Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.os.linux.slackware    |    I think its the one without Selinux crap    |    87,272 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 87,165 of 87,272    |
|    Henrik Carlqvist to Marco Moock    |
|    Re: encrypted root and initrd/GRUB    |
|    22 Sep 25 03:26:22    |
      From: Henrik.Carlqvist@deadspam.com              On Sun, 21 Sep 2025 16:16:34 +0200, Marco Moock wrote:       > Do I really need an initrd in the case /boot is just a regular ext4       > partition, so the kernel can be loaded without using LUKS?              From https://slackware.uk/slackware/slackware-15.0/README_CRYPT.TXT :              -8<--------------------------------        A big NOTE finally. When you encrypt your root filesystem, you will have       to make sure that there will be at least one (small) partition which is       left unencrypted. This partition must contain the kernel(s) you want to       boot from, and the initrd image that is needed with encrypted volumes.       You need to install LILO either to the MBR - or if that is not possible,       into the root sector of this small unencrypted partition. You will       probably guess why we cannot use an encrypted partition for this...       -8<--------------------------------              So yes, to encrypt your root file system it seems that you do need an       initrd. If you only were to encrypt something like the /home partition it       would have been enough to boot a huge kernel without any initrd.              regards Henrik              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca