Skip to main content
Recent Posts
63
System / Need help with Display Manager and GUI session
Last post by 0xAA55 -
When I use ly or greetd to launch a wayland session it works just fine. When I launch an x session I get an error. I assume this is because I'm trying to use seatd instead of elogind because I want both wayland and xsessions to work from my greeter.

So the basic setup is:

Currently the /usr/share/xsessions/dwm.desktop looks like:
Code: [Select]
[Desktop Entry]
Encoding=UTF-8
Name=Autism DWM
Comment=Dynamic Window Manager for X
Exec=startx /usr/local/bin/dwm
Icon=dwm

My /etc/ly/config.ini is only slightly changed I'll post it here just in case you need to look through: https://pastebin.com/Cvp3SGsK

the xserver output from attempting to start the xsession:
Code: [Select]
[ 16398.654] 
X.Org X Server 1.21.1.14
X Protocol Version 11, Revision 0
[ 16398.654] Current Operating System: Linux artix-battlestation 6.6.59-1-lts #1 SMP PREEMPT_DYNAMIC Fri, 01 Nov 2024 14:15:34 +0000 x86_64
[ 16398.654] Kernel command line: BOOT_IMAGE=/vmlinuz-linux-lts root=UUID=51303d65-968b-410e-b056-41f2e34fe561 rw loglevel=3 quiet nvidia_drm.modeset=1
[ 16398.654] 
[ 16398.654] Current version of pixman: 0.43.4
[ 16398.654] Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
[ 16398.654] Markers: (--) probed, (**) from config file, (==) default setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[ 16398.654] (==) Log file: "/home/user/.local/share/xorg/Xorg.1.log", Time: Fri Nov 15 13:55:21 2024
[ 16398.654] (==) Using config file: "/etc/X11/xorg.conf"
[ 16398.654] (==) Using config directory: "/etc/X11/xorg.conf.d"
[ 16398.654] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[ 16398.654] (==) No Layout section.  Using the first Screen section.
[ 16398.654] (**) |-->Screen "Screen0" (0)
[ 16398.654] (**) |   |-->Monitor "Monitor0"
[ 16398.654] (**) |   |-->Device "Device0"
[ 16398.654] (**) |   |-->GPUDevice "Card0"
[ 16398.654] (**) Allowing byte-swapped clients
[ 16398.654] (==) Automatically adding devices
[ 16398.654] (==) Automatically enabling devices
[ 16398.654] (==) Automatically adding GPU devices
[ 16398.654] (==) Automatically binding GPU devices
[ 16398.654] (==) Max clients allowed: 256, resource mask: 0x1fffff
[ 16398.654] (WW) The directory "/usr/share/fonts/misc" does not exist.
[ 16398.654] Entry deleted from font path.
[ 16398.654] (WW) The directory "/usr/share/fonts/OTF" does not exist.
[ 16398.654] Entry deleted from font path.
[ 16398.654] (WW) The directory "/usr/share/fonts/Type1" does not exist.
[ 16398.654] Entry deleted from font path.
[ 16398.654] (WW) The directory "/usr/share/fonts/100dpi" does not exist.
[ 16398.654] Entry deleted from font path.
[ 16398.654] (WW) The directory "/usr/share/fonts/75dpi" does not exist.
[ 16398.654] Entry deleted from font path.
[ 16398.654] (==) FontPath set to:
/usr/share/fonts/TTF
[ 16398.654] (==) ModulePath set to "/usr/lib/xorg/modules"
[ 16398.654] (II) The server relies on udev to provide the list of input devices.
If no devices become available, reconfigure udev or disable AutoAddDevices.
[ 16398.654] (II) Module ABI versions:
[ 16398.654] X.Org ANSI C Emulation: 0.4
[ 16398.654] X.Org Video Driver: 25.2
[ 16398.654] X.Org XInput driver : 24.4
[ 16398.654] X.Org Server Extension : 10.0
[ 16398.654] (++) using VT number 7

[ 16398.654] (--) controlling tty is VT number 7, auto-enabling KeepTty
[ 16398.655] (EE) systemd-logind: failed to get session: The name org.freedesktop.login1 was not provided by any .service files
[ 16398.655] (II) xfree86: Adding drm device (/dev/dri/card0)
[ 16398.655] (II) Platform probe for /sys/devices/pci0000:00/0000:00:03.1/0000:09:00.0/drm/card0
[ 16398.657] (**) OutputClass "nvidia" ModulePath extended to "/usr/lib/nvidia/xorg,/usr/lib/xorg/modules,/usr/lib/xorg/modules"
[ 16398.659] (--) PCI:*(9@0:0:0) 10de:2484:3842:3755 rev 161, Mem @ 0xfb000000/16777216, 0xd0000000/268435456, 0xe0000000/33554432, I/O @ 0x0000f000/128, BIOS @ 0x????????/131072
[ 16398.659] (WW) Open ACPI failed (/var/run/acpid.socket) (No such file or directory)
[ 16398.659] (II) LoadModule: "glx"
[ 16398.659] (II) Loading /usr/lib/xorg/modules/extensions/libglx.so
[ 16398.660] (II) Module glx: vendor="X.Org Foundation"
[ 16398.660] compiled for 1.21.1.14, module version = 1.0.0
[ 16398.660] ABI class: X.Org Server Extension, version 10.0
[ 16398.660] (II) LoadModule: "nvidia"
[ 16398.660] (II) Loading /usr/lib/xorg/modules/drivers/nvidia_drv.so
[ 16398.660] (II) Module nvidia: vendor="NVIDIA Corporation"
[ 16398.660] compiled for 1.6.99.901, module version = 1.0.0
[ 16398.660] Module class: X.Org Video Driver
[ 16398.660] (II) LoadModule: "nouveau"
[ 16398.660] (II) Loading /usr/lib/xorg/modules/drivers/nouveau_drv.so
[ 16398.660] (EE) Failed to load /usr/lib/xorg/modules/drivers/nouveau_drv.so: /usr/lib/xorg/modules/drivers/nouveau_drv.so: undefined symbol: exaDriverAlloc
[ 16398.660] (EE) Failed to load module "nouveau" (loader failed, 0)
[ 16398.660] (II) NVIDIA dlloader X Driver  565.57.01  Thu Oct 10 12:05:50 UTC 2024
[ 16398.660] (II) NVIDIA Unified Driver for all Supported NVIDIA GPUs
[ 16398.661] (EE)
Fatal server error:
[ 16398.661] (EE) xf86OpenConsole: Cannot open virtual console 7 (Permission denied)
[ 16398.661] (EE)
[ 16398.661] (EE)
Please consult the The X.Org Foundation support
at http://wiki.x.org
 for help.
[ 16398.661] (EE) Please also check the log file at "/home/user/.local/share/xorg/Xorg.1.log" for additional information.
[ 16398.661] (EE)
[ 16398.661] (WW) xf86CloseConsole: KDSETMODE failed: Bad file descriptor
[ 16398.661] (WW) xf86CloseConsole: VT_GETMODE failed: Bad file descriptor
[ 16398.661] (EE) Server terminated with error (1). Closing log file.

There are two obvious errors here:
  • Code: [Select]
    (EE) xf86OpenConsole: Cannot open virtual console 7 (Permission denied)
  • Code: [Select]
    (EE) systemd-logind: failed to get session: The name org.freedesktop.login1 was not provided by any .service files

The first seems like the actual error.

The second is printed also when I just startx after logging in because I don't have debus started or I don't have the particular dbus component it wants. I think it's not important. When I log in via terminal and run startx /usr/local/bin/dwm it works just fine. It also looks like elogind is required? I have seatd installed since I want to use wayland. Can I use seatd? How do I modify my setup?

Do I add a /usr/local/bin/dwm-wrapper script like so:
Code: [Select]
#!/bin/sh

env \
XDG_SESSION_TYPE=x11 \
XDG_CURRENT_DESKTOP=dwm \
startx /usr/local/bin/dwm
#dbus-launch --sh-syntax --exit-with-session startx /usr/local/bin/dwm
and point the dwm.desktop exec at it?
Do I add the dbus launch or can I skip it?

I tried adding the dbus-launch bit and it didn't effect the outcome.
64
runit / Re: Hello new to the community
Last post by gripped -
this new Linux feature makes hacking IMPOSSIBLE
Nothing makes hacking impossible except the extreme of destroying the computer in a furnace etc.
But assuming that feature is mainlined into the kernel Artix will almost certainly get it anyway.
Quote
My goal with this laptop are to make it as secure as possible. A minimal system with minimal attack surface.
...
Went into the sshd_conf file and set ssh root permissions to no.
If you want a minimal attack surface you want as few services exposed to the internet as possible.
So you don't run sshd unless you need it. If you need it running all the time you disable password logins and only use ssh keys.

Until you understand what you are doing there is a real chance that trying to make Linux more secure can result in it being less secure than when you started due to user misconfiguration. 

A standard install is secure against external attacks as it is but of course new exploits can be found in the future.

Security where others have physical access to the hardware is a different kettle of fish but encryption will serve you better than SELinux or apparmor etc imho
66
runit / Hello new to the community
Last post by æsir -
Hello I am new to the community. Been really delving into runit over the last 3 weeks. Haven't done any programming in a long time. It used to make me tired looking through lines of code and I just couldn't get into it. Lately I am absolutely enamored and perplexed by how someone took language and created computers from it. I've been quite comfortable with the basics of Linux for a few years and realizing what I appreciate most about computers and found myself here over RC.  I'd really like to dive in the deep end and understand scripting and live in the terminal and this system seems to encourage it, while also giving me a starting point. I'm using XFCE on an older little Starlabs Star Lite laptop when I'm more proficient I'd like to install it on my desktop as well.

My goal with this laptop are to make it as secure as possible. A minimal system with minimal attack surface. I read about VOID but Luke Smith talked me into trying this.
So I took the http mirrors out, ran the pacman-key --init pacman-key --populate artix key before running pacman, then installed runit
Went into the sshd_conf file and set ssh root permissions to no.

For the path of least resistance in terms of compatibility what MAC program do you folks recommend?
I'm not opposed to taking the time to learn something more complex like SELinux but that appears to not be super compatible either and read some folks were having issues with AppArmor?

I did do a reinstall after regretting installing Go/AUR repos as this went against my goal of having a minimal attack surface and didn't get a chance to run sysctl -a to verify if my kernel hardening script actually installed. Before I try it again I thought it would be good to verify because the articles I found mentioned using runit to do this.

nano /run/sv.d/started/sysctl
then saved it and ran
'sudo sysctl -p /run/sv.d/started/sysctl'
then
'nano /etc/sysctl.d/99_magic_sysrq.conf' I changed it from 1 to 4 and ran 'sudo sysctl -p /etc/sysctl.d/99_magic_sysrq.conf'

I'm interested in trying this out as well, wondering if the DEVs plan to ingratiate this into the kernel?
this new Linux feature makes hacking IMPOSSIBLE
https://www.youtube.com/watch?v=FSVnN6-xr9k

I'd like to say more, but this is already quite a long post so I'll leave it at this.

HELLO WORLD!