How to make suspend to RAM secure on Ubuntu with full disk encryption (LVM on top of LUKS)?

I've come across the same problem, so I took another shot at porting the same script, which you can see here. It doesn't touch any non-volatile storage after luksSuspend, so it works even with real full-disk encryption with an encrypted /boot. However, you'll need to be careful -- it might not work as expected occasionally!

The ported script does the following:

  • Create a ramfs mount somewhere
  • Extract the contents of initramfs there (including the initramfs suspend script)
  • Bind mount relevant directories (e.g. /sys, /proc, /dev, /run) to the ramfs mount
  • Stop any services that may interfere (systemd-udevd, systemd-journald)
  • Remount the root filesystem (ext4 or btrfs) with nobarrier so Linux doesn't hang while trying to go into S3, then sync
  • Chroot into the initramfs mount, which syncs again, runs luksSuspend, and puts the computer to sleep
  • After wake, luksResume, remount filesystems, restart services, unmount bind mounts in the initramfs mount
  • Finally, unmount the initramfs mount so that we free the RAM used for the initramfs files

I've yet to do extensive testing on my script, but it seems to work reliably for me. If you use another filesystem (i.e. not ext4 or btrfs), then you might experience issues with barrier, so you'll need to modify the script too.

Either way, it's good to test and verify that the scripts work first. If you experience hangs while attempting to put Linux into S3 (i.e. at echo mem > /sys/power/state), then you should be able to recover:

  • Before suspending, open a tty or other terminal (that will be accessible, so ideally a tty)
  • Load cryptsetup and relevant libraries into RAM: sudo cryptsetup luksResume anything_here
  • Suspend using the script
  • If it hangs after the chroot (e.g. after starting version xxx is displayed on the new vt), switch to the tty you opened earlier and run sudo cryptsetup luksResume your_luks_device_name_here
  • If that hangs too, open another vt and chroot into /run/initramfs: sudo chroot /run/initramfs /bin/ash
  • Try to run luksResume: cryptsetup luksResume your_luks_device_name_here && exit
  • Your computer should then suspend. You can then wake it up, kill the script(s) if they are still running, unmount the bind mounts and /run/initramfs, and remount your root filesystem with barrier if applicable.

I don't have experience with this setup, but many people claim success in this. Here are a couple of them.

dm-crypt with LUKS - Encrypting the Swap partition
Howto: Completly encrypted harddisk including the suspend to disk partition with Ubuntu 6.10 Edgy Eft
ubuntu-full-disk-encryption-lvm-luks

However none of them uses luksSuspend (which might be why they work).


I spent some time getting this fully functional on Ubuntu 15.10. If you are trying to make this work on ext2, ext3, or ext4 you will need to update /etc/fstab to mount the volume with the 'nobarrier' option. Otherwise, I suggest using BTRFS.

Once your filesystem is prepped, use the script here: https://github.com/Microcentillion/ubuntu-lukssuspend