"Install bootloader on" - could be anything: it will be ignored thanks to our earlier change of a Calamares script. While installing with Calamares: at "Partitions / Select storage device" screen - choose "lvmSystem (/dev/lvmSystem)" and "Manual partitioning", and at the next screen - set a mount point / for /dev/lvmSystem/volRoot. However, my command could be outdated, so don't just copy-paste it. Pkexec env DISPLAY=:0 XAUTHORITY=/home/artix/.Xauthority QT_QPA_PLATFORMTHEME=gtk2 calamares Extract a launch command from this shortcut withĬat /home/artix/Desktop/sktop | grep "Exec" Instead of double clicking a Calamares shortcut on a Desktop, I recommend you to launch Calamares from a console - to get more logs, which could be really useful if any problems arise.
This is fine, since we're going to install GRUB manually a bit later. Nano /usr/lib/calamares/modules/bootloader/main.pyĪnd comment out this line near the end of file at def run() function: Since there doesn't seem to be an option to disable the GRUB installation at Calamares, we have to do it by manually editing a related script. With a partition scheme configured above, there is a high chance of getting a GRUB-related errorĭuring an Artix Linux installation with a Calamares graphical installer. Lvcreate -l +100%FREE lvmSystem -n volRoot As an example, a 16GB for swap (volSwap) and the rest for the root partition (volRoot): Vgcreate lvmSystem /dev/mapper/lvm-systemĪnd having the logical volume group, the logical volumes can be created as follows.
Having the physical volume, it is possible to create a logical volume group named lvmSystem as follows: Now it is possible to create a physical volume using the Logical Volume Manager (LVM) and the previously used id lvm-system as follows: WARNING: failed to connect to lvmetad: No such file or directory. run/lvm/lvmetad.socket: connect failed: No such file or directory
Note: later you will encounter the following warnings - they happen because /run is not available inside the chroot - so you can ignore them: lvm-system :Ĭryptsetup luksOpen /dev/sd X2 lvm-system Open and mount it using the device mapper - into i.e. To create and format the LUKS partition with your custom encryption flags.
To force loading the Linux kernel modules related to Serpent and other strong encryptions from your LiveCD/LiveUSB, runĪnd, after it completes, use a command likeĬryptsetup -verbose -type luks1 -cipher serpent-xts-plain64 -key-size 512 -hash whirlpool -iter-time 10000 -use-random -verify-passphrase luksFormat /dev/sd X2 The disk encryption will utilize the Linux Unified Key Setup (LUKS), which is now part of an enhanced version of cryptsetup, using dm-crypt (device-mapper crypt) as the disk encryption backend. To run the subsequent commands under root. Those who dared to use the forbidden From Stick/HDD option, experienced problems with polkit and other issues, examples of which can be found: here, here, here etc.Īfter booting from a LiveCD/LiveUSB, open a terminal and write sudo su
While booting from your live media, choose From CD/DVD/ISO option regardless of if you are using a CD/DVD or USB. If your dd from Coreutils is new enough, pv may be substituted with a status=progress option:ĭd bs=4096 if=~/Downloads/artix-xfce-openrc-20200506-x86_64.iso iflag=nocache of=/dev/sd X oflag=direct status=progressĪnd wait until it completes - to flush the filesystem buffers and make sure that the image writing has been physically done. Where X in sdX is a letter of your USB flash drive, and pv helps to see a progress. Terminal command to learn your drive letter from a Linux kernel log, then write to this USB withĭd if=~/Downloads/artix-xfce-openrc-20200506-x86_64.iso iflag=nocache bs=4096 | pv | dd of=/dev/sd X oflag=direct bs=4096 || true Burn it to CD/DVD with Brasero/Xfburn - or write to USB flash drive: after inserting it to your PC, use a
Get an Artix Live ISO with your favorite Desktop Environment and OpenRC.