home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.os.linux.mint      Looks pretty on the outside, thats it!      30,566 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 30,415 of 30,566   
   Paul to Axel   
   Re: Uh-Oh!..   
   11 Feb 26 01:17:16   
   
   From: nospam@needed.invalid   
      
   On Wed, 2/11/2026 12:31 AM, Axel wrote:   
   > Lawrence D’Oliveiro wrote:   
   >> On Wed, 11 Feb 2026 15:52:49 +1100, Axel wrote:   
   >>   
   >>> Asked Google, and AI said run "sudo grub-update" and reboot, which I   
   >>> did. It produced this..  https://auslink.info/linux/panic.jpg   
   >> Worth trying to see if SystemRescue can make any sense of it.   
   >>   
   >> Always keep a copy handy on a bootable USB stick.   
   >   
   > so I downloaded the ISO and burnt it to a DVD on the main PC, and booted the   
   laptop from it, and I get this .. https://auslink.info/linux/security.jpg   
   >   
      
      AI Overview   
      
      A "Security Boot Fail" or "Secure Boot Violation" error usually occurs when   
   the   
      system BIOS detects unauthorized changes to the boot loader, often caused by   
      UEFI updates, new hardware, or booting from an unsigned USB drive. To fix   
   it,   
      enter the BIOS (usually F2, F12, or Del at startup), disable Secure Boot in   
      the Boot/Security menu, or set BIOS to UEFI mode.   
      
   Note that Ubuntu has screwed around with the UEFI materials in the BIOS.   
   I noted what looked like some certificates added to my Big Machine by a   
   Ubuntu install attempt. My BIOS offered an opportunity to connect a FAT32   
   USB stick and "back up" the UEFI metadata, but I had neglected to do this   
   before Ubuntu got in there. I can't say I am too happy about silent changes   
   to the machine... I have still not managed to correct this. I put the BIOS   
   in some sort of recovery mode and it still didn't clean house.   
      
   *******   
      
   Assuming you do enough about secure boot settings to allow some media to boot,   
   you can work on your boot problem of the original disk.   
      
     https://askubuntu.com/questions/41930/kernel-panic-not-syncing   
   vfs-unable-to-mount-root-fs-on-unknown-block0-0   
      
       "You are missing the initramfs for that kernel. Choose another kernel from   
   the   
        GRUB menu under Advanced options for Ubuntu and run   
      
           sudo update-initramfs -u -k version   
      
        to generate the initrd for version (replace version with the kernel   
   version string   
        such as   
      
           4.15.0-36-generic   
      
        ) then   
      
           sudo update-grub   
      
        it does have to do with the rootfs. The kernel can't mount the rootfs   
   because it   
        isn't configured correctly to do so. Instead it is assumed that the   
   kernel will   
        use an initramfs to mount the rootfs. In the days before initramfs, you   
   had to   
        configure the kernel to know a hard coded block number for the rootfs to   
   mount,   
        and this is the behavior it falls back to when it has no initramfs.   
       "   
      
       *****   
      
       "In my situation the problem was that /boot was at 100% capacity, so the   
   last   
        2 kernel updates had not completed successfully, hence on reboot when   
   GRUB2   
        selected the latest Kernel, it failed."   
      
   At a time like this, starting using the Install Media in a Live Session,   
   gives an opportunity to examine the partitions for fullness. You don't want   
   to be attempting to repair something, without space to do the repair. I'm more   
   willing to believe this all started with a space problem, than something else.   
      
   ****************************   
      
       https://help.ubuntu.com/community/Boot-Repair   
      
          https://sourceforge.net/projects/boot-repair-cd/files/   
      
              boot-repair-disk-64bit.iso 	2023-12-23 	2.6 GB   
      
   That's just the equivalent of a Live DVD plus the .ppa with the   
   Boot Repair package in it. The ISO is convenient for a person with   
   optical media capability, but you can also use your favorite ISO to USB   
   stick utility to put that media on USB. I have both that particular   
   version and a CD sized one (much older, not appropriate). So that   
   tool is in my kit bag of odds and sods and I have used it, more than   
   once (when lazy). I know how to chroot, as I was doing that back   
   in Gentoo days.   
      
   Sometimes, Boot Repair can do the thing itself, but just as often,   
   it will tell you to open a Terminal and issue forth with text   
   commands. Then, while you stare at those instructions, you think   
   about whether the syntax looks reasonable, any disk identifiers   
   are OK and so on.   
      
   One of the rules of "boot repair", is ONLY the disk with the OS and   
   the boot information should be present during the Repair. It does   
   you no good, if the Boot Repair puts the starting materials   
   on Disk 4, the OS is on Disk 1, Thursday morning you unplug   
   Disk 4 and the thing gives another boot error scenario. You need   
   simple setups, self contained ones, where boot materials are "next to"   
   the OS. When I give you advice like this, my assumption is that the   
   boot disk was *already* self contained and in perfect shape. Now   
   is not the time to be introducing additional curve balls such   
   as "I broke my boot" and "by the way, I never did this correctly   
   in the first place". We call that a "double fault"! And that   
   requires more cleverness and extra shoveling to escape.   
      
   From your Live Media, make sure you have enough space before you   
   start the repair. Make sure. We don't want to turn this into a   
   clown show, where you ask GOogle and it tells you to reinstall the OS :-)   
      
      Paul   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca