You are not logged in.
Thanks!
Evidently the installer pre-boot is missing the scsi block device support.
There will be an rc3 drop shortly without that problem.
Thanks. Good information showing "normal" hardware, but I need more ![]()
In summary it seems that machine is able to load the pre-boot system if booted in UEFI mode, but not if booted in legacy mode. (is that correct? or does the installer start equivalently in legacy mode?)
One of possible reasons for such an outcome is if the USB stick requires a kernel module (device driver) that is missing from from the pre-boot system, and that is the information I am looking for.
For example, what does the Alma-linux system log say when the USB stick is inserted? Which kernel modules get loaded?.
Yes I'll deal with reporting.
Which hardware is this?
EDIT: Also, in the emergency shell: run "fdisk -l" and capture that output (too).
Quite possibly we could turn this into a useful bug report; just describe in some detail which media you used and how did you prepare that? A memory stick or an actual CD? I assume you verified the sha256sum, but it's good if you confirm that.
EDIT: I seem to have ignored the title.. a USB would be a memory stick...
So how did you prepare it?
Could you run again and use the emergency shell to report the output from ls -l /dev
If you can install another USB stick, you could mount that and then copy /var/log/syslog to it, and put that into a code block of a post here.
Sorry, I only use traditional ifupdown for my networking, and since you mentioned editing /etc/network/interfaces I thought you did the same.
By the looks of it the kernel recognizes the hardware. I would have thought the boot-up log would mention that hardware and which firmware gets loaded. At least there should be some mt7663* module loaded. You may check that with lsmod.
Surely someone that uses NetworkManager may have further ideas.
what's the output of
# rfkill(install it if you don't have it)
I guess for an mt7663 you'll need to install firmware-misc-nonfree, possibly from chimaera-backports/non-free, unless version 20210315-3 in chimaera/non-free is enough.
Typically kernel modules that need firmware will say so into dmesg and/or syslog.
It is worth to highlight that the ramification of changing the "meaning" of "/bin/sh" is much larger than merely saving the typing of two characters more in new bash scripts.
The "/bin/sh" binary is the most fundamental pathname of a GNU/Linux system since that binary is the one used by the execve system call. It affects all system scripts from top to bottom, from the very boot up of the system. So one must be very sure that the "new meaning" (bash) of "/bin/sh" is fully equal to the "old meaning" (dash) in terms of script interpretation for all existing "/bin/sh" scripts.
Probably "bash" is still a language superset of "dash". But "bash" has significant ongoing development and it is much more intended for interactive use. My worry would be that "bash" suddenly one day has a deviation from "dash" that makes a difference, possibly breaking my system in some obscure way.
If it's mounted then the file: source line is best, but it does need a trusted=yes attribute, like this
deb [trusted=yes] file:/mnt/dev-dvd-only chimaera contrib main non-free non-free-firmwareThe cdrom: source line will probably need an /etc/fstab declaration as well, but I've never had any luck with it so I've stayed with the file: method.
When it works, you can check overall policy with apt-cache policy and then as said, possibly tune it with pinning preferences.
Maybe clip out the two partitions into their own image files, and see if the file command tells... EFI partitions would be fat... with mtools you'd do
mdir -i part1.img -ato see the files in that.
EDIT: I guess you know, but the clipping out would be dd commands like
$ dd if=sdc64gb.img of=part1.img skip=2048 count=32768
$ dd if=sdc64gb.img of=part2.img skip=34816 count=124700639Firstly It might be a help to use dd to make an image file of the card, and then work with that. Like
# dd if=/dev/sdc of=diskimage bs=100MBeing Android sdcard the setup for the partitions might be FAT32 (or vfat?) with an ext2 (or perhaps ext4) within.
And it might be encrypted.
EDIT: attempt to clarify ![]()
NI web search result: https://ffmpeg.org/ffmpeg-formats.html# … gment_002c
enjoy.
ok. thanks. So far limited to virtualbox; i.e. it's not a problem with qemu. I haven't seen it reported from other use cases.
Thanks.
Yes, that installer is missing libgcc_s.so.1 (due to an undeclared dependency).
New ISOs are in progress that should be better in that, though you still need to add nopat by hand; that issue seems to be limited to virtualbox with EFI and it's not yet confirmed to be a universally useful fix.
or if you prefer to avoid microsoft, you can test with https://meet.jit.si/steelpillow
No my issue was different.
I'm not sure what it is, @rolfie, but it all seems to work on virtualbox if you add 'nopat' to the boot command line (push 'e' at the startup splash, then add 'nopat' to the 'linux' line and boot with '^x').
This is regardless of whether the ISO file is writable or not.
Afaict that 'pat' feature is something new for the kernel's memory management and apparently some module(s) are not fully revised and tested with respect to it. Using the 'nopat' option presumably makes the kernel use different code paths that get around this.
@rolfie, the cause for me was that qemu EFI emulation actually requires the ISO to be writable. I believe it's part of the EFI emulation which will want the EFI partition to be writable so it's likely the same for you on vbox.
Also, a similar issue turns up with EFI in qemu ... I can explore that myself
In that case you might switch to a console with C-A-F2, push newline, mount a target filesystem (which you have to prepare beforehand, eg with qemu-image etc), then copy /var/log/syslog to it, unmount and mount that to somewhere accessible, and finally copy out that syslog ... easy peasy ![]()
EDIT: btw, if you want to explore that vbox UEFI startup it's also possible to make it use a special "disk composite" where you single out grub.cfg as an editable byte block.
(eg for preview 20230522 that file starts at byte 3033088 and ends before byte 3037172 )
If that sounds useful and fun for you I can give some more detail instructions...
EDIT 2 : corrected ending 3037642 to be 3037172
Note that there is a new installer ISO collection in progress, supposedly without this bug. It's expected to be available and mirrored in about 6 hours.
TL;DR: Basically the installer building had been changed from a simple strategic design into a series of specialized steps with the aim of addressing a couple of flaws that turned up earlier this year. This turned out to be broken fixing, and it's now reverted. And it appears those packages involved have been fixed up so ideally we are back on the mains street with the installer ISOs.
Are you saying you still have problems?
If so, which ISO are you trying to use?
Which installation choice?
Which partitioning?
etc.
What is the exact error you get?
Right.
The file(s) with .shasum extension are actually text files with one line for each other file that it contains the shasum for (or sha256sum as is the case here). Note that "sha256sum" is just a checksum created by essentially adding the bytes of the checked file with some maths juggling so that the final "number" is a kind of fingerprint for it. Basically any change to the checked file would result in a different fingerprint.
So the .shasum file just tells what the checksum of the checked file(s) is supposed to be. You wouldn't really compute the sha256sum of those .shasum files... unless I suppose you want to compare different downloads of those .. and then "diff" or "cmp" would work as well.
The ISO devuan_daedalus_5.0.preview-20230515_amd64_netinstall.iso has its sha256 sum recorded in devuan_daedalus_5.0.preview-20230515_amd64_netinstall.iso.shasum
I don't know the details of devuan_daedalus_5.0.preview_20230502_amd64_minimal-live.iso which is something different.
The file ...shasum contains the sha256sum; you don't run sha356sum on it. E.g. download both, then run
sha256sum -c devuan_daedalus_5.0.preview-20230515_amd64_netinstall.iso.shasumNote the -c.
It won't help a lot but I just checked and reaffirmed that the ISO devuan_chimaera_4.0.0_amd64_netinstall.iso does indeed contain sudo_1.9.5p2-3_amd64.deb in its package pool. I.e., it should have been installable without ado (assuming you retained to soures.list line for accessing the on-ISO package pool)
But, if you want to install without network I would suggest you rather use either the "server" or the "desktop" ISOs which are intended for that kind of use cases. It is the same installer on all of them but they come with different collections of installable packages so as to support different "full" end-user installations.
The base system, which is the same on all, is just a so called "minbase" debootstrap (with a couple of extras). It serves as a starting point for installing the chosen end-user flavour and is not really intended to be an installation end-point.
No biggie of course, but it is slightly misleading for other people when you stop there and then say that you have installed Devuan
I mean, when you raise issues relative to that but talk about it as if it was a full end-user Devuan installation, then it just brings confusion as to what "Installing Devuan" typically means.