KiB when DOS compatibility cylinder alignment issues are satisfied in the partition table. However a post-MBR gap of about 1 to 2 MiB is recommended to provide sufficient room for embedding GRUB's core.img (FS#24103). It is advisable to use a partitioning tool that supports 1 MiB partition alignment to obtain this space as well as to satisfy other non-512-byte-sector issues (which are unrelated to embedding of core.img).
Installation
Install the grub package. (It will replace grub-legacyAUR if that is already installed.) Then do:
# grub-install --target=i386-pc /dev/sdX
where i386-pc is deliberately used regardless of your actual architecture, and /dev/sdX is the disk (not a partition) where GRUB is to be installed. For example /dev/sda or /dev/nvme0n1, or /dev/mmcblk0. See Device file#Block device names for a description of the block device naming scheme.
Now you must generate the main configuration file.
If you use LVM for your /boot, you can install GRUB on multiple physical disks.
Tip: See /Tips and tricks#Alternative installation methods for other ways to install GRUB, such as to a USB stick.
See grub-install(8) and GRUB Manual for more details on the grub-install command.
Configuration
On an installed system, GRUB loads the /boot/grub/grub.cfg configuration file each boot. You can follow #Generated grub.cfg for using a tool, or #Custom grub.cfg for a manual creation.
Generated grub.cfg
This section only covers editing the /etc/default/grub configuration file. See /Tips and tricks for more information.
Note: Remember to always re-generate the main configuration file after making changes to /etc/default/grub and/or files in /etc/grub.d/..
Warning: Update/reinstall the boot loader (see #UEFI systems or #BIOS systems) if a new GRUB version changes the syntax of the configuration file: mismatching configuration can result in an unbootable system. For example, the new configuration might use a function unknown to the existing GRUB binary, causing unexpected behavior.
Generate the main configuration file
After the installation, the main configuration file /boot/grub/grub.cfg needs to be generated. The generation process can be influenced by a variety of options in /etc/default/grub and scripts in /etc/grub.d/. For the list of options in /etc/default/grub and a concise description of each refer to GNU's documentation.
If you have not done additional configuration, the automatic generation will determine the root filesystem of the system to boot for the configuration file. For that to succeed it is important that the system is either booted or chrooted into.
- Note:
-
- The default file path is
/boot/grub/grub.cfg, not/boot/grub/i386-pc/grub.cfg. - If you are trying to run grub-mkconfig in a chroot or systemd-nspawn container, you might notice that it does not work:
grub-probe: error: failed to get canonical path of /dev/sdaX. In this case, try using arch-chroot as described in the BBS post.
- The default file path is
Use the grub-mkconfig tool to generate /boot/grub/grub.cfg:
# grub-mkconfig -o /boot/grub/grub.cfg
By default the generation scripts automatically add menu entries for all installed Arch Linux kernels to the generated configuration.
- Tip:
- After installing or removing a kernel, you just need to re-run the above grub-mkconfig command.
- For tips on managing multiple GRUB entries, for example when using both linux and linux-lts kernels, see /Tips and tricks#Multiple entries.
To automatically add entries for other installed operating systems, see #Detecting other operating systems.
You can add additional custom menu entries by editing /etc/grub.d/40_custom and re-generating /boot/grub/grub.cfg. Or you can create /boot/grub/custom.cfg and add them there. Changes to /boot/grub/custom.cfg do not require re-running grub-mkconfig, since /etc/grub.d/41_custom adds the necessary source statement to the generated configuration file.
Tip:/etc/grub.d/40_customcan be used as a template to create/etc/grub.d/nn_custom, wherenndefines the precedence, indicating the order the script is executed. The order scripts are executed determine the placement in the GRUB boot menu.nnshould be greater than06to ensure necessary scripts are executed first.
See #Boot menu entry examples for custom menu entry examples.
Detecting other operating systems
To have grub-mkconfig search for other installed systems and automatically add them to the menu, install the os-prober package and mount the partitions from which the other systems boot. Then re-run grub-mkconfig. If you get the following output: Warning: os-prober will not be executed to detect other bootable partitions then edit /etc/default/grub and add/uncomment:
GRUB_DISABLE_OS_PROBER=false
Then try again.
- Note:
-
- The exact mount point does not matter, os-prober reads the
mtabto identify places to search for bootable entries. - Remember to mount the partitions each time you run grub-mkconfig in order to include the other operating systems every time.
- os-prober might not work properly when run in a chroot. Try again after rebooting into the system if you experience this.
- The exact mount point does not matter, os-prober reads the
Tip: You might also want GRUB to remember the last chosen boot entry, see /Tips and tricks#Recall previous entry.
- Windows:
-
- For Windows installed in UEFI mode, make sure the EFI system partition containing the Windows Boot Manager (
bootmgfw.efi) is mounted. Runos-proberas root to detect and generate an entry for it. - For Windows installed in BIOS mode, mount the Windows system partition (its file system label should be
System ReservedorSYSTEM). Runos-proberas root to detect and generate an entry for it.
- For Windows installed in UEFI mode, make sure the EFI system partition containing the Windows Boot Manager (
- Note:
-
os-probermight try togrub-mounta partition to probe whether the requisite.efifile exists. You need to install fuse3 to makegrub-mountwork properly. Otherwise, you may fail to detect a Windows system.- NTFS partitions may not always be detected when mounted with the default Linux drivers. If GRUB is not detecting it, try installing NTFS-3G and remounting.
Additional arguments
To pass custom additional arguments to the Linux image, you can set the GRUB_CMDLINE_LINUX + GRUB_CMDLINE_LINUX_DEFAULT variables in /etc/default/grub. The two are appended to each other and passed to kernel when generating regular boot entries. For the recovery boot entry, only GRUB_CMDLINE_LINUX is used in the generation.
It is not necessary to use both, but can be useful. For example, you could use GRUB_CMDLINE_LINUX_DEFAULT="resume=UUID=uuid-of-swap-partition quiet" where uuid-of-swap-partition is the UUID of your swap partition to enable resume after hibernation. This would generate a recovery boot entry without the resume and without quiet suppressing kernel messages during a boot from that menu entry. Though, the other (regular) menu entries would have them as options.
By default grub-mkconfig determines the UUID of the root filesystem for the configuration. To disable this, uncomment GRUB_DISABLE_LINUX_UUID=true.
For generating the GRUB recovery entry you have to ensure that GRUB_DISABLE_RECOVERY is not set to true in /etc/default/grub.
See Kernel parameters for more info.
LVM
Notes: grub-mkconfig is capable of detecting that it needs the lvm module, specifying it in GRUB_PRELOAD_MODULES is not required. Move warning to #Installation & #Installation_2 or create a Known issues section and document it there. (Discuss in Talk:GRUB.
Warning: GRUB does not support thin-provisioned logical volumes.
If you use LVM for your /boot or / root partition, make sure that the lvm module is preloaded:
/etc/default/grub
GRUB_PRELOAD_MODULES="... lvm"
RAID
Notes: grub-mkconfig is capable of detecting that it needs the mdraid09 and/or mdraid1x modules, specifying them in GRUB_PRELOAD_MODULES is not required. Summarize the double grub-install in a note and move it to #Installation; move set root stuff to #Custom grub.cfg. (Discuss in Talk:GRUB.
GRUB provides convenient handling of RAID volumes. You need to load GRUB modules mdraid09 or mdraid1x to allow you to address the volume natively:
/etc/default/grub
GRUB_PRELOAD_MODULES="... mdraid09 mdraid1x"
For example, /dev/md0 becomes:
set root=(md/0)
whereas a partitioned RAID volume (e.g. /dev/md0p1) becomes:
set root=(md/0,1)
To install grub when using RAID1 as the /boot partition (or using /boot housed on a RAID1 root partition), on BIOS systems, simply run grub-install on both of the drives, such as:
# grub-install --target=i386-pc --debug /dev/sda # grub-install --target=i386-pc --debug /dev/sdb
Where the RAID 1 array housing /boot is housed on /dev/sda and /dev/sdb.
Note: GRUB supports booting from Btrfs RAID 0/1/10, but not RAID 5/6. You may use mdadm for RAID 5/6, which is supported by GRUB.
Encrypted /boot
GRUB also has special support for booting with an encrypted /boot. This is done by unlocking a LUKS blockdevice in order to read its configuration and load any initramfs and kernel from it. This option tries to solve the issue of having an unencrypted boot partition.
Tip:/bootis not required to be kept in a separate partition; it may also stay under the system's root/directory tree.
Warning: GRUB 2.12rc1 has limited support for LUKS2. See the #LUKS2 section below for details.
To enable this feature encrypt the partition with /boot residing on it using LUKS as normal. Then add the following option to /etc/default/grub:
/etc/default/grub
GRUB_ENABLE_CRYPTODISK=y
This option is used by grub-install to generate the grub core.img.
Make sure to install grub after modifying this option or encrypting the partition.
Without further changes you will be prompted twice for a passphrase: the first for GRUB to unlock the /boot mount point in early boot, the second to unlock the root filesystem itself as implemented by the initramfs. You can use a keyfile to avoid this.
- Warning:
-
- If you want to generate the main configuration file, make sure that
/bootis mounted. - In order to perform system updates involving the
/bootmount point, ensure that the encrypted/bootis unlocked and mounted before performing an update. With a separate/bootpartition, this may be accomplished automatically on boot by using crypttab with a keyfile.
- If you want to generate the main configuration file, make sure that
- Note:
-
- If you use a special keymap, a default GRUB installation will not know it. This is relevant for how to enter the passphrase to unlock the LUKS blockdevice. See Tips_and_tricks#Manual configuration of core image for early boot.
- If you experience issues getting the prompt for a password to display (errors regarding cryptouuid, cryptodisk, or "device not found"), try reinstalling GRUB and appending
--modules="part_gpt part_msdos"to the end of yourgrub-installcommand.
Tip: You can use pacman hooks to automount your /boot when upgrades need to access related files.
LUKS2
Use grub-install as described in the #Installation section to create a bootable GRUB image with LUKS support. Note the following caveats:
- Initial LUKS2 support was added to GRUB 2.06, but with several limitations that are only partially addressed in GRUB 2.12rc1. See GRUB bug #55093.
- Since GRUB 2.12rc1,
grub-installcan create a core image to unlock LUKS2. However, it only supports PBKDF2, not Argon2. - Argon2id (cryptsetup default) and Argon2i PBKDFs are not supported (GRUB bug #59409), only PBKDF2 is.
Tip: You can use grub-improved-luks2-gitAUR that has been patched for LUKS2 as well as Argon2 support. Note the package's Argon2 support requires an UEFI system.[3]
Note: Before GRUB 2.12rc1, you had to manually create an EFI binary using grub-mkimage with a custom GRUB config file. For example, /boot/grub/grub-pre.cfg, with calls to cryptomount, insmod normal, and normal. This is no longer needed, grub-install is sufficient. However, you may have to run grub-mkconfig -o /boot/grub/grub.cfg at least once after upgrading from 2.06.
If you enter an invalid passphrase during boot and end up at the GRUB rescue shell, try cryptomount -a to mount all (hopefully only one) encrypted partitions or use cryptomount -u $crypto_uuid to mount a specific one. Then proceed with insmod normal and normal as usual.
If you enter a correct passphrase, but an Invalid passphrase error is immediately returned, make sure that the right cryptographic modules are specified. Use cryptsetup luksDump /dev/nvme0n1p2 and check whether the hash function (SHA-256, SHA-512) matches the modules (gcry_sha256, gcry_sha512) installed and the PBKDF algorithm is pbkdf2. The hash and PBDKDF algorithms can be changed for existing keys by using cryptsetup luksConvertKey --hash sha256 --pbkdf pbkdf2 /dev/nvme0n1p2. Under normal circumstances it should take a few seconds before the passphrase is processed.
Custom grub.cfg
- This article or section needs expansion.
- Reason: Add instructions on how to write a custom
/boot/grub/grub.cfg. See User:Eschwartz/Grub for a proposed draft. (Discuss in Talk:GRUB#Manually generate grub.cfg.
This section describes the manual creation of GRUB boot entries in /boot/grub/grub.cfg instead of relying on grub-mkconfig.
A basic GRUB config file uses the following options:
-
(hdX,Y)is the partition Y on disk X, partition numbers starting at 1, disk numbers starting at 0set default=Nis the default boot entry that is chosen after timeout for user actionset timeout=Mis the time M to wait in seconds for a user selection before default is bootedmenuentry "title" {entry options}is a boot entry titledtitleset root=(hdX,Y)sets the boot partition, where the kernel and GRUB modules are stored (boot need not be a separate partition, and may simply be a directory under the "root" partition (/)
LoaderDevicePartUUID
For GRUB to set the LoaderDevicePartUUID UEFI variable required by systemd-gpt-auto-generator(8) for GPT partition automounting, load the bli module in grub.cfg:
if [ "$grub_platform" = "efi" ]; then insmod bli fi
GRUB removal
UEFI systems
Before removing grub, make sure that some other boot loader is installed and configured to take over.
$ efibootmgr
BootOrder: 0003,0001,0000,0002 Boot0000* Windows Boot Manager HD(2,GPT,4dabbedf-191b-4432-bc09-8bcbd1d7dabf,0x109000,0x32000)/File(\EFI\Microsoft\Boot\bootmgfw.efi) Boot0001* GRUB HD(2,GPT,4dabbedf-191b-4432-bc09-8bcbd1d7dabf,0x109000,0x32000)/File(\EFI\GRUB\grubx64.efi) Boot0002* Linux-Firmware-Updater HD(2,GPT,5dabbedf-191b-4432-bc09-8bcbd1d7dabf,0x109000,0x32000)/File(\EFI\arch\fwupdx64.efi) Boot0003* Linux Boot Manager HD(2,GPT,4dabbedf-191b-4432-bc09-8bcbd1d7dabf,0x109000,0x32000)/File(\EFI\systemd\systemd-bootx64.efi)
If BootOrder has grub as the first entry, install another boot loader to put it in front, such as systemd-boot above. grub can then be removed using its bootnum.
# efibootmgr --delete-bootnum -b 1
Also delete the esp/EFI/grub and /boot/grub directories.
BIOS systems
To replace grub with any other BIOS boot loader, simply install them, which will overwrite the MBR boot code.
grub-install creates the /boot/grub directory that needs to be removed manually. Though some users will want to keep it, should they want to install grub again.
After migrating to UEFI/GPT one may want to remove the MBR boot code using dd.