Fix setup on Secure Boot systems where cryptodisk is in use
authorHervé Werner <dud225@hotmail.com>
Mon, 28 Jan 2019 16:24:23 +0000 (17:24 +0100)
committerFelix Zielcke <fzielcke@z-51.de>
Mon, 15 Jul 2024 15:05:20 +0000 (17:05 +0200)
commit287d0d3abc094f40a595a1d0107b90cc301cfd1a
tree0a91ad6c97a79de798a062b0c1d388b6127c688d
parente2e6448f69343a23b3d636340f1ec78cedf9b5ac
Fix setup on Secure Boot systems where cryptodisk is in use

On full-encrypted systems, including /boot, the current code omits
cryptodisk commands needed to open the drives if Secure Boot is enabled.
This prevents grub2 from reading any further configuration residing on
the encrypted disk.
This patch fixes this issue by adding the needed "cryptomount" commands in
the load.cfg file that is then copied in the EFI partition.

Bug-Debian: https://bugs.debian.org/917117
Last-Update: 2019-02-10

Patch-Name: uefi-secure-boot-cryptomount.patch

Gbp-Pq: Name uefi-secure-boot-cryptomount.patch
util/grub-install.c