Advertisement
Guest User

Untitled

a guest
Dec 6th, 2024
17
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.75 KB | None | 0 0
  1. [[email protected] ~]$ lsblk -f
  2. NAME FSTYPE FSVER LABEL UUID FSAVAIL FSUSE% MOUNTPOINTS
  3. loop0 squashfs 4.0 0 100% /run/archiso/airootfs
  4. sda
  5. ├─sda1 vfat FAT32 5305-B9F5
  6. └─sda2 ext4 1.0 94e21123-fc0f-4ff2-898b-98fd43ec2535
  7. sdb
  8. └─sdb1 ext4 1.0 863dabb9-9dca-4529-9f53-15635634f029
  9. sdc
  10. ├─sdc1 exfat 1.0 Ventoy 4E21-0000
  11. │ └─ventoy iso9660 Joliet Extension EOS_202404 2024-04-20-15-57-10-00 0 100% /run/archiso/bootmnt
  12. └─sdc2 vfat FAT16 VTOYEFI 223C-F3F8
  13. sr0
  14. nvme0n1
  15. ├─nvme0n1p1 vfat FAT32 A2FF-3524
  16. └─nvme0n1p2 ext4 1.0 endeavouros 494fbd54-2c13-41eb-bd27-2374f8201c5d
  17. [[email protected] ~]$ sudo mount nvme0n1p2 /mnt
  18. mount: /mnt: special device nvme0n1p2 does not exist.
  19. dmesg(1) may have more information after failed mount system call.
  20. [[email protected] ~]$ sudo mount /dev/ nvme0n1p2 /mnt
  21. mount: bad usage
  22. Try 'mount --help' for more information.
  23. [[email protected] ~]$ sudo mount /dev/nvme0n1p2 /mnt
  24. [[email protected] ~]$ sudo cat /mnt/etc/fstab
  25. # /etc/fstab: static file system information.
  26. #
  27. # Use 'blkid' to print the universally unique identifier for a device; this may
  28. # be used with UUID= as a more robust way to name devices that works even if
  29. # disks are added and removed. See fstab(5).
  30. #
  31. # <file system> <mount point> <type> <options> <dump> <pass>
  32. UUID=A2FF-3524 /efi vfat defaults,noatime 0 2
  33. UUID=494fbd54-2c13-41eb-bd27-2374f8201c5d / ext4 defaults,noatime 0 1
  34. tmpfs /tmp tmpfs defaults,noatime,mode=1777 0 0
  35. # //10.192.10.149/Colossus /home/htpc/Colossus cifs uid=htpc,gid=htpc,credentials=/home/htpc/.smbcredentials,rw,nofail 0 0
  36. //10.192.10.149/Colossus /home/htpc/Colossus cifs x-systemd.automount,x-systemd.idle-timeout=1min,rw,uid=htpc,gid=htpc,credentials=/home/htpc/.smbcredentials,iocharset=utf8,rw,user,nofail,vers=2.0 0 0
  37. /dev/disk/by-uuid/863dabb9-9dca-4529-9f53-15635634f029 /home/htpc/Local\040Storage auto nosuid,nodev,nofail,x-gvfs-show 0 0
  38. [[email protected] ~]$ sudo mount /dev/nvme0n1p1 /mnt/efi
  39. [[email protected] ~]$ sudo arch-chroot /mnt
  40. [root@EndeavourOS /]# bootctl install
  41. Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/systemd/systemd-bootx64.efi".
  42. Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/BOOT/BOOTX64.EFI".
  43. ⚠ Mount point '/efi' which backs the random seed file is world accessible, which is a security hole! ⚠
  44. ⚠ Random seed file '/efi/loader/random-seed' is world accessible, which is a security hole! ⚠
  45. Random seed file /efi/loader/random-seed successfully refreshed (32 bytes).
  46. Created EFI boot entry "Linux Boot Manager".
  47.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement