this post was submitted on 07 Dec 2025
130 points (99.2% liked)
Linux
10508 readers
1344 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I use an encrypted rootfs without "an initramfs". Just requires some advanced fuckery.
A little known fun fact is that almost all kernels have a tiny stub-initram built into the kernel file. This is added when initram support is enabled, and is loaded before dedicated files are. It is however possible to supply your own initram directory or archive during kernel build to replace this built-in initram, so you can bake it in without leaving a separate file. No juggling with partitions, no boot options. Works just like a normal kernel "without initram", since even kernels without one usually do have that stub one anyway.
The downside is that a) you have to build the kernel, and b) the files to pack have to be available when the kernel is built, meaning you can't pack in modules of the kernel. But when building your own kernel anyway you can simply set the needed modules for encryption built-in and only pack the userspace cryptsetup executable needed for decryption, that way you get it all in a single kernel build, and the output is a single uniform kernel binary capable of decrypting your boot drive. No flags, no extra files, no access to the esp needed.
(I use gentoo with encrypted root btw.)
neat
Guys you have to see, it is amazing how much deep tech stuff you know, but dont forget you are a crazy niche within a niche and be nice to non-systems programmers XD