Fix setup on Secure Boot systems where cryptodisk is in use
authorHervé Werner <dud225@hotmail.com>
Mon, 28 Jan 2019 16:24:23 +0000 (17:24 +0100)
committerFelix Zielcke <fzielcke@z-51.de>
Thu, 3 Jul 2025 16:35:51 +0000 (18:35 +0200)
commitec328060e96cd96132c73f3eab82f6dd306e7620
tree2950b482f1cca4f15e4c2bee595fcd2a4bef34ec
parent4f6b91bfe01e2e19d7a6fa80b99b6ff973c6b928
Fix setup on Secure Boot systems where cryptodisk is in use

On full-encrypted systems, including /boot, the current code omits
cryptodisk commands needed to open the drives if Secure Boot is enabled.
This prevents grub2 from reading any further configuration residing on
the encrypted disk.
This patch fixes this issue by adding the needed "cryptomount" commands in
the load.cfg file that is then copied in the EFI partition.

Bug-Debian: https://bugs.debian.org/917117
Last-Update: 2019-02-10

Patch-Name: uefi-secure-boot-cryptomount.patch

Gbp-Pq: Name uefi-secure-boot-cryptomount.patch
util/grub-install.c