<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux &#8211; bablick.de</title>
	<atom:link href="https://bablick.de/category/it/linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://bablick.de</link>
	<description>Writing About Clusters, Curiosity, and Everything in Between.</description>
	<lastBuildDate>Wed, 05 Nov 2025 04:40:24 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://bablick.de/wp-content/uploads/2025/08/cropped-BablickLogo-1-32x32.png</url>
	<title>Linux &#8211; bablick.de</title>
	<link>https://bablick.de</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Turn Your Supernote into a Knowledge Hub with Obsidian</title>
		<link>https://bablick.de/turn-your-supernote-into-a-knowledge-hub-with-obsidian/</link>
		
		<dc:creator><![CDATA[ernst.bablick]]></dc:creator>
		<pubDate>Sat, 20 Sep 2025 21:53:03 +0000</pubDate>
				<category><![CDATA[IT]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[E-Ink]]></category>
		<category><![CDATA[Obsidian]]></category>
		<category><![CDATA[Supernote]]></category>
		<guid isPermaLink="false">https://bablick.de/?p=110</guid>

					<description><![CDATA[There are several ways to install Obsidian on a Supernote Device. Below are the steps I successfully followed from my Linux notebook: Enable Sideloading on the Supernote Install Google Platform Tools on Your Computer Connect Your Computer and Supernote Install F-Droid Install the Aurora Store via F-Droid Install Obsidian from the Aurora Store Open the...]]></description>
										<content:encoded><![CDATA[
<p>There are several ways to install Obsidian on a <a href="https://supernote.com/pages/supernote-manta" data-type="link" data-id="https://supernote.com/pages/supernote-manta">Supernote Device</a>. Below are the steps I successfully followed from my Linux notebook:</p>



<h2 class="wp-block-heading">Enable Sideloading on the Supernote</h2>



<ul class="wp-block-list">
<li>Open <em>Settings</em> on your Supernote and go to <em>Security and Privacy</em>.</li>



<li>Enable <em>Sideloading</em> by switching the toggle.</li>
</ul>



<h2 class="wp-block-heading">Install Google Platform Tools on Your Computer</h2>



<ul class="wp-block-list">
<li>Download the <em><a href="https://developer.android.com/tools/releases/platform-tools">SDK Platform Tools</a></em>.</li>



<li>Install them on your machine. On Linux, the package includes an application named <code>adb</code>, which is required.</li>
</ul>



<h2 class="wp-block-heading">Connect Your Computer and Supernote</h2>



<ul class="wp-block-list">
<li>Connect your Supernote to your computer.</li>



<li>Run the following command to verify the connection</li>
</ul>



<pre class="wp-block-code"><code>adb devices</code></pre>



<h2 class="wp-block-heading">Install F-Droid</h2>



<ul class="wp-block-list">
<li><a href="https://f-droid.org/">F-Droid</a> is an app store for Android devices (including the Supernote).</li>



<li>Download the <code>fdroid.apk</code> file and scan it with your preferred antivirus tool (e.g., <a href="https://www.virustotal.com/gui/home/upload">VirusTotal</a>).</li>



<li>Once verified, upload the APK to your Supernote:</li>
</ul>



<pre class="wp-block-code"><code>adb install &lt;path&gt;/F-Droid.apk</code></pre>



<h2 class="wp-block-heading">Install the Aurora Store via F-Droid</h2>



<ul class="wp-block-list">
<li>On first launch, <em>F-Droid</em> may take a while to load available apps (requires Wi-Fi).</li>



<li>Search for <em>Aurora</em> and install the <em>Aurora Store</em>. The Aurora Store is an open-source client for <em>Google Play</em> with a clean design and privacy features.</li>
</ul>



<h2 class="wp-block-heading">Install Obsidian from the Aurora Store</h2>



<p>Open the <em>Aurora Store</em> and download <em>Obsidian</em> to your Supernote.</p>



<h2 class="wp-block-heading">Customize Obsidian Settings</h2>



<ul class="wp-block-list">
<li>On first launch, create a new vault or sync an existing one.</li>



<li>For appearance, I recommend installing the <em>Minimal theme</em> under <em>Appearance</em>.</li>



<li>The theme also has a companion plugin called <em>Minimal Theme Settings</em>.</li>



<li>Switch the color scheme to <em>E-Ink</em> for an excellent reading and writing experience on the Supernote.</li>
</ul>



<p>✨ That’s it! You now have Obsidian running on your Supernote, optimized for its e-ink display.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Automatically Create, Rotate and Destroy Periodic ZFS Snapshots</title>
		<link>https://bablick.de/automatically-create-rotate-and-destroy-periodic-zfs-snapshots/</link>
		
		<dc:creator><![CDATA[ernst.bablick]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 21:48:12 +0000</pubDate>
				<category><![CDATA[IT]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[ZFS]]></category>
		<category><![CDATA[ZFS-Snapshots]]></category>
		<guid isPermaLink="false">https://bablick.de/?p=91</guid>

					<description><![CDATA[The main reason for moving my home directories to a ZFS file system is ZFS&#8217;s support for snapshots. I have found them quite handy on server systems when something has been accidentally deleted, a software upgrade has failed, or software has not done what it promised. A simple rollback to a previous state can help...]]></description>
										<content:encoded><![CDATA[
<p>The main reason for moving my home directories to a ZFS file system is ZFS&#8217;s support for snapshots. I have found them quite handy on server systems when something has been accidentally deleted, a software upgrade has failed, or software has not done what it promised. A simple rollback to a previous state can help undo changes and allow you to continue safely. ZFS-Auto-Snapshot is a tool that uses cron to automatically create, rotate and destroy snapshots in the background.</p>



<h2 class="wp-block-heading">How To Do</h2>



<p>Install the zfs-auto-snapshot package</p>



<pre class="wp-block-code"><code>sudo apt install zfs-auto-snapshot</code></pre>



<p>On Ubuntu and Debian, cron scripts are already in place to trigger the script.</p>



<p>Enabling or disabling automatic snapshots for a specific ZFS is done via ZFS properties. This property is inherited by all descendant datasets, so there is no need to set it manually for each one.</p>



<pre class="wp-block-code"><code>sudo zfs set com.sun:auto-snapshot=true zhome/home</code></pre>



<p>You should also specify where you don&#8217;t want to see snapshots.</p>



<pre class="wp-block-code"><code>sudo zfs set com.sun:auto-snapshot=false zhome/home/tstusr1
sudo zfs set com.sun:auto-snapshot=false zhome/home/tstusr2</code></pre>



<p>You can enable or disable frequent (every 15 minutes), hourly, daily, weekly or monthly snapshots. They are all enabled by default, so the first snapshot should appear soon.</p>



<pre class="wp-block-code"><code>zfs set com.sun:auto-snapshot:frequent=false zhome/home/tstusr
zfs set com.sun:auto-snapshot:daily=true ...
zfs set com.sun:auto-snapshot:monthly=true ...
...</code></pre>



<p>The following commands are helpful for listing, creating and destroying snapshots:</p>



<pre class="wp-block-code"><code>zfs list -t snapshot

zfs snapshot -r zpool/foo/bar@name

zfs destroy zpool/foo/bar@name</code></pre>



<p>To restore to a certain snapshot, ZFS will roll back <strong>all</strong> the files and delete all the newer snapshots, so be careful!</p>



<pre class="wp-block-code"><code>zfs rollback zpool/foo/bar@name -r</code></pre>



<p>ZFS itself does not support deleting large numbers of snapshots, but this command comes in handy for that purpose.</p>



<pre class="wp-block-code"><code>sudo zfs list -H -o name -t snapshot zhome/somedir | xargs -n1 zfs destroy</code></pre>



<p>ZFS rollbacks are permanent. They recover everything from the snapshot. If you only want to recover some files or directories, ZFS does not support this directly. However, there is a workaround: Clone the snapshot to a different location and mount the clone. Restore the required files and then delete the clone.</p>



<pre class="wp-block-code"><code>sudo zfs clone zhome/home/ebablick@zfs-auto-snap_frequent-2025-08-25-1845 \
         -o mountpoint=/mnt zhome/ebablick_clone_of_snapshot_2025-08-25-1845

copy /mnt/... /to/...

sudo zfs destroy zhome/ebablick_clone_of_snapshot_2025-08-25-1845 -r</code></pre>



<p>Take a look at the zfs-auto-snapshot(8) manual page. The tool itself offers a few interesting options for executing pre- and post-snapshot commands. The number of snapshots to keep can also be configured via command line arguments, which then need to be adapted for the cron jobs.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Additional LUKS Encrypted Devices on Encryped Debian Trixie</title>
		<link>https://bablick.de/additional-luks-encrypted-devices-on-encryped-debian-trixie/</link>
		
		<dc:creator><![CDATA[ernst.bablick]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 13:15:11 +0000</pubDate>
				<category><![CDATA[IT]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[LUKS]]></category>
		<guid isPermaLink="false">https://bablick.de/?p=80</guid>

					<description><![CDATA[My notebook runs a fully encrypted version of Debian 13 (including the root filesystem and SWAP). Now it&#8217;s time to activate a second NVMe device. This should also be encrypted, but I don&#8217;t want to have to specify the passphrase for that device every time I reboot. Instead, the key file should be located on...]]></description>
										<content:encoded><![CDATA[
<p>My notebook runs a fully encrypted version of Debian 13 (including the root filesystem and SWAP). Now it&#8217;s time to activate a second NVMe device. This should also be encrypted, but I don&#8217;t want to have to specify the passphrase for that device every time I reboot. Instead, the key file should be located on the root partition of the first device.</p>



<h1 class="wp-block-heading">Setup Steps</h1>



<h2 class="wp-block-heading">Preparing the Device (Repartitioning)</h2>



<ul class="wp-block-list">
<li>The NVMe device name can change during a reboot of a Linux system. For example, what was previously <strong>/dev/nvme1n1</strong> could now be <strong>/dev/nvme0n1</strong>, or vice versa. The <strong>lsblk -f</strong> command is useful for distinguishing between devices that have already been used and those that have just been added.</li>
</ul>



<ul class="wp-block-list">
<li><strong>wipefs</strong> removes old partitions/signatures for a device</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo wipefs -a /dev/nvme1n1</strong>
/dev/nvme1n1: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/nvme1n1: 8 bytes were erased at offset 0xe8e0db5e00 (gpt): 45 46 49 20 50 41 52 54
/dev/nvme1n1: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/nvme1n1: calling ioctl to re-read partition table: Success</code></pre>



<ul class="wp-block-list">
<li>Although there are other tools that can manipulate partition tables, I still use <strong>fdisk</strong> to create a single large partition on the disk. The <strong>fdisk</strong> suggestions help to create a partition with the correct alignment, which prevents performance issues or error messages in the subsequent steps. The (g) command creates a new GPT. (p) prints the partition table. (n) triggers the creation of a new partition. (t) allows you to specify a partition type, and (w) makes the data persistent by writing the information to the disk.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo fdisk /dev/nvme1n1</strong>
Command (m for help): <strong>g</strong>
Created a new GPT disklabel (GUID: AC0EB50D-4E46-46C7-892D-BEE19E49E76F).

Command (m for help): <strong>p</strong>
Disk /dev/nvme1n1: 931,51 GiB, 1000204886016 bytes, 1953525168 sectors
Disk model: Samsung SSD 990 EVO 1TB                 
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: AC0EB50D-4E46-46C7-892D-BEE19E49E76F

Command (m for help): <strong>n</strong>
Partition number (1-128, default 1):
Partition number (1-128, default 1): 
First sector (2048-1953525134, default 2048): 
Last sector, +/-sectors or +/-size{K,M,G,T,P} (2048-1953525134, default 1953523711): 
Created a new partition 1 of type 'Linux filesystem' and of size 931,5 GiB.

Command (m for help): <strong>p</strong>
Disk /dev/nvme1n1: 931,51 GiB, 1000204886016 bytes, 1953525168 sectors
Disk model: Samsung SSD 990 EVO 1TB                 
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: AC0EB50D-4E46-46C7-892D-BEE19E49E76F
Device         Start        End    Sectors   Size Type
/dev/nvme1n1p1  2048 1953523711 1953521664 931,5G Linux filesystem

Command (m for help): <strong>w</strong>
The partition table has been altered.
Calling ioctl() to re-read partition table.
Syncing disks.</code></pre>



<h2 class="wp-block-heading">Encryption with LUKS/LUKS2</h2>



<ul class="wp-block-list">
<li>The new partition should be LUKS-encrypted. Rather than using device names such as /dev/nvme…, I would like to identify the partition by a UUID. To this end, I will generate a new ID with <strong>uuidgen</strong> to pass to <strong>cryptsetup</strong>. The passphrase for the encryption must be specified, and <strong>lsblk</strong> can be used to verify the result.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>uuidgen</strong>
168b9568-0540-40b8-b939-882be97eb6bb

<strong>cryptsetup luksFormat -q --type luks --sector-size 4096 --cipher aes-xts-plain64 --key-size 256 --uuid 168b9568-0540-40b8-b939-882be97eb6bb --pbkdf argon2i /dev/nvme1n1p1</strong>

<strong>lsblk -f</strong>
...</code></pre>



<ul class="wp-block-list">
<li>The partition can now be opened. I chose the <strong>/dev/disk/by-uuid/…</strong> path for the device, and the device name will also later be available by the name <strong>UUID</strong>, prefixed by &#8216;<strong>luks-</strong>&#8216;, as with the other partitions initially created by the Debian installer. The <strong>ls</strong> command on <strong>/dev/mapper</strong> shows that the partition is available after entering the correct passphrase.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo cryptsetup luksOpen --persistent --allow-discards --perf-no_write_workqueue --perf-no_read_workqueue /dev/disk/by-uuid/168b9568-0540-40b8-b939-882be97eb6bb luks-168b9568-0540-40b8-b939-882be97eb6bb</strong>
Enter passphrase for /dev/disk/by-uuid/168b9568-0540-40b8-b939-882be97eb6bb:

<strong>ls -la /dev/mapper/</strong>
...
lrwxrwxrwx  1 root root       7 24. Aug 00:56 luks-168b9568-0540-40b8-b939-882be97eb6bb -&gt; ../dm-2
</code></pre>



<h2 class="wp-block-heading">Opening/Mounting the Device</h2>



<ul class="wp-block-list">
<li>Once a partition has been encrypted, it must be activated/opened during the boot process so that it can be used. For the root partition and SWAP of a Debian system, this is done early by GRUB, even before the OS is running. For other partitions, such as our new one, <strong>systemd</strong> will perform this task. This step must be enabled by installing the necessary package.</li>
</ul>



<pre class="wp-block-code"><code><strong>sudo apt install systemd-cryptsetup</strong></code></pre>



<ul class="wp-block-list">
<li>Systemd also asks for a passphrase during the boot process, but I want a separate key file that <strong>systemd</strong> can automatically use to open the encrypted device.</li>



<li><strong>dd</strong> creates a key file containing random data. Access permissions for this file are restricted using the <strong>chmod</strong> command. The key is then added to the list of authorized keys that can access the device, which requires entering the initial passphrase. Finally, the status is dumped so that it can be verified.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo dd if=/dev/urandom of=/crypto_keyfile_home.bin bs=512 count=8</strong>
<strong>
sudo chmod 600 /crypto_keyfile_home.bin</strong>
<strong>
sudo cryptsetup luksAddKey /dev/nvme1n1p1 /crypto_keyfile_home.bin</strong>
<strong>
sudo cryptsetup luksDump /dev/nvme1n1p1</strong></code></pre>



<ul class="wp-block-list">
<li>In order for <strong>systemd</strong> to recognize the new device, the <strong>/etc/crypttab</strong> file must be updated with a new entry (in one line).</li>
</ul>



<pre class="wp-block-code" style="font-size:13px"><code><strong>sudo vi /etc/crypttab</strong>
...
luks-168b9568-0540-40b8-b939-882be97eb6bb UUID=168b9568-0540-40b8-b939-882be97eb6bb	/crypto_keyfile_home.bin luks,discard,keyscript=/bin/cat</code></pre>



<ul class="wp-block-list">
<li>After rebooting, the <strong>ls</strong> command should show that all three encrypted devices are ready.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>ls -la /dev/mapper/</strong>
....
lrwxrwxrwx  1 root root       7 23. Aug 16:29 luks-011bd881-8ec3-4a12-91df-52e1928539fb -&gt; ../dm-1
lrwxrwxrwx  1 root root       7 24. Aug 00:56 luks-168b9568-0540-40b8-b939-882be97eb6bb -&gt; ../dm-2
lrwxrwxrwx  1 root root       7 23. Aug 16:29 luks-45cabb59-0bb5-4737-b6c9-6007657d7a27 -&gt; ../dm-0</code></pre>



<ul class="wp-block-list">
<li>The device can now be formatted and mounted …</li>
</ul>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hibernation with Debian 13 Trixie on TUXEDO Stellaris 17</title>
		<link>https://bablick.de/hibernation-with-debian-13-trixie-on-tuxedo-stellaris-17/</link>
		
		<dc:creator><![CDATA[ernst.bablick]]></dc:creator>
		<pubDate>Sun, 11 Aug 2024 21:44:10 +0000</pubDate>
				<category><![CDATA[IT]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[Hibernate]]></category>
		<category><![CDATA[Suspend]]></category>
		<category><![CDATA[SuspendToDisk]]></category>
		<category><![CDATA[Tuxedo]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<guid isPermaLink="false">https://bablick.de/?p=35</guid>

					<description><![CDATA[Since more than a year I use the TUXEDO Stellaris 17 Intel Gen6 Notebook for daily development. Ubuntu 24.04 is working there quite well. Thanks to TUXEDO, the hardware support if great but one thing what made me cringe was the lack of hibernation support and sporadic wake-ups can be frustrating and dangerous if the...]]></description>
										<content:encoded><![CDATA[
<p>Since more than a year I use the <a href="https://www.tuxedocomputers.com/en/TUXEDO-Stellaris-17-Gen6.tuxedo">TUXEDO Stellaris 17 Intel Gen6 Notebook</a> for daily development.</p>



<p>Ubuntu 24.04 is working there quite well. Thanks to TUXEDO, the hardware support if great but one thing what made me cringe was the lack of hibernation support and sporadic wake-ups can be frustrating and dangerous if the notebook should sleep in the bag when you are on the go.</p>



<p>The default Ubuntu 24.04 (and also TUXEDO&#8217;s adapted <a href="https://www.tuxedocomputers.com/en/TUXEDO-OS_1.tuxedo">TUXEDO OS</a>) does not setup a SWAP partition of the correct size which makes hibernation impossible. Even if you do this setup yourself you will find out that modes like SuspendThenHibernate will cause the system never to hibernate due to the unnecessary wake-up calls.</p>



<p>The frustration with hibernation was the main reason to give <a href="https://www.debian.org/devel/debian-installer/index.de.html">Debian 13 Trixie</a> a try to find out if this distributions also has such issues.</p>



<h1 class="wp-block-heading">Necessary Steps</h1>



<p>I can already summarize that not only was the default installation a success, but hibernation also works perfectly. Minor configuration steps were necessary on Debian 13 Trixie.</p>



<ul class="wp-block-list">
<li>The default installation on NVMe was problem-free. Debian supports LUKS encryption of partitions, including the SWAP partition, which contains the complete extract of the working memory in hibernation mode.</li>



<li>The SWAP partition automatically has the size of the RAM—more precisely, it is even slightly larger so that the contents of the RAM still fit in the partition despite the LUKS header. A manual hibernation test after installation confirmed that hibernation is working.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo systemctl hibernate</strong></code></pre>



<ul class="wp-block-list">
<li>After restarting the notebook, the system wakes up again, asks for the encryption password, boots Linux, and continues where it left off.</li>



<li>The file <strong>/etc/systemd/sleep.conf</strong> contains the default settings for <strong>systemd</strong>, which is responsible for suspend and hibernate. I have adjusted the settings slightly to suit my needs:</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo vi /etc/systemd/sleep.conf</strong>

&#91;Sleep]
AllowSuspend=yes
AllowHibernation=yes
AllowSuspendThenHibernate=yes
AllowHybridSleep=yes
#SuspendState=mem standby freeze
#HibernateMode=platform shutdown
#MemorySleepMode=
HibernateDelaySec=30m
HibernateOnACPower=yes
#SuspendEstimationSec=60min</code></pre>



<ul class="wp-block-list">
<li>In particular, the <strong><a href="https://manpages.debian.org/unstable/systemd/systemd-sleep.conf.5.en.html">HibernateDelaySec</a></strong> is set to <strong>30m</strong>. In combination with my Gnome settings, this means that Gnome dims the screen after 10 minutes. After 15 minutes, the notebook is suspended for 30 minutes. During this time, touching the touch pad or pressing a key is enough to wake it up, but if you don&#8217;t do this, the notebook wakes up on its own after the time has elapsed, only to hibernate.</li>



<li>The Gnome shutdown menu does not yet include the option to trigger &#8216;hibernate&#8217;, &#8216;suspend then hibernate&#8217;, or &#8216;hybrid sleep&#8217; from the graphical user interface. However, this can be quickly remedied with a Gnome shell extension called <strong><a href="https://extensions.gnome.org/extension/755/hibernate-status-button/">Hibernate Status Button</a></strong>.</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><a href="https://extensions.gnome.org/extension/755/hibernate-status-button/"><img alt="Hibernate Status Button Dialog" fetchpriority="high" decoding="async" width="609" height="1024" src="https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton-609x1024.png" alt="" class="wp-image-52" style="width:362px;height:auto" srcset="https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton-609x1024.png 609w, https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton-178x300.png 178w, https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton-768x1292.png 768w, https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton-913x1536.png 913w, https://bablick.de/wp-content/uploads/2024/08/HibernateStatusButton.png 1064w" sizes="(max-width: 609px) 100vw, 609px" /></a></figure></div>


<ul class="wp-block-list">
<li>If you&#8217;re wondering what <strong>hybrid</strong> means: In this mode, the memory dump is written before the notebook is suspended and is available when a reboot is required, for example, if the battery runs out during sleep mode.</li>



<li>When you close the lid of a laptop, Debian Trixie automatically puts the laptop into sleep mode. If you would prefer something else to be triggered instead, this can be changed in <strong>/etc/systemd/logind.conf</strong>.</li>
</ul>



<pre class="wp-block-code has-small-font-size"><code><strong>sudo vi /etc/systemd/logind.conf</strong>

HandleLidSwitch=suspend-then-hibernate
HandleLidSwitchExternalPower=suspend-then-hibernate
...</code></pre>



<p></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
