Am Dienstag, 23. April 2024, 22:26:17 CEST schrieb Richard:
Hi Richard,

this is, what I am doing when this happens:

1. booting into a live system (any new is working, I prefer kali-linux)

2. If you are using encrypted filesystems, open it. But you have to name it 
like it is named in /
etc/crypttab of the defective system

3. Now mount the device with root-filesystem to /mnt 

4. If you have /boot as a separated partition, mount it to /mnt/boot

5. Now mount needed system directories to /mnt
        mount --bind /sys /mnt/sys
        mount --bind /proc /mnt/proc
        mount --bind /dev /mnt/dev

6. If everything is mounted correct, you can chroot into the mounted system
        chroot /mnt

7. Now you can create a new initrd
        update-initramfs -u
 
8. exit the chroot and reboot.


--------------------


Note:

1. if you have encrypted filesystems, check in the chroot the files

/etc/crypttab
/etc/cryptsetup-initramfs/conf-hook 

In conf-hook check the last line, the parm "ASKPASS=Y" should be commented out.

2. You can check the UUID of every partition with the command
        blkid /dev/sda1 
and compare it with the entries in /etc/fstab, /etc/crypttab and everywhere 
else it is used.

3. In chroot, you can of course also create a new initrd, using 
        update-initramfs -c -k all

4. Please remember, when you have encrypted partitions, then the UUID of the 
device is other, 
than the partitions, you later mount. Example:

blkid /dev/sda3
UUID=1234556-dfre-3456.............

Now
cryptsetup luksOpen /dev/sda3 crypt_sda3
blkid /dev/mapper/crypt_sda3
UUID=9876g54-765g-87hg............

Watch this, when changing any UUIDs in /etc/fstab or anywhere else.

Last but not least: Hope this helps, good luck!

Best

Hans

   

Reply via email to