Skip to main content

Debian 4.0 r0 (Etch) installation on IBM System p5 510 inside LPAR

For some reason, the usual CD/DVD installation does not work in LPAR. I tried both Debian 4.0r0 (netinst and complete cd-1) and OpenSUSE 10.2 (dvd). The errors are known. I reported the OpenSUSE bug here [1], and the Debian bug has been reported here [2]. Update: This workaround should also work in OpenSUSE. Select the logical volume where the installer was disk dumped (dd) as the installer media. This can be done in the Main Menu (4>1>3).

There is a workaround documented by Gottfried Scheckenbach in debian-boot list [3]:

Of interest for users of VIO (via HMC or IVM):
I have found a way around burning a new disc (because I'm not physical near to the machine): I downloded the iso onto the VIO server and putted it via dd into a newly created virtual disc aka LV on the VIO. I attached this virtual disc as secondary hard disc to the LPAR and booted the LPAR using the defictive cdrom. After running into the missing files problem on initializaton of the installer I remounted /cdrom from this second hard disc.

I clarified the 'dd' command from him and he pointed me to the command `oem_setup_env`:
the padmin user has it's own PATH environment - there you see no dd (nor the other usual AIX stuff). But if you switch to root (with oem_setup_env), you can use all normally available AIX commands. And you must be root to write into the LV device. If you look inside /dev you find two devices witch contain the name of your lv - you have to use the block device, not the character one.

To use AIX commands like dd, login as root using the command `oem_setup_env`. This is another helpful documentation in disk dumping the cd-1 ISO image [4].

This is a step by step documentation on the workaround:

0. The assumptions are: you already are inside the VIO server as root, you already have created storage pools (one of which is the rootvg where VIO is located), also you have already created the partition where to install Linux, via IVM.

1. We create the logical volume from one of the storage pools. In this example, we create a logical volume named 'vdiso' from a storage pool named 'LinuxPoolvg'. Since the cd iso is about 700mb, I'll peg the size of the logical volume to 1gig.

$ mklv -lv vdiso LinuxPoolvg 1G

2. Copy the cd iso (debian-40r0-powerpc-CD-1.iso) to the VIO server. I used ftp. (Default user/password: padmin/padmin)

3. Disk dump the ISO to the logical volume as documented by Gottfried and here [4]. If you look inside /dev you find two devices which contain the name of your logical volume. Make sure you use the block device, not the character one.

$ oem_setup_env
# ls -l /dev/*vdiso
crw------- /dev/rvdiso
brw------- /dev/vdiso
# dd if=debian-40r0-powerpc-CD-1.iso of=/dev/vdiso bs=8M

4. Attach the logical volume to the concerned partition via IVM. This is a resourceful guide in managing your partitions using IVM [5]. The attached logical volume will be seen as /dev/sdb1 (you can verify the device name later by using `dmesg` to check for kernel messages on the attached device).

5. Create a virtual terminal (vt) connection to a partition. In this example, the id of the partition is 2:

# exit
$ mkvt -id 2

To remove the vt:

$ rmvt -id 2

To exit the vt and go back to the shell:

(tilde period)

6. Activate the partition using IVM. You should see the boot process from the newly created virtual terminal connection. You should also see yaboot bootloader. Type `install64` to load the 64-bit kernel of the Debian installer and initiate an installation.

7. The installation should fail as reported by Gottfried [2], a failure to read from the cd media. Go back to the Debian installer main menu and scroll down to 'Execute a shell'. You will be given a busybox ash shell. Verify the Linux device name of logical volume (mentioned earlier in step 4) using `dmesg`. Mine is /dev/sdb1.

8. Unmount the cd media mounted in /cdrom and replace it with the logical volume created in step 1:

Busybox ASH:
# umount /cdrom
# mount /dev/sdb1 /cdrom
# exit

9. You should be brought back to the main menu. Re-start the installation from the step 'Load installer components from CD'. Select all components.

10. There will be a problem detecting the PPPoE concentrator. I just skipped this step and continued.

11. Gottfried reports here [3] that there will be a problem with ext3 reformatting, so we use reiserfs instead.

12. Please read Gottfried's other notes (e.g. yaboot placement) for other possible errors. I encountered a minor problem with the default boot sequence but it's as simple as specifying the newly-installed partition in the SMS menu.

If you have other problems, you can drop a comment here or report it as a bug to the concerned Debian list.

[1] link1
[2] link2
[3] link3
[4] link4
[5] link5


Popular posts from this blog

Globe's HOOQ.TV an (unethical) scam!!

After being terribly disappointed with the subscription stage and after also after a very disappointing test drive (at least Netflix tries to be do-no-evil), I am now very disappointed with the un-subscription of with Globe.

Globe sends me a message:

Hi! We'd like to remind you that your free HOOQ will end in 7 days on 10/27/2015. Upon expiry, your subscription will auto-renew to the paid version for P149 per month. If you don't want the paid version, text HOOQ STOP to 8888. before the expiry date. Thank you!

I send the HOOQ STOP to 888 and received:

Sorry, you have entered an invalid keyword. Please make sure your keyword is correct with no extra characters and spaces. For more info on promos, dial *143#, FREE from your Globe/TM mobile phone.

I called Globe Support (211).

Here's the scam:

- GoSurf 999 comes with the HOOQ Free Plan

- After the Free HOOQ Plan (which you did not use because it sucks) expires, it will auto-renew without your consent (!!! UNETHICAL !!!…

Use Private Internet Access (PIA) in DigitalOcean

tags: PrivateInternetAccess, Digital Ocean, VPS, VPN

This runs the PIA VPN using OpenVPN all from the command line.

sudo apt-get install openvpn network-manager-openvpn Not sure if you need network-manager-openvpn.

sudo wget Extract. Move ca.crt and crl.pem to /etc/openvpn

Move "Hong Kong.ovpn" to "/etc/openvpn/Hong Kong.config" for example.

Modified the following lines.

auth-user-pass /etc/openvpn/login.conf route-up /etc/openvpn/
These are the contents of these files.

# cat /etc/openvpn/login.conf username password
Replace with your username and password.

# cat  #!/bin/bash
ip route flush table 100 ip route flush cache ip rule add from x.x.x.x table 100 ip route add table 100 to y.y.y.y/y dev ethX ip route add table 100 default via z.z.z.z
Replace x.x.x.x with your public IP address, y.y.y.y/y with your subnet. Compute using Hint: Input public IP and netmask, y…

aircrack-ng (rt2x00 Mac80211 Linux wireless stack) in Ubuntu Trusty 14.04 ( LTS

Ubuntu is actually installed in a Virtualbox virtual machine on Mac OS X Yosemite 10.10 (10.10.2). Before proceeding read the important intro below from
Install aircrack-ng suite.

$ sudo apt-get install aircrack-ng
It should install and provide the following.
# dpkg -s aircrack-ng Package: aircrack-ng Status: install ok installed Priority: optional Section: net Installed-Size: 2167 Maintainer: Ubuntu Developers Architecture: amd64 Version: 1:1.1-6 Depends: libc6 (>= 2.15), libgcrypt11 (>= 1.4.5), libsqlite3-0 (>= 3.5.9), zlib1g (>= 1:1.1.4), wireless-tools, iw Recommends: wget Description: wireless WEP/WPA cracking utilities  aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a  40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets  have been gathered. Also it can attack WPA1/2 networks with some advanced  methods or simply by brute force.  .  It implements the standard FMS attack alon…