One foot planted in “Yeehaw!” the other in “yuppie”.

  • 0 Posts
  • 3 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle


  • Don’t know why the other poster is giving you such grief there. It’s important to note that when you encrypt your root partition that you can’t view it from refind. It doesn’t have a mechanism to decrypt the contents it finds.

    The way to address this is to ensure that you’re using a Unified Kernel Image. Essentially, a full image of your Linux boot image that lives on your EFI partition. Keep in mind it can’t get to your personal data until it decrypts your root disk, but at least you can get things booting.

    So, you should take the time to switch to a UKI boot process.

    I recommend disabling secure Boot and encryption first and Getting the UKI Boot working through refind. Then add secure boot using sbctl. Then re-encrypt your discs. Since secure boot is all set up at this point, you should be able to back your decryption with your systems TPM chip.

    Here’s the page on unified kernel images.

    https://wiki.archlinux.org/title/Unified_kernel_image