About antiX-net

Forum Forums New users New Users and General Questions About antiX-net

Tagged: ,

This topic contains 45 replies, has 9 voices, and was last updated by andfree May 8-10:40 pm.

Viewing 15 posts - 1 through 15 (of 46 total)
  • Author
    Posts
  • #8708
    Member
    Avatar
    andfree

    I installed antiX-17.1-net (32-bit) on the hard disk of the desktop and upgraded the kernel to 4.9.91. I copied the “rebuild-dkms” script file into my home folder and ran:

    $ sudo ./rebuild-dkms

    Nothing happened and no output. The script file is executable and it has worked on other system versions. Any dependency or something else? Thanks.

    #8711
    Member
    sleekmason
    sleekmason

    for i in $(dpkg-query -l |grep "\-dkms" |awk '{print $2'}); do dpkg-reconfigure $i |tee -a /var/log/rebuild-dkms.log; done

    This is a single line to be used in terminal as root (or scripted). This is what I use after every kernel build to make sure everything is good to go with dkms.

    #8713
    Forum Admin
    dolphin_oracle
    dolphin_oracle

    its quite possible on antiX-net that there aren’t any dkms module to rebuild. I’m not sure what’s installed, but classic ones would be

    virtualbox-guest-additions-dkms
    broadcom-sta-dkms
    ndiswrapper-dkms

    The *net addition is pretty stripped down, so its possible those aren’t there.

    #8720
    Member
    sleekmason
    sleekmason

    I believe I got that line from something you posted dolphin_oracle! Thank you! Appreciate the how-to’s as well. Good stuff.

    #8733
    Member
    Avatar
    andfree

    Thanks for the replies. Running the line in terminal as root does nothing, too. I also ran “dpkg-query -l”: no dkms-modules seem to be installed. So, I suppose that no problems are caused by them.
    One problem I’m facing with is that I cannot unlock my encrypted usb flash disk:

    $ udisksctl unlock -b /dev/sdg2
    Passphrase:
    ==== AUTHENTICATING FOR org.freedesktop.udisks2.encrypted-unlock ===
    Authentication is required to unlock the encrypted device USB FLASH DRIVE (/dev/sdg2)
    Authenticating as: ,,, (username)
    Password:
    ==== AUTHENTICATION COMPLETE ===
    Error unlocking /dev/sdg2: GDBus.Error:org.freedesktop.UDisks2.Error.Failed: Error unlocking /dev/sdg2: Error spawning command-line `cryptsetup luksOpen “/dev/sdg2” “luks-3357501f-b866-48a7-a44e-efb726f7893a” ‘: Failed to execute child process “cryptsetup” (No such file or directory) (g-exec-error-quark, 8)

    • This reply was modified 1 year, 7 months ago by andfree.
    #8735
    Member
    linuxdaddy
    linuxdaddy

    Hi andfree,
    The “cryptsetup-bin” package supplies /sbiin/cryptsetup command.
    Not sure which other crypt packages you would need though.

    Normal == 🙂
    depends on the surrounding crowd ?!

    #8737
    Member
    Avatar
    andfree

    Hi linuxdaddy. I installed cryptsetup-bin and now I’m able to unlock the disk:

    $ udisksctl unlock -b /dev/sdg2
    (...)
    Unlocked /dev/sdg2 as /dev/dm-0.

    Many thanks. The next problem is that I can’t mount any disk partition with a single “(sudo) mount” command:

    $ sudo mount /dev/dm-0
    mount: can’t find /dev/dm-0 in /etc/fstab
    (EDIT: bad command, see the post #8758 below)

    Or, generally:

    $ sudo mount /dev/sd**
    mount: can't find /dev/sd** in /etc/fstab

    I can mount them with commands like the ones below, but then the contents of the disk partition appear directly in /media folder and not in a /media/sd** folder:

    $ sudo mount /dev/dm-0 /media
    (EDIT: bad command, see the post #8758 below)

    Or, generally:

    $ sudo mount /dev/sd** /media

    • This reply was modified 1 year, 7 months ago by andfree.
    • This reply was modified 1 year, 7 months ago by andfree.
    #8741
    Forum Admin
    anticapitalista
    anticapitalista

    Never mind

    • This reply was modified 1 year, 7 months ago by anticapitalista.
    • This reply was modified 1 year, 7 months ago by anticapitalista.

    Philosophers have interpreted the world in many ways; the point is to change it.

    #8749
    Member
    linuxdaddy
    linuxdaddy

    If the disk is encrypted you will need the “cryptmount” package to mount them.

    cryptmount is a utility for creating encrypted filesystems & swap partitions
    and which allows an ordinary user to mount/unmount filesystems
    without requiring superuser privileges.

    which says you don’t need sudo.

    Normal == 🙂
    depends on the surrounding crowd ?!

    #8751
    Member
    linuxdaddy
    linuxdaddy

    I don’t know which repos you are using so make sure none of these crypt and
    mount packages try pulling systemd stuff in.

    Normal == 🙂
    depends on the surrounding crowd ?!

    #8753
    Forum Admin
    dolphin_oracle
    dolphin_oracle

    the clue to your problem is that the mount works when you use /media.

    when using mount, mountpoints must pre-exist. so you need to manually create a target folder under /media. I don’t remember if that is true if the mount is defined in fstab or not.

    another utility, pmount, is also useful for this.

    This is one reason I like to use udevil for mounting. it will auto-create a mount point under /media (by default) with either the device name or the label of the device you are mounting.

    #8756
    Member
    Avatar
    andfree

    Thanks for all the replies. I don’t think I need the “cryptmount”, because I already can mount encrypted partitions (if I define the mountpoint).
    I installed pmount, and target folders like these appeared under /media: sdg1, sdg2, sdg3.
    I installed udevil, and now the non-encrypted disks are automounted.

    I still can’t mount an unlocked encrypted partition without define a mountpoint:
    $ sudo mount /dev/dm-0
    mount: can’t find /dev/dm-0 in /etc/fstab
    (EDIT: bad command, see the next post)

    At this point, I installed cryptmount to give it a try, but it didn’t help.

    • This reply was modified 1 year, 7 months ago by andfree.
    • This reply was modified 1 year, 7 months ago by andfree.
    #8758
    Member
    Avatar
    andfree

    Sorry for the wrong command. The unlocked encrypted partition is mounted and the corresponding target folder under /media appears after the correct command:

    $ udisksctl mount -b /dev/dm-0

    • This reply was modified 1 year, 7 months ago by andfree.
    • This reply was modified 1 year, 7 months ago by andfree.
    #8763
    Member
    linuxdaddy
    linuxdaddy

    great suggest on pmount.Dolphin..never used it much and wasn’t for sure
    how udevil worked on net. I knew it works on base and core. Also most
    my stuff isn’t on encrypted usb disk just my home partitions on hdd drives.
    glad to see that udiskctl worked andfree.

    Normal == 🙂
    depends on the surrounding crowd ?!

    #8779
    Member
    Avatar
    andfree

    I forgot to write that I had installed udisks2 before. It’s not pre-installed on net (not even on core).

Viewing 15 posts - 1 through 15 (of 46 total)

You must be logged in to reply to this topic.