By now (definitely xenial and above), this functionality has been
implemented via the cryptsetup package. It will take care of unlocking
resume devices so that one can simply use "resume=/dev/mapper/foo" for
the parameter.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/91867

Title:
  [PATCH] allow resume from LUKS encrypted swap partition

Status in initramfs-tools package in Ubuntu:
  Incomplete

Bug description:
  Binary package hint: initramfs-tools

  The attached patch allows to suspend and resume to a LUKS encrypted
  swap partition. This means that all data (including passwords) that
  would otherwise be written to disk in plain text will be encrypted.

  To make use of the patch, you must 
  * create a  LUKS encrypted partition
  * activate the device with cryptsetup luksOpen
  * run mkswap on it and enter it in fstab as swap
  * change your kernel's resume=* line to 
  resume=LUKS=/name/of/harddiskpartition:devicemapper name (actual process 
depends on the bootloader used)
  For example resume=LUKS=/dev/hda3:cryptswap
  * then run update-initramfs to build a new initramfs.

  You will then be asked to provide the password for the swap partition
  upon boot and the script will try to resume from it. If it can't find
  swsuspend signatures, boot will continue. The script will also
  automatically setup correct suspend device for swsuspend.

  I have extensively tested this on Feisty.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/91867/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to