Diskussion:Install-Party/Linux Mint Debian Edition: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Zeile 276: | Zeile 276: | ||
== LMDE 6 meets ZFS == | == LMDE 6 meets ZFS == | ||
in der Verwaltung vom Gerät [[wikipedia:de:Unified Extensible Firmware Interface#Secure Boot]] deaktivieren | |||
: wegen der nachträglichen Installation ist der Schlüssel für das Modul für den Kernel für ZFS nicht valide, weswegen das Modul nicht benutzt werden kann | |||
: <code>sudo modprobe zfs</code> | |||
<pre> | |||
modprobe: ERROR: could not insert 'zfs': Key was rejected by service | |||
</pre> | |||
---- | |||
mit dem Internet verbinden | mit dem Internet verbinden | ||
---- | |||
: <code>whoami</code> | : <code>whoami</code> | ||
Zeile 348: | Zeile 359: | ||
lrwxrwxrwx 1 root root 9 May 28 23:25 wwn-0x5002538d702e43f9 -> ../../sda | lrwxrwxrwx 1 root root 9 May 28 23:25 wwn-0x5002538d702e43f9 -> ../../sda | ||
</pre> | </pre> | ||
: <code>DISK1=/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R</code> | |||
: <code>DISK2=/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M</code> | |||
: <code>swapoff -a</code> | |||
: <code>cat /proc/mdstat | |||
</code> | |||
<pre> | |||
Personalities : | |||
unused devices: <none> | |||
</pre> | |||
: <code>sudo wipefs -a $DISK1</code> | |||
<pre> | |||
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54 | |||
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54 | |||
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa | |||
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: calling ioctl to re-read partition table: Success | |||
</pre> | |||
: <code>sudo wipefs -a $DISK2</code> | |||
<pre> | |||
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54 | |||
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54 | |||
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa | |||
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: calling ioctl to re-read partition table: Success | |||
</pre> | |||
<!-- | |||
sudo blkdiscard -f $DISK1 | |||
blkdiscard: Operation forced, data will be lost! | |||
mint@mint:~$ sudo blkdiscard -f $DISK2 | |||
blkdiscard: Operation forced, data will be lost! | |||
sudo sgdisk --zap-all $DISK1 | |||
Creating new GPT entries in memory. | |||
GPT data structures destroyed! You may now partition the disk using fdisk or | |||
other utilities. | |||
mint@mint:~$ sudo sgdisk --zap-all $DISK2 | |||
Creating new GPT entries in memory. | |||
GPT data structures destroyed! You may now partition the disk using fdisk or | |||
other utilities. | |||
sudo sgdisk -n2:1M:+512M -t2:EF00 $DISK1 | |||
Creating new GPT entries in memory. | |||
The operation has completed successfully. | |||
mint@mint:~$ sudo sgdisk -n2:1M:+512M -t2:EF00 $DISK2 | |||
Creating new GPT entries in memory. | |||
The operation has completed successfully. | |||
sudo sgdisk -n3:0:+1G -t3:BF01 $DISK1 | |||
The operation has completed successfully. | |||
mint@mint:~$ sudo sgdisk -n3:0:+1G -t3:BF01 $DISK2 | |||
The operation has completed successfully. | |||
sudo sgdisk -n4:0:0 -t4:BF00 $DISK1 | |||
The operation has completed successfully. | |||
mint@mint:~$ sudo sgdisk -n4:0:0 -t4:BF00 $DISK2 | |||
The operation has completed successfully. | |||
sudo zpool create \ | |||
-o compatibility=grub2 \ | |||
-o ashift=12 \ | |||
-o autotrim=on \ | |||
-o cachefile=/etc/zfs/zpool.cache \ | |||
-O devices=off \ | |||
-O acltype=posixacl\ | |||
-O xattr=sa \ | |||
-O compression=lz4 \ | |||
-O normalization=formD \ | |||
-O relatime=on \ | |||
-O canmount=off \ | |||
-O mountpoint=/boot -R /mnt \ | |||
bpool \ | |||
${DISK1}-part3 \ | |||
${DISK2}-part3 | |||
--> | |||
: <code></code> | : <code></code> | ||
Zeile 353: | Zeile 448: | ||
</pre> | </pre> | ||
: <code></code> | |||
<pre> | |||
</pre> | |||
: <code></code> | |||
<pre> | |||
</pre> | |||
: <code></code> | : <code></code> | ||
Zeile 359: | Zeile 460: | ||
</pre> | </pre> | ||
: <code></code> | |||
<pre> | |||
</pre> | |||
: <code></code> | : <code></code> | ||
<pre> | <pre> | ||
</pre> | </pre> |
Version vom 29. Mai 2024, 01:49 Uhr
Installation mit Verschlüsselung
- Fail!
- LMDE 3 meets https://gitlab.com/pepa65/lmdescrypt/raw/master/lmdescrypt ?
(default) disk layout
- Calamares meets Btrfs
(nach der manuellen Partitionierung und) Angabe beim Programm für die Installation
cat /etc/fstab
# /etc/fstab: static file system information. # # Use 'blkid' to print the universally unique identifier for a device; this may # be used with UUID= as a more robust way to name devices that works even if # disks are added and removed. See fstab(5). # # <file system> <mount point> <type> <options> <dump> <pass> UUID=8f303b38-b7e7-4781-aa8e-f1559b5504d2 /boot ext4 defaults,noatime 0 2 UUID=33436381-7031-48be-8785-a48061fcabd7 / btrfs subvol=@,defaults,noatime,space_cache,autodefrag 0 1 UUID=33436381-7031-48be-8785-a48061fcabd7 /home btrfs subvol=@home,defaults,noatime,space_cache,autodefrag 0 2 UUID=641494b3-d3a2-4c57-b022-cba4d00603f5 swap swap defaults,noatime 0 2
cat /etc/default/grub
GRUB_CMDLINE_LINUX_DEFAULT="quiet resume=UUID=641494b3-d3a2-4c57-b022-cba4d00603f5"
cat /etc/crypttab
# /etc/crypttab: mappings for encrypted partitions. # # Each mapped device will be created in /dev/mapper, so your /etc/fstab # should use the /dev/mapper/<name> paths for encrypted devices. # # See crypttab(5) for the supported syntax. # # NOTE: Do not list your root (/) partition here, it must be set up # beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies # to encrypted swap, which should be set up with mkinitcpio-openswap # for resume support. # # <name> <device> <password> <options>
btrfs meets luks
cat /etc/fstab
####vb /dev/sda1 /boot btrfs defaults,errors=remount-ro 0 1 /dev/mapper/vg-lv--swap none swap sw 0 0 /dev/mapper/vg-lv--root / btrfs defaults,errors=remount-ro 0 1 /dev/mapper/vg-lv--home /home btrfs defaults,compress=lzo 0 1 ####ve # UNCONFIGURED FSTAB FOR BASE SYSTEM proc /proc proc defaults 0 0
cat /etc/crypttab
####vb k-ot UUID=8765dcba-ab12-cd34-ef56-123456abcdef none luks ####ve
https://www.howtoforge.com/a-beginners-guide-to-btrfs
cat /etc/default/grub
####vb #GRUB_CMDLINE_LINUX_DEFAULT="quiet splash" GRUB_CMDLINE_LINUX_DEFAULT="quiet splash kopt=root=/dev/mapper/vg-lv--root" ####ve
sbin fehlt beim PATH
dpkg -i linux-UFRII-drv-v500-de/64-bit_Driver/Debian/cnrdrvcups-ufr2-uk_5.00-1_amd64.deb
Beachten Sie: PATH von root sollte normalerweise /usr/local/sbin, /usr/sbin und /sbin enthalten
export PATH=$PATH:/usr/local/sbin:/usr/sbin:/sbin
LMDE 4 mit verschlüsselten Massenspeicher und btrfs subvolumes (möglichst noch als mirror von 2 Geräten für Massenspeicher)
- https://www.paritybit.ca/blog/debian-with-btrfs
- https://forum.manjaro.org/t/116534
- https://ghost.cloud3cola.com/linux-mint-18-3-with-btrfs-luks/
- https://mutschler.eu/linux/install-guides/pop-os-btrfs/
- https://gist.github.com/ansulev/7cdf38a3d387599adf9addd248b09db8
- https://forums.linuxmint.com/viewtopic.php?t=100659
- https://forums.linuxmint.com/viewtopic.php?t=67924
- https://forums.linuxmint.com/viewtopic.php?t=314829
LMDE 6 "anderes Dateisystem"
Vorkenntnisse vor LMDE 6
Untersuchung Installation LMDE 6
standardmäßige Installation mit Verschlüsselung ext4 LMDE 6
- nach dem Neustart in die Installation
cat /etc/crypttab
# <target name> <source device> <key file> <options> lvmlmde UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680 none luks,discard,tries=3
cat /etc/fstab
#### Static Filesystem Table File proc /proc proc defaults 0 0 # /dev/mapper/lvmlmde-root UUID=ba9df8e4-a4fb-42f6-b3ef-682d8c3edd95 / ext4 defaults 0 1 # /dev/mapper/lvmlmde-swap UUID=9e412642-d11a-40f2-9c59-03f9a51f5e28 none swap sw 0 0 # /dev/sda2 UUID=22a7ba7f-0999-43d8-90f2-34c85af6f167 /boot ext4 defaults 0 1 # /dev/sda1 UUID=C002-8E9D /boot/efi vfat defaults 0 1
cat /etc/default/grub.d/61_live-installer.cfg
#! /bin/sh set -e GRUB_CMDLINE_LINUX="cryptdevice=UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680:lvmlmde root=/dev/mapper/lvmlmde-root resume=/dev/mapper/lvmlmde-swap"
standardmäßige Installation ohne Verschlüsselung btrfs LMDE 6
- während der Installation
mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime) proc on /proc type proc (rw,nosuid,nodev,noexec,relatime) udev on /dev type devtmpfs (rw,nosuid,relatime,size=3743316k,nr_inodes=935829,mode=755,inode64) devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000) tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64) /dev/sdb1 on /run/live/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8) /dev/loop0 on /run/live/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue) tmpfs on /run/live/overlay type tmpfs (rw,noatime,mode=755,inode64) overlay on / type overlay (rw,noatime,lowerdir=/run/live/rootfs/filesystem.squashfs/,upperdir=/run/live/overlay/rw,workdir=/run/live/overlay/work,redirect_dir=on) tmpfs on /usr/lib/live/mount type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64) /dev/sdb1 on /usr/lib/live/mount/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8) /dev/loop0 on /usr/lib/live/mount/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue) tmpfs on /usr/lib/live/mount/overlay type tmpfs (rw,noatime,mode=755,inode64) securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime) tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64) tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64) cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot) pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime) efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime) bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700) systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=29,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=12771) mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime) debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime) tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime) hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M) configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime) fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime) ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700) ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700) ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700) tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime,inode64) ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700) binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime) tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=757356k,nr_inodes=189339,mode=700,uid=1000,gid=1000,inode64) gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000) portal on /run/user/1000/doc type fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000) /dev/loop0 on /source type squashfs (ro,relatime,errors=continue) /dev/sda3 on /target type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=256,subvol=/@) /dev/sda3 on /target/home type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=257,subvol=/@home) /dev/sda2 on /target/boot type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=5,subvol=/)
- nach dem Neustart in die Installation
cat /etc/crypttab
# <target name> <source device> <key file> <options>
cat /etc/fstab
#### Static Filesystem Table File proc /proc proc defaults 0 0 # /dev/sda3 UUID=b84bec73-29b9-4e62-a830-5069650680af / btrfs defaults,subvol=@ 00 UUID=b84bec73-29b9-4e62-a830-5069650680af /home btrfs defaults,subvol=@home 0 0 # /dev/sda2 UUID=dea84151-1736-439a-8127-a45f2a7feb75 /boot btrfs defaults 0 0 # /dev/sda1 UUID=FDD2-C26F /boot/efi vfat defaults 0 1
cat /etc/default/grub.d/61_live-installer.cfg
Erarbeitung Verschlüsslung und btrfs
https://forums.linuxmint.com/viewtopic.php?t=100659
- meets
https://linuxmint.com/rel_faye.php
sudo live-installer-expert-mode
/target
ist die das gewünschte Ziel!
Alles Nachfolgende wird aber noch mit /mnt/target
angegeben.
sudo mkdir /mnt/target
sudo mount -o subvol=@ /dev/mapper/lvmlmde-root /mnt/target
sudo mkdir /mnt/target/home
sudo mount -o subvol=home /dev/mapper/lvmlmde-root /mnt/target/home
sudo rsync -avz /run/live/medium/casper/filesystem.squashfs/ /mnt/target/
/dev/loop0
sudo mkdir /mnt/target/dev
sudo mount --bind /dev /mnt/target/dev
sudo mkdir /dev/pts /mnt/target/dev/pts
sudo mount --bind /dev/pts /mnt/target/dev/pts
sudo mkdir /mnt/target/dev/shm
sudo mount --bind /dev/shm /mnt/target/dev/shm
sudo mkdir /mnt/target/proc
sudo mount --bind /proc /mnt/target/proc
sudo mkdir /mnt/target/sys
sudo mount --bind /sys /mnt/target/sys
sudo mkdir /mnt/target/tmp
sudo mount --bind /tmp /mnt/target/tmp
sudo mkdir /mnt/target/
cp -f /etc/resolv.conf /mnt/target/etc/resolv.conf
chroot /mnt/target
Installation Debian
und dann Wechsel zu LMDE
(bevorzugte) Verwendung von zram aktivieren
Bei einer standardmäßigen Installation (ohne Verschlüsselung) mit btrfs wird anscheinend keine Partition (und keine Datei) für SWAP erstellt. (Gut! Stattdessen kann - zeitgemäßer - zram verwendet werden.)
apt install zram-tools
systemctl status zramswap.service
systemctl is-enabled zramswap.service
enabled
systemctl is-active zramswap.service
active
LMDE 6 meets ZFS
in der Verwaltung vom Gerät wikipedia:de:Unified Extensible Firmware Interface#Secure Boot deaktivieren
- wegen der nachträglichen Installation ist der Schlüssel für das Modul für den Kernel für ZFS nicht valide, weswegen das Modul nicht benutzt werden kann
sudo modprobe zfs
modprobe: ERROR: could not insert 'zfs': Key was rejected by service
mit dem Internet verbinden
whoami
mint
uname -a
Linux mint 6.1.0-12-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.52-1 (2023-09-07) x86_64 GNU/Linux
apt update
sudo apt -y install ssh
sudo systemctl status ssh
Ersetzen vom nicht gesetzen Passwort
passwd
ip a
ssh mint@321.321.321.321
sudo nano /etc/apt/sources.list
#/etc/apt/sources.list
deb http://deb.debian.org/debian bookworm main contrib non-free-firmware
apt update
gsettings set org.gnome.desktop.media-handling automount false
apt -y install debootstrap gdisk zfsutils-linux
ls -la /dev/disk/by-id/
total 0
lrwxrwxrwx 1 root root 9 May 28 23:25 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R -> ../../sda
lrwxrwxrwx 1 root root 9 May 28 23:25 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M -> ../../sdb
lrwxrwxrwx 1 root root 9 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0 -> ../../sdc
lrwxrwxrwx 1 root root 10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part1 -> ../../sdc1
lrwxrwxrwx 1 root root 10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part2 -> ../../sdc2
lrwxrwxrwx 1 root root 9 May 28 23:25 wwn-0x5002538d41306eb7 -> ../../sdb
lrwxrwxrwx 1 root root 9 May 28 23:25 wwn-0x5002538d702e43f9 -> ../../sda
DISK1=/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R
DISK2=/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M
swapoff -a
cat /proc/mdstat
Personalities :
unused devices: <none>
sudo wipefs -a $DISK1
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: calling ioctl to re-read partition table: Success
sudo wipefs -a $DISK2
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: calling ioctl to re-read partition table: Success