You are not logged in.
Yup Radare is in there but the cutter you mentioned isn't the "right" cutter: Check this out: http://beta.rada.re/en/latest/cutter.html
I would LOVE to see a Devuan "pen-testing" distro to be honest. I'd work to create my own but if I'm being honest, I'm not qualified to build a distro, haha. Would be a very long road!
Your linked thread is interesting. How you had any progress since your last post??
aut0exec wrote:...and like a bunch of the pre-installed pieces of software they were including....
Would ya share which installed software, you like?
I'm jus` doing alittle recon.
Happily! The big ones here were: Radare and Cutter, vscodium (not because I want it, work does), the collection of wireless tools (don't need them currently but plan to learn how to use them). I'm sure there will be others but haven't had much more than a week to mess around with it. Are you building a distro (A devuan based distro like this would be really slick)??
Freemedia, Thanks for the info. The 2017 items were the ones I kept finding. Was hoping since Devuan had seen several releases that perhaps Parrot had switched over by now. Looks like they're still tracking to make the jump so I'll sit tight!
Just wondering if anyone had heard anything more about the potential change of Parrot OS switching from Debian to base off of Devuan instead? I booted an iso recently and like a bunch of the pre-installed pieces of software they were including but was saddened to still see Systemd there.
We are very much alive.
Been running across lots of people who know about Devuan as much as they know Ubuntu! I've been shocked a few times to hear folks speaking of Devuan. Not that it's a bad thing at all just caught me off guard.
Put APT::Install-Recommends "no"; in /etc/apt/apt.conf.d/norecommends and Recommends will be excluded on upgrades as well as installations.
Maybe aptitude why avahi-daemon will tell you something useful.
Another TIL! Thanks red...
So initially aptitude responded with 'hplip' so it was removed and then after another run, it came back with the following:
user@userpc:~# aptitude why avahi-daemon
i task-cinnamon-desktop Depends task-desktop
i A task-desktop Recommends avahi-daemon
So looks like cinnamon has some sort of dependency on avahi-daemon in beowulf?
Thanks golinux. That was a good TIL for me! Removed everything in the output and Apt upgrade still wants to reinstall avahi-daemon though. This is the weirdest thing. I have at least three other Beowulf and ceres machines running cinnamon and none of them do this!
After removing everything I decided to reinstall the components I actually did need but noticed if '--no-install-recommends' I was able to prevent avahi-daemon from reinstalling while still upgrading the other software! Tried the same thing with 'apt upgrade' and it exhibited the same behavior. I don't have any apt pinning or odd configurations to my knowledge either. Wondering if I should just reinstall, haha.
Switched one of my Cinnamon Ascii systems over to beowulf repo's and with a few exceptions (self induced issues) everything upgraded without a hitch! I know Beowulf isn't officially released but I've been using it on a bunch of other machines with no issues so far.
Anyways, generally want nothing to do with avahi-daemon so I purge it almost as soon as I see it on a machine. For some reason though 'apt upgrade' is wanting to reinstall it after it has been purged. I can't seem to track down where the dependency is that might be requiring avahi either. Anyone have any suggestions? This is a new one for me...
Probably not the right forum category for this kind of post...
What exactly are you looking for? Security items are generally made available as quickly as possible when you stick to the stable releases though.
I was wondering if it is worthwhile to convert my traditional boot install to a UEFI boot install. Not sure if there are any advantages.
I've been converting new installs to it but definitely not going back to switch MBR systems to UEFI unless absolutely necessary. Mainly just because of not wanting to switch the partitioning over.
In contrast to ToxicExMachina, I've enjoyed UEFI, there's a bunch of nice things about it (Secure Boot, efibootmgr, doing away with MBR partitions, etc), To each their own though. If you have a spare machine, try a new install and see what you think. You probably won't notice many differences until you start messing with the boot components (Grub mainly, haha).
Agree with Dutch_Master.
While I don't have other distro's installed on it, I do have a USB stick that boots a Devuan Ascii instance just fine. So it definitely can be done!
Hmmmm .... curious.
When I was having problems getting ceres to update, because of the system clock issue, I typed "apt-cache search ntp". It came back with nothing. Now the search comes back with a lot of things, including ntp. Perhaps the aborted update messed up the available package listing.
As an aside, I don't actually need ntp for the virtual machine. I just forgot to click the box in the machine settings for how to handle the hardware clock from the host. This had not been causing any problems with updating until a few days ago.
To my understanding; If you hadn't been able to pull the package lists (apt update), then apt-cache wouldn't have had anything to search. Once you corrected the clock, I bet you ran and apt update which would've pulled down all the package lists and now apt-cache has stuff to search.
I'm a Mint user who, maybe this week, will start a dual boot with Devuan.
While I am a Mint user, I've had experience with Arch and Ubuntu minimal before and I've installed Devuan on VirtualBox. But is there anything I should really know before installing it directly?
And yes, I know the whole "back up your current system before installing a second OS" thing and I intend to do so.
Welcome! Former Mint user as well... You'll like Devuan; I've been running ASCII, Beowulf, and Ceres with Cinnamon on a number of different machines and everything still feels like Mint but runs so much better!
I had this problem earlier last week but was using Ceres. Screen freeze was random and unpredictable. Would be fine for only 2 minutes one boot and then it would be fine for hours the next boot. Ever since installing the nVidia proprietary driver the system has been stable and running for almost a week with no freezes. Machine is a HP Z420 with a Quadro K2000.
Since you mentioned that Windows also had the problem though, I'd be more inclined to think that you have a possible hardware issue. The card swap might be worth it to keep yourself from going crazy trying to find a software fix for a hardware issue....
I used the one on this page, but I think it's the same one.
http://pkgmaster.devuan.org/devuan/dist … s/netboot/The kernel in my beowulf is dated July 19. The mini.iso is dated June 27.
Did an UEFI install with the June 27 ISO end of last week and ran into same problem as OP.
Issue was fixed here by getting the system booting manually through the grub CLI (set root and all that stuff) and then noticed that /boot/efi/EFI didn't contain the usual "debian" or "devuan" directory so ran
grub-install --bootloader-id=devuan
. It's been a few days now and I've definitely slept since then so YMMV.
If needed, I can go boot that system up again and review what was done; hoping I saved my history....
I've run across this on a few installs recently and wanted to document it for anyone else running across the same issue.
Fresh install of Beowulf/Ceres and utilizing the Cinnamon DE will likely result in the Cinnamon settings menu not opening. Not a huge problem and it is being tracked upstream at https://github.com/linuxmint/cinnamon/issues/8495 but the TL;DR of the issue is to do the following:
1) sed -i 's/Image\.VERSION/Image\.__version__/' /usr/share/cinnamon/cinnamon-settings/bin/imtools.py
2) cinnamon-settings
Hope this helps!
Ralph, Thanks. This is some good info! I'll keep looking for that old tool but the files you recommended, look to be a good start place for now. Much appreciated.
Not sure where to put this and my Google searches are turning up nothing useful; I'm hoping someone here remembers the command I'm looking for though!
I feel like way back in the good ole days there was an '*rc*' tool that would auto-generate the shell of an rc script for you and then you just simply had to modify the necessary items for your daemon/process/etc within the script. Does this sound familiar to anyone and if so what was the utility? Thought I had hit the jackpot with 'sysv-rc-conf' but that's more of a 'chkconfig' tool it seems...
*I am aware that I can copy most any other rc script in order to accomplish this task but now I'm trying to make sure I'm not going crazy and making up tools!
It would make more sense not to have it baked in because live updates would not be possible if it was.
Hmm you don't think you'd still be able to late-load a newer one? Luckily for this, anytime there would be an update a new kernel would be rolled out anyways so late-load wouldn't really be needed!
Thanks HoaS, I did get it working today.
I was reading the CONFIG_EXTRA_FIRMWARE_DIR as a temporary place to hold firmware until it was compiled into the kernel but it seems that's not the purpose of that parameter. Seems that the configuration parameter simply states where within the root file-system the microcode resides and then the kernel loads it from that path on startup? I was naively assuming that the firmware was actually built into the kernel and then loaded from within the kernel itself rather than from an external source like initramfs or rootfs. Is that assessment correct?
Greetings again, back with another fun one! Still working on this custom setup and realized that the CPU microcode didn't contain any of the patches for those wonderful Meltdown, Spectre, and other bugs from the past year. So I set off to roll the processor microcode into the custom kernel (not using an initramfs and would prefer to apply the patch as soon as possible in the boot process still).
So some quick Gentoo and LFS research showed that baking in firmware into a custom kernel was pretty simple or so I though! So the necessary 4.9 kernel configuration parameters appear to be the following:
CONFIG_FW_LOADER=y
CONFIG_FIRMWARE_IN_KERNEL=y
CONFIG_EXTRA_FIRMWARE="Intel_ucode/xx-xx-xx" - xx-xx-xx being the proper code for the Intel CPU
CONFIG_EXTRA_FIRMWARE_DIR="firmware"
CONFG_PREVENT_FIRMWARE_BUILD=y
## Not sure what this one does and can't seem to find a clear explanation of what it is for
So going forth with the configuration options above, I placed the Intel microcode into the directory kernel/firmware/Intel_ucode and then proceeded to build the kernel. Watching the build output I see the process pick up the microcode (three lines; there's a MK-FW, AS, and then an LD line referencing the Intel Microcode). However when I boot the kernel on the device the kernel doesn't appear to load the updated microcode but I do know that the microcode is the right one for the CPU as I can late load it and it'll work.
Anyone have an idea what I'm missing/doing wrong?
Relevant post on the topic:
1) https://wiki.gentoo.org/wiki/Intel_micr … -fs.2Fdisk
2) http://www.linuxfromscratch.org/blfs/vi … mware.html
Update just in case anyone else ever runs into this issue as well.
Looking closer at the repo kernel it looks like the ACS Override patch is applied. So all that was needed was applying the ACS override patch as well as utilizing the pcie_acs_override boot parameter. While not an ideal situation due to the potential security issues, it doesn't seem to concern any of the major distro's?? Arch, Debian, CentOS, RHEL, Ubuntu, etc all seem to provide this patch within their kernel build.
ACS override worked but is a bad idea. Looks like upgrading to a slightly newer kernel and utilizing CONFIG_PCI_MMCONFIG=y accomplished the same thing without the need for the ACS override patch.
Greetings everyone. Hoping some folks on the forum can point me in the right direction with this issue.
I'm working on a system that is utilizing KVM and PCI Passthrough of some Intel PCIe NIC's. The project is being done to be as minimal as possible so it's been a lot of from source with minimal dependencies. It's been an awesome learning experience so far but I'm getting to a point with PCI devices and Kernel configuration parameters that's beyond my current know-how. What I'm seeing is as follows:
On the current 4.9 kernel from the repo, my 4 PCIe NICs shows up each in their own IOMMU group. Nic 1 in group 12, Nic 2 in group 13, etc. This is great as I understand it this means I can detach each of these NICs individually from the host and pass them directly to one of the KVM guests. Having done this with one of the VM's so far all seems well.
So now I wanted to set this up on the slimmed down, minimal kernel. I've added the following configuration options in the custom kernel (I do realize that they should all be CONFIG_* and they are in the acutal configuration file):
INTEL_IOMMU=y
INTEL_IOMMU_SVM=y
IOMMU_API=y
IOMMU_SUPPORT=y
VFIO_IOMMU_TYPE1=y
VFIO=y
VFIO_PCI=y
VFIO_PCI_MMAP=y
KVM_VFIO=y
Now when I boot the custom kernel, all four of the Intel NIC's show up in the same IOMMU group (group 6 if it matters). I could detach all of them from the host but I was hoping to avoid that if possible.
Again what's happening with this low-level PCI/kernel situation is outside of my current understanding but I'm trying to learn. I've tried doing a comm/diff of the configs from the custom kernel and the larger repo kernel one but that results in quite a bit of items that are enabled in the repo one (obviously since it has to be more generic). Does anyone have any tips or suggestions on how to track down which configuration option might be contributing to the differences in IOMMU groupings for these NICs?
Well good news the Toshiba worked! Was able to EFI-stub load without an initramfs and secure boot enabled. I'm hoping to repeat the steps on the HP workstation and see if I can get different results. Was shocked at how much simpler the Toshiba was than HP. Was able to do everything except toggle Secure Boot on in the Bios from within the CLI.
If you think the modules are the problem then try configuring the kernel without any modules at all (ie, with all the options built-in).
Should've reported back on Friday. I did just this and still ran into the same issue. Without any sort of display, I can't see anything during system boot up with SB enabled and custom certs... So no idea how to troubleshoot this (thought maybe serial console but system doesn't have one of those either, figures...). Thought about a USB to serial adapter but not sure if it would work before Linux take over though. Any ideas?
I'm going to sacrifice my trusty Toshiba testing laptop to the Secure Boot deity and see if the nvidia card is the issues in the Z420 tower. This Toshiba appears to have integrated everything so I'm hoping that there won't be any crazy OROM's to deal with. I'll report back with the results.