home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.os.linux.mint      Looks pretty on the outside, thats it!      30,672 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 30,429 of 30,672   
   Axel to Paul   
   Re: Uh-Oh!..   
   12 Feb 26 16:08:42   
   
   From: none@not.here   
      
   Paul wrote:   
   > On Wed, 2/11/2026 12:31 AM, Axel wrote:   
   >> Lawrence D’Oliveiro wrote:   
   >>> On Wed, 11 Feb 2026 15:52:49 +1100, Axel wrote:   
   >>>   
   >>>> Asked Google, and AI said run "sudo grub-update" and reboot, which I   
   >>>> did. It produced this..  https://auslink.info/linux/panic.jpg   
   >>> Worth trying to see if SystemRescue can make any sense of it.   
   >>>   
   >>> Always keep a copy handy on a bootable USB stick.   
   >> so I downloaded the ISO and burnt it to a DVD on the main PC, and booted   
   the laptop from it, and I get this .. https://auslink.info/linux/security.jpg   
   >>   
   >     AI Overview   
   >   
   >     A "Security Boot Fail" or "Secure Boot Violation" error usually occurs   
   when the   
   >     system BIOS detects unauthorized changes to the boot loader, often   
   caused by   
   >     UEFI updates, new hardware, or booting from an unsigned USB drive. To   
   fix it,   
   >     enter the BIOS (usually F2, F12, or Del at startup), disable Secure Boot   
   in   
   >     the Boot/Security menu, or set BIOS to UEFI mode.   
   >   
   > Note that Ubuntu has screwed around with the UEFI materials in the BIOS.   
   > I noted what looked like some certificates added to my Big Machine by a   
   > Ubuntu install attempt. My BIOS offered an opportunity to connect a FAT32   
   > USB stick and "back up" the UEFI metadata, but I had neglected to do this   
   > before Ubuntu got in there. I can't say I am too happy about silent changes   
   > to the machine... I have still not managed to correct this. I put the BIOS   
   > in some sort of recovery mode and it still didn't clean house.   
   >   
   > *******   
   >   
   > Assuming you do enough about secure boot settings to allow some media to   
   boot,   
   > you can work on your boot problem of the original disk.   
   >   
   >    https://askubuntu.com/questions/41930/kernel-panic-not-sync   
   ng-vfs-unable-to-mount-root-fs-on-unknown-block0-0   
   >   
   >      "You are missing the initramfs for that kernel. Choose another kernel   
   from the   
   >       GRUB menu under Advanced options for Ubuntu and run   
   >   
   >          sudo update-initramfs -u -k version   
   >   
   >       to generate the initrd for version (replace version with the kernel   
   version string   
   >       such as   
   >   
   >          4.15.0-36-generic   
   >   
   >       ) then   
   >   
   >          sudo update-grub   
   >   
   >       it does have to do with the rootfs. The kernel can't mount the rootfs   
   because it   
   >       isn't configured correctly to do so. Instead it is assumed that the   
   kernel will   
   >       use an initramfs to mount the rootfs. In the days before initramfs,   
   you had to   
   >       configure the kernel to know a hard coded block number for the rootfs   
   to mount,   
   >       and this is the behavior it falls back to when it has no initramfs.   
   >      "   
   >   
   >      *****   
   >   
   >      "In my situation the problem was that /boot was at 100% capacity, so   
   the last   
   >       2 kernel updates had not completed successfully, hence on reboot when   
   GRUB2   
   >       selected the latest Kernel, it failed."   
   >   
   > At a time like this, starting using the Install Media in a Live Session,   
   > gives an opportunity to examine the partitions for fullness. You don't want   
   > to be attempting to repair something, without space to do the repair. I'm   
   more   
   > willing to believe this all started with a space problem, than something   
   else.   
   >   
   > ****************************   
   >   
   >      https://help.ubuntu.com/community/Boot-Repair   
   >   
   >         https://sourceforge.net/projects/boot-repair-cd/files/   
   >   
   >             boot-repair-disk-64bit.iso 	2023-12-23 	2.6 GB   
   >   
   > That's just the equivalent of a Live DVD plus the .ppa with the   
   > Boot Repair package in it. The ISO is convenient for a person with   
   > optical media capability, but you can also use your favorite ISO to USB   
   > stick utility to put that media on USB. I have both that particular   
   > version and a CD sized one (much older, not appropriate). So that   
   > tool is in my kit bag of odds and sods and I have used it, more than   
   > once (when lazy). I know how to chroot, as I was doing that back   
   > in Gentoo days.   
   >   
   > Sometimes, Boot Repair can do the thing itself, but just as often,   
   > it will tell you to open a Terminal and issue forth with text   
   > commands. Then, while you stare at those instructions, you think   
   > about whether the syntax looks reasonable, any disk identifiers   
   > are OK and so on.   
   >   
   > One of the rules of "boot repair", is ONLY the disk with the OS and   
   > the boot information should be present during the Repair. It does   
   > you no good, if the Boot Repair puts the starting materials   
   > on Disk 4, the OS is on Disk 1, Thursday morning you unplug   
   > Disk 4 and the thing gives another boot error scenario. You need   
   > simple setups, self contained ones, where boot materials are "next to"   
   > the OS. When I give you advice like this, my assumption is that the   
   > boot disk was *already* self contained and in perfect shape. Now   
   > is not the time to be introducing additional curve balls such   
   > as "I broke my boot" and "by the way, I never did this correctly   
   > in the first place". We call that a "double fault"! And that   
   > requires more cleverness and extra shoveling to escape.   
   >   
   >  From your Live Media, make sure you have enough space before you   
   > start the repair. Make sure. We don't want to turn this into a   
   > clown show, where you ask GOogle and it tells you to reinstall the OS :-)   
      
   I had already started a fresh install before i saw your comprehensive   
   post, thank you. it seemed the best option to avoid a possibly corrupted   
   system. thankfully all is working well now. btw.. this laptop has the   
   most rudimentary BIOS I have ever seen. there are very few settings, and   
   most cannot be changed. It has UEFI with secure boot, but there's no way   
   to disable SB.   
      
   >   
   >     Paul   
      
      
   --   
   Linux Mint 22.3   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca