Actually hibernation works ok with encrypted swap with static encryption keys like luks-password or password-file given in boot time.
But it does not work when the encryption key is initialized from /dev/random or /dev/urandom at the boot time.
Here is the difference in the /etc/crypttab:
Works:
decSWAP /dev/mapper/VGRAID-encSWAP
Does not work:
decSWAP /dev/mapper/VGRAID-encSWAP /dev/random swap,cipher=aes-cbc-essiv:sha256
It does not matter where the swap is located if it is readable and accesible at the boot time after the system has the correct encryption key.
So please check if the encrypted swap is initialized from the /dev/random or /dev/urandom. Currently this patch breaks "hibernate" from the X as I can just click the "hibernate"-button because it does not exist in gnome therefore I have to type in "pm-hibernate" in the console.
Actually hibernation works ok with encrypted swap with static encryption keys like luks-password or password-file given in boot time.
But it does not work when the encryption key is initialized from /dev/random or /dev/urandom at the boot time.
Here is the difference in the /etc/crypttab:
Works: VGRAID- encSWAP
decSWAP /dev/mapper/
Does not work: VGRAID- encSWAP /dev/random swap,cipher= aes-cbc- essiv:sha256
decSWAP /dev/mapper/
It does not matter where the swap is located if it is readable and accesible at the boot time after the system has the correct encryption key.
So please check if the encrypted swap is initialized from the /dev/random or /dev/urandom. Currently this patch breaks "hibernate" from the X as I can just click the "hibernate"-button because it does not exist in gnome therefore I have to type in "pm-hibernate" in the console.