[arch-general] busted system after update
hi folks i could use a little push in the right direction. i run arch on a 2013 macbook air. i am running an LVM on LUKS system. after updating my system via "sudo pacman -Syu" i am locked out of my machine. on a subsequent boot i get the message: "ERROR: device '/dev/mapper/vgcrypt-root' not found, skipping fsck." "mount: /new_root: no filesystem type specified." "You are now being dropped into an emergency shell." and so i am. i was able to use a debian live usb to drop into debian's rescue mode and execute a shell in my decrypted root. i see that mkinitcpio.conf is missing several hooks, like encrypt and lvm2! what the what?! i pacman.log i notice that mkinitcpio was updated to version 29-1 when i did my previous pacman update. is it possible that the update to mkinitcpio just silently hosed my previous configuration?! my plan is to add the required hooks to mkinitcpio.conf and then rebuild. does that seem like the right plan? and will mkinitcpio build an initramfs successfully from the debian chroot into my disk? thanks for the time ------------------------------------------------- This free account was provided by VFEmail.net - report spam to abuse@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options!
On Mon, 16 Nov 2020 18:32:01 +0000, winstonsmith wrote:
hi folks i could use a little push in the right direction.
ok never mind i got it sorted. seems my mkinitcpio.conf got replaced with a new version which did not include the encrypt or lvm2 hooks that my setup requires. isn't that sort of thing supposed to be handled by pacnew files? i suppose there is a chance that i blindly replaced the conf file myself with the pacnew, whatever i coulda been tired...but i am usually careful about these things. anyway i fixed it by booting an arch install iso, opening my luks encrypted device, mounted the partitions, chroot'ed into root and tweaked mkinitcpio.conf, then ran: # mkinitcpio -p linux all sorted, thought i'd follow up for someone else's benefit in case it wasn't my error that replaced mkinitcpio.conf in the first place. ------------------------------------------------- This free account was provided by VFEmail.net - report spam to abuse@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options!
Many of use have been there! Earlier this year I overwrote /etc/shadow with pacnew in a moment of madness.
On one LVM on LUKS system I always enter an emergency shell upon boot and need to do "mount /dev/mapper/cryptolvm_root /new_root" - never got round to correcting the grub2.cfg..... On Mon, 16 Nov 2020 at 21:10, Ben Oliver via arch-general <arch-general@archlinux.org> wrote:
Many of use have been there! Earlier this year I overwrote /etc/shadow with pacnew in a moment of madness.
Winston Smith <winstonsmith@vfemail.net> wrote:
On Mon, 16 Nov 2020 18:32:01 +0000, winstonsmith wrote:
hi folks i could use a little push in the right direction.
ok never mind i got it sorted.
seems my mkinitcpio.conf got replaced with a new version which did not include the encrypt or lvm2 hooks that my setup requires.
isn't that sort of thing supposed to be handled by pacnew files? i suppose there is a chance that i blindly replaced the conf file myself with the pacnew, whatever i coulda been tired...but i am usually careful about these things.
anyway i fixed it by booting an arch install iso, opening my luks encrypted device, mounted the partitions, chroot'ed into root and tweaked mkinitcpio.conf, then ran:
# mkinitcpio -p linux
all sorted, thought i'd follow up for someone else's benefit in case it wasn't my error that replaced mkinitcpio.conf in the first place.
I think it was not your error: $ pacman -Qii mkinitcpio | tail -3 Backup Files : UNMODIFIED /etc/mkinitcpio.conf In general, one might want to create a customized /etc/mkinitcpio.d/ones.conf, and set /etc/mkinitcpio.d/linux.preset to use it. I hope I didn't forgot something important here. -- u34
------------------------------------------------- This free account was provided by VFEmail.net - report spam to abuse@vfemail.net
ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options!
participants (5)
-
Ben Oliver
-
NTS
-
u34@net9.ga
-
Winston Smith
-
winstonsmith@vfemail.net