About antiX-net

Forum Forums New users New Users and General Questions About antiX-net

Tagged: ,

  • This topic has 45 replies, 9 voices, and was last updated May 8-10:40 pm by andfree.
Viewing 15 posts - 1 through 15 (of 46 total)
  • Author
    Posts
  • #8708
    Member
    andfree

      I installed antiX-17.1-net (32-bit) on the hard disk of the desktop and upgraded the kernel to 4.9.91. I copied the “rebuild-dkms” script file into my home folder and ran:

      $ sudo ./rebuild-dkms

      Nothing happened and no output. The script file is executable and it has worked on other system versions. Any dependency or something else? Thanks.

      #8711
      Member
      sleekmason
        Helpful
        Up
        0
        ::

        for i in $(dpkg-query -l |grep "\-dkms" |awk '{print $2'}); do dpkg-reconfigure $i |tee -a /var/log/rebuild-dkms.log; done

        This is a single line to be used in terminal as root (or scripted). This is what I use after every kernel build to make sure everything is good to go with dkms.

        #8713
        Forum Admin
        dolphin_oracle
          Helpful
          Up
          0
          ::

          its quite possible on antiX-net that there aren’t any dkms module to rebuild. I’m not sure what’s installed, but classic ones would be

          virtualbox-guest-additions-dkms
          broadcom-sta-dkms
          ndiswrapper-dkms

          The *net addition is pretty stripped down, so its possible those aren’t there.

          #8720
          Member
          sleekmason
            Helpful
            Up
            0
            ::

            I believe I got that line from something you posted dolphin_oracle! Thank you! Appreciate the how-to’s as well. Good stuff.

            #8733
            Member
            andfree
              Helpful
              Up
              0
              ::

              Thanks for the replies. Running the line in terminal as root does nothing, too. I also ran “dpkg-query -l”: no dkms-modules seem to be installed. So, I suppose that no problems are caused by them.
              One problem I’m facing with is that I cannot unlock my encrypted usb flash disk:

              $ udisksctl unlock -b /dev/sdg2
              Passphrase:
              ==== AUTHENTICATING FOR org.freedesktop.udisks2.encrypted-unlock ===
              Authentication is required to unlock the encrypted device USB FLASH DRIVE (/dev/sdg2)
              Authenticating as: ,,, (username)
              Password:
              ==== AUTHENTICATION COMPLETE ===
              Error unlocking /dev/sdg2: GDBus.Error:org.freedesktop.UDisks2.Error.Failed: Error unlocking /dev/sdg2: Error spawning command-line `cryptsetup luksOpen “/dev/sdg2” “luks-3357501f-b866-48a7-a44e-efb726f7893a” ‘: Failed to execute child process “cryptsetup” (No such file or directory) (g-exec-error-quark, 8)

              • This reply was modified 5 years, 1 month ago by andfree.
              #8735
              Anonymous
                Helpful
                Up
                0
                ::

                Hi andfree,
                The “cryptsetup-bin” package supplies /sbiin/cryptsetup command.
                Not sure which other crypt packages you would need though.

                #8737
                Member
                andfree
                  Helpful
                  Up
                  0
                  ::

                  Hi linuxdaddy. I installed cryptsetup-bin and now I’m able to unlock the disk:

                  $ udisksctl unlock -b /dev/sdg2
                  (...)
                  Unlocked /dev/sdg2 as /dev/dm-0.

                  Many thanks. The next problem is that I can’t mount any disk partition with a single “(sudo) mount” command:

                  $ sudo mount /dev/dm-0
                  mount: can’t find /dev/dm-0 in /etc/fstab
                  (EDIT: bad command, see the post #8758 below)

                  Or, generally:

                  $ sudo mount /dev/sd**
                  mount: can't find /dev/sd** in /etc/fstab

                  I can mount them with commands like the ones below, but then the contents of the disk partition appear directly in /media folder and not in a /media/sd** folder:

                  $ sudo mount /dev/dm-0 /media
                  (EDIT: bad command, see the post #8758 below)

                  Or, generally:

                  $ sudo mount /dev/sd** /media

                  • This reply was modified 5 years, 1 month ago by andfree.
                  • This reply was modified 5 years, 1 month ago by andfree.
                  #8741
                  Forum Admin
                  anticapitalista
                    Helpful
                    Up
                    0
                    ::

                    Never mind

                    • This reply was modified 5 years, 1 month ago by anticapitalista.
                    • This reply was modified 5 years, 1 month ago by anticapitalista.

                    Philosophers have interpreted the world in many ways; the point is to change it.

                    antiX with runit - leaner and meaner.

                    #8749
                    Anonymous
                      Helpful
                      Up
                      0
                      ::

                      If the disk is encrypted you will need the “cryptmount” package to mount them.

                      cryptmount is a utility for creating encrypted filesystems & swap partitions
                      and which allows an ordinary user to mount/unmount filesystems
                      without requiring superuser privileges.

                      which says you don’t need sudo.

                      #8751
                      Anonymous
                        Helpful
                        Up
                        0
                        ::

                        I don’t know which repos you are using so make sure none of these crypt and
                        mount packages try pulling systemd stuff in.

                        #8753
                        Forum Admin
                        dolphin_oracle
                          Helpful
                          Up
                          0
                          ::

                          the clue to your problem is that the mount works when you use /media.

                          when using mount, mountpoints must pre-exist. so you need to manually create a target folder under /media. I don’t remember if that is true if the mount is defined in fstab or not.

                          another utility, pmount, is also useful for this.

                          This is one reason I like to use udevil for mounting. it will auto-create a mount point under /media (by default) with either the device name or the label of the device you are mounting.

                          #8756
                          Member
                          andfree
                            Helpful
                            Up
                            0
                            ::

                            Thanks for all the replies. I don’t think I need the “cryptmount”, because I already can mount encrypted partitions (if I define the mountpoint).
                            I installed pmount, and target folders like these appeared under /media: sdg1, sdg2, sdg3.
                            I installed udevil, and now the non-encrypted disks are automounted.

                            I still can’t mount an unlocked encrypted partition without define a mountpoint:
                            $ sudo mount /dev/dm-0
                            mount: can’t find /dev/dm-0 in /etc/fstab
                            (EDIT: bad command, see the next post)

                            At this point, I installed cryptmount to give it a try, but it didn’t help.

                            • This reply was modified 5 years, 1 month ago by andfree.
                            • This reply was modified 5 years, 1 month ago by andfree.
                            #8758
                            Member
                            andfree
                              Helpful
                              Up
                              0
                              ::

                              Sorry for the wrong command. The unlocked encrypted partition is mounted and the corresponding target folder under /media appears after the correct command:

                              $ udisksctl mount -b /dev/dm-0

                              • This reply was modified 5 years, 1 month ago by andfree.
                              • This reply was modified 5 years, 1 month ago by andfree.
                              #8763
                              Anonymous
                                Helpful
                                Up
                                0
                                ::

                                great suggest on pmount.Dolphin..never used it much and wasn’t for sure
                                how udevil worked on net. I knew it works on base and core. Also most
                                my stuff isn’t on encrypted usb disk just my home partitions on hdd drives.
                                glad to see that udiskctl worked andfree.

                                #8779
                                Member
                                andfree
                                  Helpful
                                  Up
                                  0
                                  ::

                                  I forgot to write that I had installed udisks2 before. It’s not pre-installed on net (not even on core).

                                Viewing 15 posts - 1 through 15 (of 46 total)
                                • You must be logged in to reply to this topic.