


I don't know if in past this was needed, but in my system hibernate work without any patch to genkernelkhayyam wrote:I have some recollection of genkernel needing to be patched for hibernate, but I can't find the thread in question on a quick search ... or perhaps my memory is failing.
You are correct. It was probably me that you were recalling: https://forums.gentoo.org/viewtopic-t-1 ... bduct.html specifically my last post in the thread offers the solution and links to the data I found regaurding the issue.khayyam wrote:The_Great_Sephiroth ...
I have some recollection of genkernel needing to be patched for hibernate, but I can't find the thread in question on a quick search ... or perhaps my memory is failing.
best ... khay


Not if the root partition is encrypted as well.The_Great_Sephiroth wrote:I do not use LUKS nor do I use genkernel or an initramfs. I will try the PARTUUID next. Honestly, LUKS wouldn't stop me if I stole a laptop. I use System Rescue CD, change root password, and be in.


One of my laptops running Gentoo has an initramfs, the other does not. Both are able to suspend to RAM and both are able to hibernate. So it is possible to hibernate without an initramfs.The_Great_Sephiroth wrote:Either way, is it not possible to hibernate without an initramfs? I do not care to use one.
Four levels of password protection. Some of those are definitely passwords that unlock encryption, but some may not be (or may be implemented in a way that is not of the same quality as current generation software encryption).The_Great_Sephiroth wrote:Four levels of encryption?
I thought this thread was about hibernation, not sleep.The_Great_Sephiroth wrote:I have had a lack of sleep as of late
It should be possible, although it will be much less flexible than if an initramfs is available.The_Great_Sephiroth wrote:Either way, is it not possible to hibernate without an initramfs?

Code: Select all
GRUB_CMDLINE_LINUX_DEFAULT="resume=PARTUUID=3f819681-26e6-4f32-9796-a8625689fc8c"

Why is it much less flexible? Resuming from hibernation on my Clevo W230SS laptop without an initramfs is just as easy and fast as resuming from hibernation on my Compal NBLB2 laptop with an initramfs.Hu wrote:It should be possible, although it will be much less flexible than if an initramfs is available.The_Great_Sephiroth wrote:Either way, is it not possible to hibernate without an initramfs?

I wonder why your installation requires you to specify the resume partition as a PARTUUID specifically? On my Clevo W230SS laptop without an initramfs I just specify the swap partition device (/dev/sda2):The_Great_Sephiroth wrote:Here's what I modified in /etc/default/grub.That is the correct part uuid.Code: Select all
GRUB_CMDLINE_LINUX_DEFAULT="resume=PARTUUID=3f819681-26e6-4f32-9796-a8625689fc8c"
*UPDATE*
That did it! I will change the other laptops to part-uuid instead of normal uuid. We're golden now! Thanks for the help!
Code: Select all
clevow230ss /home/fitzcarraldo # mount /dev/sda1 /boot
clevow230ss /home/fitzcarraldo # grep resume= /boot/grub/grub.cfg
linux /vmlinuz-4.12.12-gentoo root=/dev/sda5 ro i915.modeset=1 rcutree.rcu_idle_gp_delay=1 acpi_enforce_resources=lax reboot=force raid=noautodetect resume=/dev/sda2
linux /vmlinuz-4.12.12-gentoo root=/dev/sda5 ro i915.modeset=1 rcutree.rcu_idle_gp_delay=1 acpi_enforce_resources=lax reboot=force raid=noautodetect resume=/dev/sda2
The kernel's resume code is fairly simplistic compared to what an initramfs can do and has far less opportunity for easy customization. As discussed up thread, the kernel alone cannot resume from certain types of encrypted swap, because the encryption device needs to be opened first, and there is no way to express that without some sort of userspace. More generally, you cannot resume from any swap device that will not be made fully available by the kernel's automatic discovery procedures.Fitzcarraldo wrote:Why is it much less flexible? Resuming from hibernation on my Clevo W230SS laptop without an initramfs is just as easy and fast as resuming from hibernation on my Compal NBLB2 laptop with an initramfs.Hu wrote:It should be possible, although it will be much less flexible than if an initramfs is available.

The_Great_Sephiroth ... the bios password won't prevent someone removing the disk, and reading data on that disk from another machine. That is the senario in which disk encyption might help. As for the bios, if you're skilled, and have the right tools, then de-soldering, and replacing/flashing the chip, isn't a huge undertaking ... I know someone who's designed boards/tools for this purpose, and can flash a variety of chips, including Apple.The_Great_Sephiroth wrote:We keep talking security, so I am curious. How possible is it to crack my BIOS password? Pulling the battery does not remove it. I am guessing the only way encryption would help me (and thus require an initramfs) is if my disk was physically removed from my laptop. Assuming it was soldered to the board like an Apple, would my BIOS password be enough since it cannot be removed?