Jump to content

Search the Community

Showing results for tags 'initramfs'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Funtoo Discussion Forums
    • News and Announcements
    • General Discussion
    • Dev Central
    • Funtoo Hosting
    • Funtoo Infrastructure
  • Help Central
    • General Help
    • Installation Help
    • Portage Help
    • Desktop Help
    • Server Help
  • Funtoo Services

Blogs

  • drobbins' Blog
  • It's a Bear's life
  • haxmeister's Blog
  • psychopatch's Blog
  • 666threesixes666's Blog
  • decision theory
  • Chris Kurlinski's Blog
  • Sandro's Blog
  • danielv's Blog
  • Not So Stupid Admin Tricks
  • maldoror's Blog
  • andreawilson's Blog
  • Simple Step-by-Step Server Setup
  • saraedward's Blog
  • eusanpe
  • Funtoo Perl Hackers's Perl on Funtoo

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


freenode


github


web


First Name


Last Name


Location


Interests

Found 3 results

  1. Hello, I have a crypted /home (/dev/mapper/lvm-home) inside lvm, and a keyfile on /boot (/dev/sda1): /boot/keyfile Why: On normal days, it boot automatically, but on vacations/trips I delet the /boot/keyfile and people can't access. On ArchLinux it worked with: [ /etc/default/grub ] GRUB_CMDLINE_LINUX="cryptdevice=/dev/mapper/lvm-home:home cryptkey=/dev/sda1:ext4:/.boot root=/dev/mapper/lvm-funtoo dolvm rootfstype=ext4" and before: grub-mkconfig -o /boot/grub/grub.cfg On Funtoo I tried the same and: [ /etc/crypttab ] home UUID=44ae1749-28d7-4f35-9948-e02b747213cf /dev/disk/by-uuid/013e1dc7-cb3f-4a90-8b4e-251179adcbe5:/keyfile luks,initramfs [ /etc/conf.d/dmcrypt ] target=home source=UUID=44ae1749-28d7-4f35-9948-e02b747213cf key=/dev/disk/by-uuid/013e1dc7-cb3f-4a90-8b4e-251179adcbe5:/keyfile With "genkernel --lvm --luks initramfs" after all. [ /boot/grub/grub.cfg ] linux /kernel-debian-sources-x86_64-5.10.40_p1 root=/dev/mapper/lvm-funtoo ro cryptdevice=/dev/mapper/lvm-home:home cryptkey=/dev/sda1:ext4:/keyfile root=/dev/mapper/lvm-funtoo dolvm rootfstype=ext4 loglevel=7 echo 'Loading initial ramdisk ...' initrd /early_ucode.cpio /initramfs-genkernel-x86_64-5.10.40_p1-debian-sources [ /etc/fstab ] /dev/mapper/lvm-funtoo / ext4 defaults 0 1 /dev/sda1 /boot ext4 defaults 0 0 /dev/mapper/home /home ext4 defaults 0 0 /home/.swap none swap sw 0 0
  2. Hello, everyone! I have an issue that I haven't been able to resolve yet. Funtoo is running on my system, but I would like to modify the parameters at boot so the boot screen was running in 1920x1080 mode. I believe it is in 1024x768 mode currently, as shown by the "videoinfo" command that I run at the Grub command-line stage. I've modified the /etc/boot file to have a "params += GRUB_GFXMODE=1920x1080-24,auto GRUB_GFXPAYLOAD_LINUX=keep" (along with the root info, of course), but this does not seem to work after I 'ego boot update'. I also modified the file at '/etc/default/grub' to reflect these values (with the (x)x(y)-(b) format which a GTX 970 apparently needs), to no avail. Does 'ego boot update' also process 'grub-mkconfig -o /boot/grub/grub.cfg' when it runs? This seems like a simple matter to resolve, but I've tried many suggestions over the past week, and nothing seems to be working. Thank you for any suggestions!
  3. Hello, I have an encrypted LUKS root filesystem on one harddisk that I "open" with a passphrase at startup. The initrd.script of genkernel package provide the methods for decrypting. But if I understand the script(s) correct this will work only for encrypted root and swap devices. Normally I have my home directory on an additional raid10 setup which should be encrypted too. There is a comment at the top of the script which says that I need cryptsetup-luks for decrypting additional encrypted devices but this package does not exist anymore. Does someone is using a similar setup? Where would be the best place to add a hook for opening an additional LUKS container? For testing I added already some code to initrd.script and I was able to enter a passphrase to open the additional LUKS container but then the init script was not able to mount / to /newroot. Any ideas? Matthias
×
×
  • Create New...