summaryrefslogtreecommitdiffstats
path: root/man/cryptsetup-resize.8.adoc
blob: 4cff4826ed12a42a8946a3d53af02f771c304bf8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
= cryptsetup-resize(8)
:doctype: manpage
:manmanual: Maintenance Commands
:mansource: cryptsetup {release-version}
:man-linkstyle: pass:[blue R < >]
:COMMON_OPTIONS:
:ACTION_RESIZE:

== Name

cryptsetup-resize - resize an active mapping

== SYNOPSIS

*cryptsetup _resize_ [<options>] <name>*

== DESCRIPTION

Resizes an active mapping <name>.

If --size (in 512-bytes sectors) or --device-size are not specified, the
size is computed from the underlying device. For LUKS it is the size of
the underlying device without the area reserved for LUKS header (see
data payload offset in *luksDump* command). For plain crypt device, the
whole device size is used.

Note that this does not change the raw device geometry, it just changes
how many sectors of the raw device are represented in the mapped device.

If cryptsetup detected volume key for active device loaded in kernel
keyring service, resize action would first try to retrieve the key using
a token. Only if it failed, it'd ask for a passphrase to unlock a
keyslot (LUKS) or to derive a volume key again (plain mode). The kernel
keyring is used by default for LUKS2 devices.

*<options>* can be [--size, --device-size, --token-id, --token-only,
--token-type, --key-slot, --key-file, --keyfile-size, --keyfile-offset,
--timeout, --disable-external-tokens, --disable-locks, --disable-keyring,
--verify-passphrase, --timeout].

include::man/common_options.adoc[]
include::man/common_footer.adoc[]