Hi, I'm Joseph!

A few of you met me once Free Geek before the time of the covidium, all those 
centuries ago. I'm obviously highly social because I've been using Linux since 
1997, living in Portland since 2010, and I subscribed to the plug lists … 
today! I was a long-time Debianite until I started helping out at Free Geek, 
which kinda caused me to take closer looks at Mint.

I like Mint. I now use Mint.

It's up to date enough where it matters to _work properly_ on my hardware, but 
I don't have to deal with the random breakages of Debian sid (or Arch or 
Manjaro or any rolling release, I know, I've used them…) and basically I'm in 
favor of some level of laziness.

The problem: It won't install itself on my hardware. I said it won't install 
itself, not that I didn't force the issue. 😁

I use LUKS. And LVM. The Mint installer as of 19.3 through 20.1 just cannot 
cope with that. What you have to do is create your partitions before running 
the installer, then decline the option to reboot and perform a boot repair on 
the spot.

So:

- Create your EFI ESP, /boot, and a bunch of type 8309 partitions. (or skip the 
ESP and use type 83 for MBR…)

- cryptsetup luksFormat all the 8309 partition blobs you have.

- cryptsetup luksUUID the partitions to write your crypttab. Here's mine, which 
is probably more complicated than yours:

    # system
    rocket00crypt00 UUID="d<uuid>0" none luks,discard,keyscript=decrypt_keyctl
    rocket00cryot01 UUID="a<uuid>a" none luks,discard,keyscript=decrypt_keyctl

    # /srv
    seagate00crypt00 UUID="a<uuid>f" none luks,discard,keyscript=decrypt_keyctl
    seagate01crypt00 UUID="8<uuid>8" none luks,discard,keyscript=decrypt_keyctl
    seagate02crypt00 UUID="0<uuid>d" none luks,discard,keyscript=decrypt_keyctl
    seagate03crypt00 UUID="8<uuid>0" none luks,discard,keyscript=decrypt_keyctl

Always use UUIDs, even for NVMe. Those CAN change. And the keyscript lets me 
use one passphrase for all drives. No keyfiles to risk losing.

- luksOpen your devices. You get to type all those passphrases this once unless 
someone knows of an easy way to "mount -a"  a crypttab? 

- Create your LVM setup: pvcreate all the LUKS devices, vgcreate at least one 
VG (I have /srv on its own), and then set up your LVs with whatever redundancy, 
caching, whatever you like. This isn't a tutorial on LVM, sorry.

- Now run the installer and Something else the "How do you want to do this?" 
for slicing and dicing your drive(s). If you didn't do all of the above, the 
Something else screen wouldn't give you the option to create LVM setups unless 
there are PVs, VGs, and at least one LV in each VG you want the Mint installer 
to see, strangely. At that point may as well create the rest yourself.

- Install but DO NOT REBOOT!

- Make sure everyting for your new system is mounted. Don't forget /boot and 
/boot/efi, I think the latter won't be on /target.

- Bind mount … /dev/ /sys /run /proc into your mounted system.

- Get the UUIDs of all your partitions and edit /etc/fstab for them. (I do use 
/dev/aki00/root, /dev/aki00/home, etc. because those aren't likely to change, 
but they CAN be changed. When in doubt, UUID it out!) Remember, you're editing 
like /target/etc/fstab here, not the live USB's fstab!

- Copy the crypttab you created earlier to /etc/crypttab. I said before I don't 
have a command to "mount -a" the contents of crypttab, but … I create it before 
luksOpen so I don't suddenly decide to change the names of things at this 
stage. Renaming devices is a pain in the rear at this stage. If you don't have 
to, don't.

- chroot in: sudo chroot /target /bin/bash

- Make sure your LUKS devices show under /dev/mapper.

- Run vgscan. This might be superstition, but when I was figuring all of this 
out, it didn't work when I didn't, and I always do now.

- update-initramfs -u -k all

- update-grub  (This may also not actually be required.)

That should be it. Shut down the live USB, remove it when it tells you to, 
press Enter, and … it should boot, it should ask you for a passphrase (only one 
if you set it up like I did). If you don't have Plymouth installed, the 
passphrase prompt kinda gets overwritten by other messages spat out by the 
kernel, but Mint's Plymouth theme properly and cleanly asks for it in a nice 
GUI.

The above offered in case someone might find it useful for something. I see a 
thread ongoing about frustrating issues with Linux md and NVMe devices over 
Thunderbolt. Remember when I said NVMe drives can move? Thunderbolt is one 
thing that can cause that to happen. The other way is rearranging, adding, or 
removing PCIe devices, but since Thunderbolt is PCIe hotplug on some level… 
yeah.

So, um, hi! 🙂

Joseph
_______________________________________________
PLUG: https://pdxlinux.org
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to