> Why unencrypted? The root fs is encrypted as well, and for the root fs
> I am entering the key manually.
Ah, I see. Well, this particular use case is not implemented then (and
nowhere documented AFAIS) and tricky to implement. You would need to
1. first mount the root filesystem
2. get the key
3. unlock the swap device,
4. check if the system could resume.
4a. if yes, unmount root again and resume.
4b. if not, continue with regular boot.
I'm not sure if step 4 is possible at all with currently available
means. Feel free to submit a patch for that, though.
Nikolaus Rath <email address hidden> writes:
> Why unencrypted? The root fs is encrypted as well, and for the root fs
> I am entering the key manually.
Ah, I see. Well, this particular use case is not implemented then (and
nowhere documented AFAIS) and tricky to implement. You would need to
1. first mount the root filesystem
2. get the key
3. unlock the swap device,
4. check if the system could resume.
4a. if yes, unmount root again and resume.
4b. if not, continue with regular boot.
I'm not sure if step 4 is possible at all with currently available
means. Feel free to submit a patch for that, though.
--
Gruesse/greetings,
Reinhard Tartler, KeyID 945348A4