Diskussion:Install-Party/Linux Mint Debian Edition: Unterschied zwischen den Versionen

Aus Wiki StuRa HTW Dresden
Zur Navigation springen Zur Suche springen
Zeile 525: Zeile 525:
: <code>sudo chmod 1777 /mnt/tmp</code>
: <code>sudo chmod 1777 /mnt/tmp</code>


<!--
cannot create 'rpool/ROOT': dataset already exists
cannot create 'bpool/BOOT': dataset already exists
cannot create 'rpool/ROOT/debian': dataset already exists
cannot mount 'rpool/ROOT/debian': filesystem already mounted
cannot create 'bpool/BOOT/debian': dataset already exists
mint@mint:~$ sudo zfs create -o canmount=off -o mountpoint=none rpool/ROOT
cannot create 'rpool/ROOT': dataset already exists
mint@mint:~$ mkdir /mnt/run
mkdir: cannot create directory ‘/mnt/run’: Permission denied
mint@mint:~$ sudo mkdir /mnt/run
mint@mint:~$ sudo mount -t tmpfs tmpfs /mnt/run
mint@mint:~$ mkdir /mnt/run/lock
mint@mint:~$ sudo debootstrap bookworm /mnt/
I: Target architecture can be executed
I: Retrieving InRelease
I: Checking Release signature
I: Valid Release signature (key id 4D64FEC119C2029067D6E791F8D2585B8783D481)
I: Retrieving Packages
I: Validating Packages
I: Resolving dependencies of required packages...
I: Resolving dependencies of base packages...
^CE: Interrupt caught ... exiting
mint@mint:~$ mint
mintbackup                  mint-iso-verify              mint-remove-application      mintupdate-cli
mintBackup                  mintlocale                  mintreport                  mintupdate-launcher
mint-drivers                mintlocale-im                mintreport-tray              mintupdate-tool
mintinstall                  mintmenu                    mintsources                  mintwelcome
mintinstall-fp-handler      mint-refresh-cache          mintstick                    mintwelcome-launcher
mintinstall-remove-app      mint-release-upgrade        mintupdate                  mint-xfce-delete
mintinstall-update-pkgcache  mint-release-upgrade-root    mintupdate-automation       
mint@mint:~$ mint
mintbackup                  mint-iso-verify              mint-remove-application      mintupdate-cli
mintBackup                  mintlocale                  mintreport                  mintupdate-launcher
mint-drivers                mintlocale-im                mintreport-tray              mintupdate-tool
mintinstall                  mintmenu                    mintsources                  mintwelcome
mintinstall-fp-handler      mint-refresh-cache          mintstick                    mintwelcome-launcher
mintinstall-remove-app      mint-release-upgrade        mintupdate                  mint-xfce-delete
mintinstall-update-pkgcache  mint-release-upgrade-root    mintupdate-automation       
mint@mint:~$ man mintinstall
No manual entry for mintinstall
mint@mint:~$ sudo ls /mnt/
boot  debootstrap  home  root  run  srv  tmp  usr  var
mint@mint:~$ sudo rm -rf /mnt/
rm: cannot remove '/mnt/srv': Device or resource busy
rm: cannot remove '/mnt/tmp': Device or resource busy
rm: cannot remove '/mnt/root': Device or resource busy
rm: cannot remove '/mnt/boot': Device or resource busy
rm: cannot remove '/mnt/var/log': Device or resource busy
rm: cannot remove '/mnt/var/tmp': Device or resource busy
rm: cannot remove '/mnt/var/www': Device or resource busy
rm: cannot remove '/mnt/var/snap': Device or resource busy
rm: cannot remove '/mnt/var/lib/NetworkManager': Device or resource busy
rm: cannot remove '/mnt/var/lib/AccountsService': Device or resource busy
rm: cannot remove '/mnt/var/lib/docker': Device or resource busy
rm: cannot remove '/mnt/var/lib/nfs': Device or resource busy
rm: cannot remove '/mnt/var/spool': Device or resource busy
rm: cannot remove '/mnt/var/cache': Device or resource busy
rm: cannot remove '/mnt/run': Device or resource busy
rm: cannot remove '/mnt/usr/local': Device or resource busy
rm: cannot remove '/mnt/home': Device or resource busy
-->
<!--
<!--
: <code></code>
: <code></code>

Version vom 29. Mai 2024, 03:04 Uhr

Installation mit Verschlüsselung

Fail!
LMDE 3 meets https://gitlab.com/pepa65/lmdescrypt/raw/master/lmdescrypt ?

(default) disk layout

Calamares meets Btrfs

(nach der manuellen Partitionierung und) Angabe beim Programm für die Installation

cat /etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system>             <mount point>  <type>  <options>  <dump>  <pass>
UUID=8f303b38-b7e7-4781-aa8e-f1559b5504d2 /boot          ext4    defaults,noatime 0 2
UUID=33436381-7031-48be-8785-a48061fcabd7 /              btrfs   subvol=@,defaults,noatime,space_cache,autodefrag 0 1
UUID=33436381-7031-48be-8785-a48061fcabd7 /home          btrfs   subvol=@home,defaults,noatime,space_cache,autodefrag 0 2
UUID=641494b3-d3a2-4c57-b022-cba4d00603f5 swap           swap    defaults,noatime 0 2
cat /etc/default/grub

GRUB_CMDLINE_LINUX_DEFAULT="quiet resume=UUID=641494b3-d3a2-4c57-b022-cba4d00603f5"

cat /etc/crypttab
# /etc/crypttab: mappings for encrypted partitions.
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/<name> paths for encrypted devices.
#
# See crypttab(5) for the supported syntax.
#
# NOTE: Do not list your root (/) partition here, it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies
#       to encrypted swap, which should be set up with mkinitcpio-openswap
#       for resume support.
#
# <name>               <device>                         <password> <options>

btrfs meets luks

cat /etc/fstab
####vb
/dev/sda1               /boot   btrfs   defaults,errors=remount-ro      0    1
/dev/mapper/vg-lv--swap none    swap    sw                              0    0
/dev/mapper/vg-lv--root /       btrfs   defaults,errors=remount-ro      0    1
/dev/mapper/vg-lv--home /home   btrfs   defaults,compress=lzo           0    1
####ve
# UNCONFIGURED FSTAB FOR BASE SYSTEM
proc    /proc   proc    defaults        0       0
cat /etc/crypttab
####vb
k-ot    UUID=8765dcba-ab12-cd34-ef56-123456abcdef       none    luks
####ve

https://www.howtoforge.com/a-beginners-guide-to-btrfs

cat /etc/default/grub

####vb
#GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash kopt=root=/dev/mapper/vg-lv--root"
####ve

sbin fehlt beim PATH

dpkg -i linux-UFRII-drv-v500-de/64-bit_Driver/Debian/cnrdrvcups-ufr2-uk_5.00-1_amd64.deb

Beachten Sie: PATH von root sollte normalerweise /usr/local/sbin, /usr/sbin und /sbin enthalten
export PATH=$PATH:/usr/local/sbin:/usr/sbin:/sbin

LMDE 4 mit verschlüsselten Massenspeicher und btrfs subvolumes (möglichst noch als mirror von 2 Geräten für Massenspeicher)

LMDE 6 "anderes Dateisystem"

Vorkenntnisse vor LMDE 6

website:members/PaulRiegel/os/lmde/installation-lmde-3-mit-verschluesslung

Untersuchung Installation LMDE 6

standardmäßige Installation mit Verschlüsselung ext4 LMDE 6
nach dem Neustart in die Installation
cat /etc/crypttab
# <target name>	<source device>		<key file>	<options>
lvmlmde   UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680   none   luks,discard,tries=3
cat /etc/fstab
#### Static Filesystem Table File
proc	/proc	proc	defaults	0	0
# /dev/mapper/lvmlmde-root
UUID=ba9df8e4-a4fb-42f6-b3ef-682d8c3edd95 /  ext4 defaults 0 1
# /dev/mapper/lvmlmde-swap
UUID=9e412642-d11a-40f2-9c59-03f9a51f5e28 none   swap sw 0 0
# /dev/sda2
UUID=22a7ba7f-0999-43d8-90f2-34c85af6f167 /boot  ext4 defaults 0 1
# /dev/sda1
UUID=C002-8E9D /boot/efi  vfat defaults 0 1
cat /etc/default/grub.d/61_live-installer.cfg
#! /bin/sh
set -e

GRUB_CMDLINE_LINUX="cryptdevice=UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680:lvmlmde root=/dev/mapper/lvmlmde-root resume=/dev/mapper/lvmlmde-swap"
standardmäßige Installation ohne Verschlüsselung btrfs LMDE 6
während der Installation
mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=3743316k,nr_inodes=935829,mode=755,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64)
/dev/sdb1 on /run/live/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8)
/dev/loop0 on /run/live/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue)
tmpfs on /run/live/overlay type tmpfs (rw,noatime,mode=755,inode64)
overlay on / type overlay (rw,noatime,lowerdir=/run/live/rootfs/filesystem.squashfs/,upperdir=/run/live/overlay/rw,workdir=/run/live/overlay/work,redirect_dir=on)
tmpfs on /usr/lib/live/mount type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64)
/dev/sdb1 on /usr/lib/live/mount/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8)
/dev/loop0 on /usr/lib/live/mount/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue)
tmpfs on /usr/lib/live/mount/overlay type tmpfs (rw,noatime,mode=755,inode64)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=29,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=12771)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime,inode64)
ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=757356k,nr_inodes=189339,mode=700,uid=1000,gid=1000,inode64)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
portal on /run/user/1000/doc type fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/loop0 on /source type squashfs (ro,relatime,errors=continue)
/dev/sda3 on /target type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=256,subvol=/@)
/dev/sda3 on /target/home type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=257,subvol=/@home)
/dev/sda2 on /target/boot type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=5,subvol=/)
nach dem Neustart in die Installation
cat /etc/crypttab
# <target name>	<source device>		<key file>	<options>
cat /etc/fstab
#### Static Filesystem Table File
proc	/proc	proc	defaults	0	0
# /dev/sda3
UUID=b84bec73-29b9-4e62-a830-5069650680af	/	btrfs	defaults,subvol=@	00
UUID=b84bec73-29b9-4e62-a830-5069650680af	/home	btrfs	defaults,subvol=@home	0	0
# /dev/sda2
UUID=dea84151-1736-439a-8127-a45f2a7feb75	/boot	btrfs	defaults	0	0
# /dev/sda1
UUID=FDD2-C26F	/boot/efi	vfat	defaults	0	1
cat /etc/default/grub.d/61_live-installer.cfg

Erarbeitung Verschlüsslung und btrfs

https://forums.linuxmint.com/viewtopic.php?t=100659

meets

https://linuxmint.com/rel_faye.php

sudo live-installer-expert-mode

/target ist die das gewünschte Ziel! Alles Nachfolgende wird aber noch mit /mnt/target angegeben.

sudo mkdir /mnt/target
sudo mount -o subvol=@ /dev/mapper/lvmlmde-root /mnt/target
sudo mkdir /mnt/target/home
sudo mount -o subvol=home /dev/mapper/lvmlmde-root /mnt/target/home
sudo rsync -avz /run/live/medium/casper/filesystem.squashfs/ /mnt/target/

/dev/loop0

sudo mkdir /mnt/target/dev
sudo mount --bind /dev /mnt/target/dev
sudo mkdir /dev/pts /mnt/target/dev/pts
sudo mount --bind /dev/pts /mnt/target/dev/pts
sudo mkdir /mnt/target/dev/shm
sudo mount --bind /dev/shm /mnt/target/dev/shm
sudo mkdir /mnt/target/proc
sudo mount --bind /proc /mnt/target/proc
sudo mkdir /mnt/target/sys
sudo mount --bind /sys /mnt/target/sys
sudo mkdir /mnt/target/tmp
sudo mount --bind /tmp /mnt/target/tmp
sudo mkdir /mnt/target/
cp -f /etc/resolv.conf /mnt/target/etc/resolv.conf
chroot /mnt/target

Installation Debian

und dann Wechsel zu LMDE

https://forums.linuxmint.com/viewtopic.php?t=404823

(bevorzugte) Verwendung von zram aktivieren

Bei einer standardmäßigen Installation (ohne Verschlüsselung) mit btrfs wird anscheinend keine Partition (und keine Datei) für SWAP erstellt. (Gut! Stattdessen kann - zeitgemäßer - zram verwendet werden.)

apt install zram-tools
systemctl status zramswap.service
systemctl is-enabled zramswap.service
enabled
systemctl is-active zramswap.service
active

LMDE 6 meets ZFS

in der Verwaltung vom Gerät wikipedia:de:Unified Extensible Firmware Interface#Secure Boot deaktivieren

wegen der nachträglichen Installation ist der Schlüssel für das Modul für den Kernel für ZFS nicht valide, weswegen das Modul nicht benutzt werden kann
sudo modprobe zfs
modprobe: ERROR: could not insert 'zfs': Key was rejected by service

mit dem Internet verbinden


whoami
mint
uname -a
Linux mint 6.1.0-12-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.52-1 (2023-09-07) x86_64 GNU/Linux
apt update
sudo apt -y install ssh
sudo systemctl status ssh

Ersetzen vom nicht gesetzen Passwort

passwd
ip a

ssh mint@321.321.321.321

sudo nano /etc/apt/sources.list
#/etc/apt/sources.list
deb http://deb.debian.org/debian bookworm main contrib non-free-firmware
apt update
gsettings set org.gnome.desktop.media-handling automount false
apt -y install debootstrap gdisk zfsutils-linux
ls -la /dev/disk/by-id/
total 0
lrwxrwxrwx 1 root root   9 May 28 23:25 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R -> ../../sda
lrwxrwxrwx 1 root root   9 May 28 23:25 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M -> ../../sdb
lrwxrwxrwx 1 root root   9 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0 -> ../../sdc
lrwxrwxrwx 1 root root  10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part1 -> ../../sdc1
lrwxrwxrwx 1 root root  10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part2 -> ../../sdc2
lrwxrwxrwx 1 root root   9 May 28 23:25 wwn-0x5002538d41306eb7 -> ../../sdb
lrwxrwxrwx 1 root root   9 May 28 23:25 wwn-0x5002538d702e43f9 -> ../../sda


DISK1=/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R
DISK2=/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M
swapoff -a
cat /proc/mdstat

Personalities : 
unused devices: <none>


sudo wipefs -a $DISK1
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: calling ioctl to re-read partition table: Success
sudo wipefs -a $DISK2
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: calling ioctl to re-read partition table: Success
sudo blkdiscard -f $DISK1
blkdiscard: Operation forced, data will be lost!
sudo blkdiscard -f $DISK2
blkdiscard: Operation forced, data will be lost!
sudo sgdisk --zap-all $DISK1
Creating new GPT entries in memory.
GPT data structures destroyed! You may now partition the disk using fdisk or
other utilities.
sudo sgdisk --zap-all $DISK2
Creating new GPT entries in memory.
GPT data structures destroyed! You may now partition the disk using fdisk or
other utilities.
sudo sgdisk -n2:1M:+512M -t2:EF00 $DISK1
Creating new GPT entries in memory.
The operation has completed successfully.
sudo sgdisk -n2:1M:+512M -t2:EF00 $DISK2
Creating new GPT entries in memory.
The operation has completed successfully.
sudo sgdisk -n3:0:+1G -t3:BF01 $DISK1
The operation has completed successfully.
sudo sgdisk -n3:0:+1G -t3:BF01 $DISK2
The operation has completed successfully.
sudo sgdisk -n4:0:0 -t4:BF00 $DISK1
The operation has completed successfully.
sudo sgdisk -n4:0:0 -t4:BF00 $DISK2
The operation has completed successfully.
sudo zpool create \
    -o compatibility=grub2 \
    -o ashift=12 \
    -o autotrim=on \
    -o cachefile=/etc/zfs/zpool.cache \
    -O devices=off \
    -O acltype=posixacl\
    -O xattr=sa \
    -O compression=lz4 \
    -O normalization=formD \
    -O relatime=on \
    -O canmount=off \
    -O mountpoint=/boot -R /mnt \
    bpool mirror \
    ${DISK1}-part3 \
    ${DISK2}-part3

zpool create \
    -O keylocation=prompt \
    -O keyformat=passphrase \
    -o ashift=12 \
    -o autotrim=on \
    -O encryption=on \
    -O acltype=posixacl \
    -O xattr=sa \
    -O dnodesize=auto \
    -O compression=lz4 \
    -O normalization=formD \
    -O relatime=on \
    -O canmount=off \
    -O mountpoint=/ -R /mnt \
    rpool mirror \
    ${DISK1}-part4 \
    ${DISK2}-part4

sudo zfs create -o canmount=off -o mountpoint=none rpool/ROOT
sudo zfs create -o canmount=off -o mountpoint=none bpool/BOOT
sudo zfs create -o canmount=noauto -o mountpoint=/ rpool/ROOT/debian
sudo zfs mount rpool/ROOT/debian
sudo zfs create -o mountpoint=/boot bpool/BOOT/debian
sudo zfs create rpool/home
sudo zfs create -o mountpoint=/root rpool/home/root
sudo chmod 700 /mnt/root
sudo zfs create -o canmount=off rpool/var
sudo zfs create -o canmount=off rpool/var/lib
sudo zfs create rpool/var/log
sudo zfs create rpool/var/spool
sudo zfs create -o com.sun:auto-snapshot=false rpool/var/cache
sudo zfs create -o com.sun:auto-snapshot=false rpool/var/lib/nfs
sudo zfs create -o com.sun:auto-snapshot=false rpool/var/tmp
sudo chmod 1777 /mnt/var/tmp
sudo zfs create rpool/srv
sudo zfs create -o canmount=off rpool/usr
sudo zfs create rpool/usr/local
sudo zfs create rpool/var/lib/AccountsService
sudo zfs create rpool/var/lib/NetworkManager
sudo zfs create -o com.sun:auto-snapshot=false rpool/var/lib/docker
sudo zfs create rpool/var/snap
sudo zfs create rpool/var/www
sudo zfs create -o com.sun:auto-snapshot=false rpool/tmp
sudo chmod 1777 /mnt/tmp