[Bug 1844153] Re: Manual root and boot encrypted LUKS non-lvm partition on EFI unable to boot

2019-09-23 Thread Ruslan Gainutdinov
Here is how I made a workaround for it. I added an additional entry to EFI boot manager which does it properly. Additionally as /EFI/ubuntu/grubx64.efi does not contain required drivers I fix it by creating custom grubx64.efi with memdisk and grub.cfg mapped onto it. Here is the script to add

[Bug 1844153] Re: Manual root and boot encrypted LUKS non-lvm partition on EFI unable to boot

2019-09-16 Thread Ruslan Gainutdinov
apport information ** Tags added: apport-collected bionic ** Description changed: Hello! I followed cryptsetup manual to setup LUKS encrypted root partition https://cryptsetup-team.pages.debian.net/cryptsetup/encrypted-boot.html - EFI bios - EFI partition 700Mb - LUKS

[Bug 1844153] Re: Manual root and boot encrypted LUKS non-lvm partition on EFI unable to boot

2019-09-16 Thread Ruslan Gainutdinov
My hypothesis on this is that grub boot stage UUID detection mechanism are not able to read UUID for crypto_LUKS partition. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844153 Title: Manual root

[Bug 1844153] Re: Manual root and boot encrypted LUKS non-lvm partition on EFI unable to boot

2019-09-16 Thread Ruslan Gainutdinov
I was able to completely reproduce it using VirtualBox environment by installing Ubuntu from scratch with encryption enabled and then adding the second disk and enabling encryption on it manually. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed