Bug 598602
Summary: | Dracut does not honor rd_LUKS_UUID= for encrypted partition containing swap -- resume after hibernation fails | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Veit Wahlich <cru> |
Component: | dracut | Assignee: | Harald Hoyer <harald> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 13 | CC: | harald, jan.kratochvil, jonathan |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-09-22 12:31:35 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Veit Wahlich
2010-06-01 17:27:07 UTC
I believe a related problem is that swap never gets LUKS-opened after regular boot. This problem was present even in pre-dracut mkinitrd. I always have to do cryptsetup luksOpen + swapon after new boot. Confirming hibernate also does not resume for me. does it work, if you add resume=/dev/... or resume=UUID=.. to the kernel command line? Hi Harald, thanks for your suggestions, it helped. The following worked well for me: resume=/dev/mapper/luks-$UUID These both did NOT work: resume=UUID=luks-$UUID resume=UUID=$UUID Using the latter, the device gets also unlocked by the initrd/initramfs, but does not resume. After a while "Could not open root filesystem" or similar appeared and system remains in sleep loop. I think, anaconda should at least add resume= to the kernel command line if the problem cannot be fixed otherways. Best regards, // Veit (In reply to comment #3) > Hi Harald, > > thanks for your suggestions, it helped. > > The following worked well for me: > resume=/dev/mapper/luks-$UUID > luks-UUID != filesystem-UUID $ udevadm info --query=all --name=/dev/mapper/luks-d1b7e28f-bbdf-4e27-a51f-e61c0b56bbc6 ... E: DM_UUID=CRYPT-LUKS1-d1b7e28fbbdf4e27a51fe61c0b56bbc6-luks-d1b7e28f-bbdf-4e27-a51f-e61c0b56bbc6 E: ID_FS_UUID=0a2bd0df-fb5f-4f00-ae87-3ae6287f9ad5 So, here UUID is 0a2bd0df-fb5f-4f00-ae87-3ae6287f9ad5 and not d1b7e28f-bbdf-4e27-a51f-e61c0b56bbc6 |