#1 Le 26/04/2020, à 21:19
- Vertsaxo
supprimer chiffrement global avant mise à jour version
Bonjour,
je voudrais passer à la nouvelle version LTS d'Ubuntu, je suis pour le moment sur la version LTS précédente, 18.4.
j'avais installé avec chiffrement et par précaution j'aurai voulu supprimer le chiffrement avant de faire la mise à jour
et je n'ai aucune idée comment procéder, je ne trouve rien qui m'éclaire.
cordialement
Vert saxo
Hors ligne
#2 Le 26/04/2020, à 21:45
- geole
Re : supprimer chiffrement global avant mise à jour version
Bonsoir.
Tu es en version 18.04 encore maintenue 3 ans. Continue de faire sa mise â jour. Tout ira bien.
Dans deux ans, tu pourras installer la 22.04 â coté. Tu en profiteras pour ne pas chiffrer le logiciel
.
Si tu ne veux plus chiffrer tes données, fabrique une nouvelle partition et fais les transferts des répertoires de données.
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#3 Le 27/04/2020, à 15:33
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour et merci géole pour cette réponse
en fait je voulais mettre à jour pour deux raisons :
mon épouse va acheter un portable sur lequel je voudrais la convaincre d'installer ubuntu plutôt que windows et j'aurai voulu lui montrer le dernier système en date
- cela fait des mois que j'ai un dysfonctionnement avec Ubuntu 18.4 : je suis obligé de passer par le bios à chaque démarrage sinon il ne démarre pas. en activant un réparateur, il me signale le chiffrement et me demande si je veux postposer la réparation pour d'abord désactiver le chiffrement donc je me dis que cela fait sens.
cordialement
Vertsaxo
Hors ligne
#4 Le 27/04/2020, à 15:55
- geole
Re : supprimer chiffrement global avant mise à jour version
Bonjour
Tu peux toujours faire un boot-info. Quelquefois on voit des anomalies.
Cela serait bien que tu donnes le nom du "réparateur " et la phrase exacte de son conseil.
Si tu évoques boot-repair/boot-info , afin d'accéder à la partition, il doit te demander de monter la partition à sa place car il ne connaît pas la phrase d'ouverture pour lire le contenu. Mais cela ne doit pas être une raison pour ne pas chiffrer si tu as trouvé que cela était nécessaire.
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#5 Le 28/04/2020, à 11:06
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
il s'agissait bien de boot-repair
voici le message :
"Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?"
je voulais déchiffrer avant de réparer puis rechiffrer après...
voici le lien vers mes info de boot :
http://paste.ubuntu.com/p/C4wVWBJ8nZ/
cordialement,
VertSaxo
Hors ligne
#6 Le 28/04/2020, à 11:52
- geole
Re : supprimer chiffrement global avant mise à jour version
Bonjour
Effectivement le message est aussi visible dans boot-info
=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?
Je vais tenter de demander à l'auteur de voir s'il ne serait pas possible de changer la traduction. Je pense à une phrase de ce style
=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir monté vos partitions chiffrées afin que l'outil puisse examiner leur contenu. ([url]http://doc.ubuntu-fr.org/ecryptfs[/url]
Voulez-vous continuer ?)
En fait, comme c'est chiffré, il est impossible de voir le contenu de certaines zones et surtout boot-repair n'a pas la possibilité de modifier certains fichiers. Je pense notamment au fichier /etc/fstab qui doit souvent être rectifié.
Pour le boot-info, on a souvent besoin de voir le contenu de /etc/fstab lorsque le boot dure plus de 1 minutes 30 secondes afin de s'assurer qu'il n'est pas prévu le montage de partitions inexistantes ou un mauvais montage de partitions existantes.
Donc soit rassuré.
Cependant, il me semble souvent inutile de chiffrer le logiciel mais seulement les données personnelles. Cela donne le risque de retrouver des données personnelles totalement visibles dans le fichier de swap pour des experts ainsi que dans les plantages de l'O.S. communiqués aux experts ou certains extraits d'O.S. donc une sécurité au rabais probablement à 99,9999999% donc acceptable pour pas mal de personnes
a@a:~$ sudo blkid | grep LUK
/dev/sda18: UUID="f3b2bb4d-f5f1-4963-984b-684cb7feb5b0" TYPE="crypto_LUKS" PARTLABEL="sda27_crypt" PARTUUID="4890dbb2-cf70-4307-9422-73d7ffbc2886"
/dev/sda19: UUID="16f1cc0a-2cc5-4ed6-893d-f233cf283821" TYPE="crypto_LUKS" PARTLABEL="sda28_crypt" PARTUUID="2c98f23a-d74f-4ddb-8332-b1be866d0c8c"
a@a:~$
Une suggestion: Libère 15 Go (30 Go c'est mieux) d'espace disque et installe ubuntu 20.04 en dual boot de façon standard à coté , puis tu installeras ecryptfs pour accéder aux données avec un montage automatique et des liens pour y accéder automatiquement. Cela te permettra d'avoir une partition de données chiffrées indépendante qui récupérera un peu de place lorsque tu élimineras le logiciel de la version 18.04
Dernière modification par geole (Le 28/04/2020, à 12:17)
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#7 Le 28/04/2020, à 12:06
- malbo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
Je colle ci-dessous le contenu du Boot-info dont tu as donné le lien dans le post #5 :
Boot Info Script 71f6c5c + Boot-Repair extra info [Boot-Info 16mar2020]
============================= Boot Info Summary: ===============================
=> No boot loader is installed in the MBR of /dev/sda.
sda1: __________________________________________________________________________
File system: vfat
Boot sector type: FAT32
Boot sector info: No errors found in the Boot Parameter Block.
Operating System:
Boot files:
sda2: __________________________________________________________________________
File system: ext4
Boot sector type: -
Boot sector info:
Operating System:
Boot files: /grub/grub.cfg
sda3: __________________________________________________________________________
File system: crypto_LUKS
Boot sector type: Unknown
Boot sector info:
============================ Drive/Partition Info: =============================
Drive: sda _____________________________________________________________________
Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Partition Boot Start Sector End Sector # of Sectors Id System
/dev/sda1 1 976,773,167 976,773,167 ee GPT
GUID Partition Table detected.
Partition Attrs Start Sector End Sector # of Sectors System
/dev/sda1 2,048 1,050,623 1,048,576 EFI System partition
/dev/sda2 1,050,624 2,549,759 1,499,136 Data partition (Linux)
/dev/sda3 2,549,760 976,771,071 974,221,312 Data partition (Linux)
Attributes: R=Required, N=No Block IO, B=Legacy BIOS Bootable, +=More bits set
"blkid" output: ________________________________________________________________
Device UUID TYPE LABEL
/dev/loop0 squashfs
/dev/loop1 squashfs
/dev/loop10 squashfs
/dev/loop11 squashfs
/dev/loop12 squashfs
/dev/loop13 squashfs
/dev/loop14 squashfs
/dev/loop15 squashfs
/dev/loop16 squashfs
/dev/loop17 squashfs
/dev/loop18 squashfs
/dev/loop19 squashfs
/dev/loop2 squashfs
/dev/loop20 squashfs
/dev/loop21 squashfs
/dev/loop22 squashfs
/dev/loop3 squashfs
/dev/loop4 squashfs
/dev/loop5 squashfs
/dev/loop6 squashfs
/dev/loop7 squashfs
/dev/loop8 squashfs
/dev/loop9 squashfs
/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e ext4
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140 swap
/dev/sda1 5BC2-2AC0 vfat
/dev/sda2 7f24874a-5e0c-45c5-90b4-ada2b13f0994 ext4
/dev/sda3 5ca0f027-1720-413b-a9b8-3712a9a4457a crypto_LUKS
========================= "ls -l /dev/disk/by-id" output: ======================
total 0
lrwxrwxrwx 1 root root 9 Apr 28 10:56 ata-ASUS_DRW-2014S1T -> ../../sr0
lrwxrwxrwx 1 root root 9 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X -> ../../sda
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part2 -> ../../sda2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part3 -> ../../sda3
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-sda3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-ubuntu--vg-root -> ../../dm-1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-ubuntu--vg-swap_1 -> ../../dm-2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-CRYPT-LUKS1-5ca0f0271720413ba9b83712a9a4457a-sda3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJ4b3C7hyZmOZnUZRlz5GMw9hqGy1yqOfe -> ../../dm-1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJJIIqpN1oepBNCcd01TVe2YIDJyqGUazS -> ../../dm-2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 lvm-pv-uuid-9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y -> ../../dm-0
lrwxrwxrwx 1 root root 9 Apr 28 11:30 wwn-0x5002538e40ee83f6 -> ../../sda
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part2 -> ../../sda2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part3 -> ../../sda3
========================= "ls -R /dev/mapper/" output: =========================
/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1
================================ Mount points: =================================
Device Mount_Point Type Options
/dev/mapper/ubuntu--vg-root / ext4 (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda1 /boot/efi vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sda2 /boot ext4 (rw,relatime,data=ordered)
============================= sda2/grub/grub.cfg: ==============================
--------------------------------------------------------------------------------
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
set have_grubenv=true
load_env
fi
if [ "${next_entry}" ] ; then
set default="${next_entry}"
set next_entry=
save_env next_entry
set boot_once=true
else
set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
menuentry_id_option="--id"
else
menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
set saved_entry="${prev_saved_entry}"
save_env saved_entry
set prev_saved_entry=
save_env prev_saved_entry
set boot_once=true
fi
function savedefault {
if [ -z "${boot_once}" ]; then
saved_entry="${chosen}"
save_env saved_entry
fi
}
function recordfail {
set recordfail=1
if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
if [ x$feature_all_video_module = xy ]; then
insmod all_video
else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
fi
}
if [ x$feature_default_font_path = xy ] ; then
font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
font="/grub/unicode.pf2"
fi
if loadfont $font ; then
set gfxmode=auto
load_video
insmod gfxterm
set locale_dir=$prefix/locale
set lang=fr_FR
insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
set timeout=30
else
if [ x$feature_timeout_style = xy ] ; then
set timeout_style=hidden
set timeout=10
# Fallback hidden-timeout code in case the timeout_style feature is
# unavailable.
elif sleep --interruptible 10 ; then
set timeout=0
fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
clear
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
set gfxpayload="${1}"
if [ "${1}" = "keep" ]; then
set vt_handoff=vt.handoff=1
else
set vt_handoff=
fi
}
if [ "${recordfail}" != 1 ]; then
if [ -e ${prefix}/gfxblacklist.txt ]; then
if hwmatch ${prefix}/gfxblacklist.txt 3; then
if [ ${match} = 0 ]; then
set linux_gfx_mode=keep
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=keep
fi
else
set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
initrd /initrd.img-4.15.0-96-generic
}
submenu 'Options avancées pour Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
menuentry 'Ubuntu, avec Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Chargement de Linux 4.15.0-96-generic…'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Chargement du disque mémoire initial…'
initrd /initrd.img-4.15.0-96-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Chargement de Linux 4.15.0-96-generic…'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Chargement du disque mémoire initial…'
initrd /initrd.img-4.15.0-96-generic
}
menuentry 'Ubuntu, avec Linux 4.15.0-91-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-91-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Chargement de Linux 4.15.0-91-generic…'
linux /vmlinuz-4.15.0-91-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Chargement du disque mémoire initial…'
initrd /initrd.img-4.15.0-91-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-91-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-91-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Chargement de Linux 4.15.0-91-generic…'
linux /vmlinuz-4.15.0-91-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Chargement du disque mémoire initial…'
initrd /initrd.img-4.15.0-91-generic
}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/25_custom ###
menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}
menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}
menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}
menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}
menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}
menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}
menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}
menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###
### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries. Simply type the
# menu entries you want to add after this comment. Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f ${config_directory}/custom.cfg ]; then
source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f $prefix/custom.cfg ]; then
source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###
--------------------------------------------------------------------------------
=================== sda2: Location of files loaded by Grub: ====================
GiB - GB File Fragment(s)
0.667018890 = 0.716206080 grub/grub.cfg 3
0.676742554 = 0.726646784 vmlinuz-4.15.0-91-generic 1
0.840801239 = 0.902803456 vmlinuz-4.15.0-96-generic 2
0.993160248 = 1.066397696 initrd.img-4.15.0-91-generic 4
0.946285248 = 1.016066048 initrd.img-4.15.0-96-generic 3
======================== Unknown MBRs/Boot Sectors/etc: ========================
Unknown BootLoader on sda3
00000000 4c 55 4b 53 ba be 00 01 61 65 73 00 00 00 00 00 |LUKS....aes.....|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 78 74 73 2d 70 6c 61 69 |........xts-plai|
00000030 6e 36 34 00 00 00 00 00 00 00 00 00 00 00 00 00 |n64.............|
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 40 |...............@|
00000070 39 35 25 05 e2 9f f9 a3 50 4a 09 20 b3 ab e5 97 |95%.....PJ. ....|
00000080 a7 0a fb 41 4f f3 93 95 59 55 de 1a 53 45 31 d5 |...AO...YU..SE1.|
00000090 3b 3d 86 25 b5 2d 61 57 64 98 03 25 ac 9f b5 77 |;=.%.-aWd..%...w|
000000a0 e4 eb 0a 15 00 01 7a 23 35 63 61 30 66 30 32 37 |......z#5ca0f027|
000000b0 2d 31 37 32 30 2d 34 31 33 62 2d 61 39 62 38 2d |-1720-413b-a9b8-|
000000c0 33 37 31 32 61 39 61 34 34 35 37 61 00 00 00 00 |3712a9a4457a....|
000000d0 00 ac 71 f3 00 17 a2 38 82 45 6c 5d 07 96 00 9e |..q....8.El]....|
000000e0 26 34 43 d9 3b b7 10 b2 90 dc a4 d8 4b 64 ac bc |&4C.;.......Kd..|
000000f0 49 4b e6 5c 92 d4 26 28 00 00 00 08 00 00 0f a0 |IK.\..&(........|
00000100 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000120 00 00 00 00 00 00 00 00 00 00 02 00 00 00 0f a0 |................|
00000130 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000150 00 00 00 00 00 00 00 00 00 00 03 f8 00 00 0f a0 |................|
00000160 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000180 00 00 00 00 00 00 00 00 00 00 05 f0 00 00 0f a0 |................|
00000190 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001b0 00 00 00 00 00 00 00 00 00 00 07 e8 00 00 0f a0 |................|
000001c0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001e0 00 00 00 00 00 00 00 00 00 00 09 e0 00 00 0f a0 |................|
000001f0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000200
=============================== StdErr Messages: ===============================
File descriptor 9 (/proc/6512/mountinfo) leaked on lvs invocation. Parent PID 16610: bash
File descriptor 63 (pipe:[101541]) leaked on lvs invocation. Parent PID 16610: bash
File descriptor 9 (/proc/6512/mountinfo) leaked on lvchange invocation. Parent PID 17182: bash
File descriptor 63 (pipe:[101541]) leaked on lvchange invocation. Parent PID 17182: bash
/usr/share/boot-sav/b-i-s.sh: line 2544: 972201984S: value too great for base (error token is "972201984S")
ADDITIONAL INFORMATION:
=================== log of boot-info 20200428_1130 ===================
boot-info version : 4ppa82
boot-sav version : 4ppa82
boot-sav-extra version : 4ppa82
glade2script version : 3.2.4~ppa7
BLKID BEFORE LVM ACTIVATION:
/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/loop0: TYPE="squashfs"
/dev/loop1: TYPE="squashfs"
/dev/loop2: TYPE="squashfs"
/dev/loop3: TYPE="squashfs"
/dev/loop4: TYPE="squashfs"
/dev/loop5: TYPE="squashfs"
/dev/loop6: TYPE="squashfs"
/dev/loop7: TYPE="squashfs"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"
/dev/loop8: TYPE="squashfs"
/dev/loop9: TYPE="squashfs"
/dev/loop10: TYPE="squashfs"
/dev/loop11: TYPE="squashfs"
/dev/loop12: TYPE="squashfs"
/dev/loop13: TYPE="squashfs"
/dev/loop14: TYPE="squashfs"
/dev/loop15: TYPE="squashfs"
/dev/loop16: TYPE="squashfs"
/dev/loop17: TYPE="squashfs"
/dev/loop18: TYPE="squashfs"
/dev/loop19: TYPE="squashfs"
/dev/loop20: TYPE="squashfs"
/dev/loop21: TYPE="squashfs"
/dev/loop22: TYPE="squashfs"
MODPROBE
VGSCAN
File descriptor 9 (/proc/6512/mountinfo) leaked on vgscan invocation. Parent PID 6524: /bin/bash
Reading volume groups from cache.
Found volume group "ubuntu-vg" using metadata type lvm2
VGCHANGE
File descriptor 9 (/proc/6512/mountinfo) leaked on vgchange invocation. Parent PID 6524: /bin/bash
2 logical volume(s) in volume group "ubuntu-vg" now active
File descriptor 9 (/proc/6512/mountinfo) leaked on lvscan invocation. Parent PID 6524: /bin/bash
LVSCAN:
ACTIVE '/dev/ubuntu-vg/root' [463.58 GiB] inherit
ACTIVE '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
Gtk-Message: 11:30:51.622: GtkDialog mapped without a transient parent. This is discouraged.
Y a-t-il un RAID sur cet ordinateur ? no
File descriptor 9 (/proc/6512/mountinfo) leaked on lvs invocation. Parent PID 8211: /bin/sh
Error: /dev/mapper/sda3_crypt: unrecognised disk label
boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s): 32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount -r /dev/sda3 : Error code 32
=================== os-prober:
/dev/mapper/ubuntu--vg-root:L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession:linux
=================== blkid:
/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/loop0: TYPE="squashfs"
/dev/loop1: TYPE="squashfs"
/dev/loop2: TYPE="squashfs"
/dev/loop3: TYPE="squashfs"
/dev/loop4: TYPE="squashfs"
/dev/loop5: TYPE="squashfs"
/dev/loop6: TYPE="squashfs"
/dev/loop7: TYPE="squashfs"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"
/dev/loop8: TYPE="squashfs"
/dev/loop9: TYPE="squashfs"
/dev/loop10: TYPE="squashfs"
/dev/loop11: TYPE="squashfs"
/dev/loop12: TYPE="squashfs"
/dev/loop13: TYPE="squashfs"
/dev/loop14: TYPE="squashfs"
/dev/loop15: TYPE="squashfs"
/dev/loop16: TYPE="squashfs"
/dev/loop17: TYPE="squashfs"
/dev/loop18: TYPE="squashfs"
/dev/loop19: TYPE="squashfs"
/dev/loop20: TYPE="squashfs"
/dev/loop21: TYPE="squashfs"
/dev/loop22: TYPE="squashfs"
Set sda as corresponding disk of mapper/ubuntu--vg-root
1 disks with OS, 1 OS : 1 Linux, 0 MacOS, 0 Windows, 0 unknown type OS.
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount -r /dev/sda3 : Error code 32
=================== /etc/grub.d/ :
drwxr-xr-x 2 root root 4096 avril 12 23:21 grub.d
drwxr-xr-x 2 root root 4096 déc. 25 21:12 grub.d.bak
total 80
-rwxr-xr-x 1 root root 10046 nov. 11 06:52 00_header
-rwxr-xr-x 1 root root 6258 mars 18 2019 05_debian_theme
-rwxr-xr-x 1 root root 12693 nov. 11 06:52 10_linux
-rwxr-xr-x 1 root root 11298 nov. 11 06:52 20_linux_xen
-rwxr-xr-x 1 root root 1229 déc. 28 23:39 25_custom
-rwxr-xr-x 1 root root 12059 nov. 11 06:52 30_os-prober
-rwxr-xr-x 1 root root 1418 nov. 11 06:52 30_uefi-firmware
-rwxr-xr-x 1 root root 214 nov. 11 06:52 40_custom
-rwxr-xr-x 1 root root 216 nov. 11 06:52 41_custom
-rw-r--r-- 1 root root 483 nov. 11 06:52 README
=================== /etc/default/grub :
# If you change this file, run 'update-grub' afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
# info -f grub -n 'Simple configuration'
GRUB_DEFAULT=0
GRUB_TIMEOUT_STYLE=hidden
GRUB_TIMEOUT=10
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
GRUB_CMDLINE_LINUX=""
# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM="0x01234567,0xfefefefe,0x89abcdef,0xefefefef"
# Uncomment to disable graphical terminal (grub-pc only)
#GRUB_TERMINAL=console
# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo'
#GRUB_GFXMODE=640x480
# Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true
# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY="true"
# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE="480 440 1"
/boot/efi detected in the fstab of mapper/ubuntu--vg-root: UUID=5BC2-2AC0 (sda1)
/boot detected in the fstab of mapper/ubuntu--vg-root: UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994 (sda2)
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/fbx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/bootx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
=================== efibootmgr -v
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0000,0002,0001,0004,0005
Boot0000* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)
Boot0001* CD/DVD Drive BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO
Boot0004* UEFI OS HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIBOOTBOOTX64.EFI)
Boot0005* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIUbuntugrubx64.efi)
=================== UEFI/Legacy mode:
BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session.
SecureBoot enabled.
=================== PARTITIONS & DISKS:
mapper/ubuntu--vg-root : sda, not-sepboot, grubenv-ok grub2, signed grub-efi , update-grub, 64, with-boot, is-os, not--efi--part, fstab-has-goodBOOT, fstab-has-goodEFI, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, apt-get, grub-install, with--usr, fstab-without-usr, not-sep-usr, standard, not-far, notbiosboot, .
sda1 : sda, not-sepboot, no-grubenv nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, is-correct-EFI, part-has-no-fstab, part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall, no---usr, part-has-no-fstab, not-sep-usr, standard, not-far, notbiosboot, /boot/efi.
sda2 : sda, is-sepboot, grubenv-ok nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, is-maybe-EFI, part-has-no-fstab, part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall, no---usr, part-has-no-fstab, not-sep-usr, standard, not-far, notbiosboot, /boot.
sda3 : sda, maybesepboot, no-grubenv nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, not--efi--part, part-has-no-fstab, part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall, no---usr, part-has-no-fstab, not-sep-usr, standard, farbios, notbiosboot, /mnt/boot-sav/sda3.
sda : GPT, no-BIOS_boot, has-correctEFI, not-usb, not-mmc, has-os, 2048 sectors * 512 bytes
=================== parted -lm:
BYT;
/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;
BYT;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;
BYT;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;
BYT;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;
=================== lsblk:
KNAME TYPE FSTYPE SIZE LABEL
loop0 loop squashfs 14,8M
loop1 loop squashfs 173,3M
loop2 loop squashfs 44,2M
loop3 loop squashfs 160,2M
loop4 loop squashfs 140,7M
loop5 loop squashfs 156,7M
loop6 loop squashfs 140,7M
loop7 loop squashfs 91,3M
loop8 loop squashfs 3,5M
loop9 loop squashfs 91,4M
loop10 loop squashfs 4,2M
loop11 loop squashfs 4,2M
loop12 loop squashfs 3,7M
loop13 loop squashfs 265,4M
loop14 loop squashfs 14,8M
loop15 loop squashfs 54,6M
loop16 loop squashfs 956K
loop17 loop squashfs 173,5M
loop18 loop squashfs 3,7M
loop19 loop squashfs 44,9M
loop20 loop squashfs 54,7M
loop21 loop squashfs 260,7M
loop22 loop squashfs 956K
sda disk 465,8G
sda1 part vfat 512M
sda2 part ext4 732M
sda3 part crypto_LUKS 464,6G
sr0 rom 1024M
dm-0 crypt LVM2_member 464,6G
dm-1 lvm ext4 463,6G
dm-2 lvm swap 980M
KNAME ROTA RO RM STATE MOUNTPOINT
loop0 1 1 0 /snap/gnome-characters/375
loop1 1 1 0 /snap/skype/112
loop2 1 1 0 /snap/gtk-common-themes/1353
loop3 1 1 0 /snap/gnome-3-28-1804/116
loop4 1 1 0 /snap/gnome-3-26-1604/92
loop5 1 1 0 /snap/gnome-3-28-1804/110
loop6 1 1 0 /snap/gnome-3-26-1604/98
loop7 1 1 0 /snap/core/8592
loop8 1 1 0 /snap/falkon/60
loop9 1 1 0 /snap/core/8689
loop10 1 1 0 /snap/gnome-calculator/544
loop11 1 1 0 /snap/gnome-calculator/501
loop12 1 1 0 /snap/gnome-system-monitor/123
loop13 1 1 0 /snap/kde-frameworks-5-core18/29
loop14 1 1 0 /snap/gnome-characters/399
loop15 1 1 0 /snap/core18/1288
loop16 1 1 0 /snap/gnome-logs/73
loop17 1 1 0 /snap/skype/115
loop18 1 1 0 /snap/gnome-system-monitor/127
loop19 1 1 0 /snap/gtk-common-themes/1440
loop20 1 1 0 /snap/core18/1668
loop21 1 1 0 /snap/kde-frameworks-5-core18/32
loop22 1 1 0 /snap/gnome-logs/81
sda 0 0 0 running
sda1 0 0 0 /boot/efi
sda2 0 0 0 /boot
sda3 0 0 0
sr0 1 0 1 running
dm-0 0 0 0 running
dm-1 0 0 0 running /
dm-2 0 0 0 running [SWAP]
=================== mount:
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4003652k,nr_inodes=1000913,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=807244k,mode=755)
/dev/mapper/ubuntu--vg-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=25,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=2597)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
/var/lib/snapd/snaps/gnome-characters_375.snap on /snap/gnome-characters/375 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/skype_112.snap on /snap/skype/112 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gtk-common-themes_1353.snap on /snap/gtk-common-themes/1353 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-28-1804_116.snap on /snap/gnome-3-28-1804/116 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-26-1604_92.snap on /snap/gnome-3-26-1604/92 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-28-1804_110.snap on /snap/gnome-3-28-1804/110 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/falkon_60.snap on /snap/falkon/60 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-26-1604_98.snap on /snap/gnome-3-26-1604/98 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core_8592.snap on /snap/core/8592 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core_8689.snap on /snap/core/8689 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-calculator_544.snap on /snap/gnome-calculator/544 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-calculator_501.snap on /snap/gnome-calculator/501 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-system-monitor_123.snap on /snap/gnome-system-monitor/123 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-characters_399.snap on /snap/gnome-characters/399 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/kde-frameworks-5-core18_29.snap on /snap/kde-frameworks-5-core18/29 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core18_1288.snap on /snap/core18/1288 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-logs_73.snap on /snap/gnome-logs/73 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/skype_115.snap on /snap/skype/115 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-system-monitor_127.snap on /snap/gnome-system-monitor/127 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gtk-common-themes_1440.snap on /snap/gtk-common-themes/1440 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core18_1668.snap on /snap/core18/1668 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/kde-frameworks-5-core18_32.snap on /snap/kde-frameworks-5-core18/32 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-logs_81.snap on /snap/gnome-logs/81 type squashfs (ro,nodev,relatime,x-gdu.hide)
/dev/sda2 on /boot type ext4 (rw,relatime,data=ordered)
/dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=807240k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
=================== ls:
/sys/block/dm-0 (filtered): alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-1 (filtered): alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-2 (filtered): alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/sda (filtered): alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sda1 sda2 sda3 size slaves stat subsystem trace uevent
/sys/block/sr0 (filtered): alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/dev (filtered): autofs block bsg btrfs-control bus cdrom cdrw char console core cpu cpu_dma_latency cuse disk dm-0 dm-1 dm-2 dri dvd dvdrw ecryptfs fb0 fd full fuse hidraw0 hidraw1 hidraw2 hpet hugepages hwrng i2c-0 i2c-1 i2c-2 i2c-3 i2c-4 initctl input kmsg lightnvm log mapper mcelog media0 mei0 mem memory_bandwidth mqueue net network_latency network_throughput null port ppp psaux ptmx pts random rfkill rtc rtc0 sda sda1 sda2 sda3 sg0 sg1 shm snapshot snd sr0 stderr stdin stdout ubuntu-vg uhid uinput urandom userio v4l vfio vga_arbiter vhci vhost-net vhost-vsock video0 zero
ls /dev/mapper: control sda3_crypt ubuntu--vg-root ubuntu--vg-swap_1
=================== hexdump -n512 -C /dev/sda1
00000000 eb 58 90 6d 6b 66 73 2e 66 61 74 00 02 08 20 00 |.X.mkfs.fat... .|
00000010 02 00 00 00 00 f8 00 00 3f 00 ff 00 00 08 00 00 |........?.......|
00000020 00 00 10 00 00 04 00 00 00 00 00 00 02 00 00 00 |................|
00000030 01 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000040 80 01 29 c0 2a c2 5b 4e 4f 20 4e 41 4d 45 20 20 |..).*.[NO NAME |
00000050 20 20 46 41 54 33 32 20 20 20 0e 1f be 77 7c ac | FAT32 ...w|.|
00000060 22 c0 74 0b 56 b4 0e bb 07 00 cd 10 5e eb f0 32 |".t.V.......^..2|
00000070 e4 cd 16 cd 19 eb fe 54 68 69 73 20 69 73 20 6e |.......This is n|
00000080 6f 74 20 61 20 62 6f 6f 74 61 62 6c 65 20 64 69 |ot a bootable di|
00000090 73 6b 2e 20 20 50 6c 65 61 73 65 20 69 6e 73 65 |sk. Please inse|
000000a0 72 74 20 61 20 62 6f 6f 74 61 62 6c 65 20 66 6c |rt a bootable fl|
000000b0 6f 70 70 79 20 61 6e 64 0d 0a 70 72 65 73 73 20 |oppy and..press |
000000c0 61 6e 79 20 6b 65 79 20 74 6f 20 74 72 79 20 61 |any key to try a|
000000d0 67 61 69 6e 20 2e 2e 2e 20 0d 0a 00 00 00 00 00 |gain ... .......|
000000e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
00000200
=================== df -Th:
Filesystem Type Size Used Avail Use% Mounted on
udev devtmpfs 3.9G 0 3.9G 0% /dev
tmpfs tmpfs 789M 1.7M 787M 1% /run
/dev/mapper/ubuntu--vg-root ext4 456G 14G 419G 4% /
tmpfs tmpfs 3.9G 123M 3.8G 4% /dev/shm
tmpfs tmpfs 5.0M 4.0K 5.0M 1% /run/lock
tmpfs tmpfs 3.9G 0 3.9G 0% /sys/fs/cgroup
/dev/loop0 squashfs 15M 15M 0 100% /snap/gnome-characters/375
/dev/loop1 squashfs 174M 174M 0 100% /snap/skype/112
/dev/loop2 squashfs 45M 45M 0 100% /snap/gtk-common-themes/1353
/dev/loop3 squashfs 161M 161M 0 100% /snap/gnome-3-28-1804/116
/dev/loop4 squashfs 141M 141M 0 100% /snap/gnome-3-26-1604/92
/dev/loop5 squashfs 157M 157M 0 100% /snap/gnome-3-28-1804/110
/dev/loop8 squashfs 3.5M 3.5M 0 100% /snap/falkon/60
/dev/loop6 squashfs 141M 141M 0 100% /snap/gnome-3-26-1604/98
/dev/loop7 squashfs 92M 92M 0 100% /snap/core/8592
/dev/loop9 squashfs 92M 92M 0 100% /snap/core/8689
/dev/loop10 squashfs 4.3M 4.3M 0 100% /snap/gnome-calculator/544
/dev/loop11 squashfs 4.3M 4.3M 0 100% /snap/gnome-calculator/501
/dev/loop12 squashfs 3.8M 3.8M 0 100% /snap/gnome-system-monitor/123
/dev/loop14 squashfs 15M 15M 0 100% /snap/gnome-characters/399
/dev/loop13 squashfs 266M 266M 0 100% /snap/kde-frameworks-5-core18/29
/dev/loop15 squashfs 55M 55M 0 100% /snap/core18/1288
/dev/loop16 squashfs 1.0M 1.0M 0 100% /snap/gnome-logs/73
/dev/loop17 squashfs 174M 174M 0 100% /snap/skype/115
/dev/loop18 squashfs 3.8M 3.8M 0 100% /snap/gnome-system-monitor/127
/dev/loop19 squashfs 45M 45M 0 100% /snap/gtk-common-themes/1440
/dev/loop20 squashfs 55M 55M 0 100% /snap/core18/1668
/dev/loop21 squashfs 261M 261M 0 100% /snap/kde-frameworks-5-core18/32
/dev/loop22 squashfs 1.0M 1.0M 0 100% /snap/gnome-logs/81
/dev/sda2 ext4 705M 155M 499M 24% /boot
/dev/sda1 vfat 511M 10M 502M 2% /boot/efi
tmpfs tmpfs 789M 36K 789M 1% /run/user/1000
=================== fdisk -l:
Disk /dev/loop0: 14.8 MiB, 15462400 bytes, 30200 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop1: 173.3 MiB, 181760000 bytes, 355000 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop2: 44.2 MiB, 46325760 bytes, 90480 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop3: 160.2 MiB, 167931904 bytes, 327992 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop4: 140.7 MiB, 147501056 bytes, 288088 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop5: 156.7 MiB, 164290560 bytes, 320880 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop6: 140.7 MiB, 147501056 bytes, 288088 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop7: 91.3 MiB, 95748096 bytes, 187008 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: B39D9B19-7F8F-497A-B3DE-92DD6683C417
Device Start End Sectors Size Type
/dev/sda1 2048 1050623 1048576 512M EFI System
/dev/sda2 1050624 2549759 1499136 732M Linux filesystem
/dev/sda3 2549760 976771071 974221312 464.6G Linux filesystem
Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop8: 3.5 MiB, 3612672 bytes, 7056 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop9: 91.4 MiB, 95805440 bytes, 187120 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop10: 4.2 MiB, 4403200 bytes, 8600 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop11: 4.2 MiB, 4403200 bytes, 8600 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop12: 3.7 MiB, 3825664 bytes, 7472 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop13: 265.4 MiB, 278261760 bytes, 543480 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop14: 14.8 MiB, 15462400 bytes, 30200 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop15: 54.6 MiB, 57274368 bytes, 111864 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop16: 956 KiB, 978944 bytes, 1912 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop17: 173.5 MiB, 181915648 bytes, 355304 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop18: 3.7 MiB, 3825664 bytes, 7472 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop19: 44.9 MiB, 47063040 bytes, 91920 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop20: 54.7 MiB, 57294848 bytes, 111904 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop21: 260.7 MiB, 273375232 bytes, 533936 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk /dev/loop22: 956 KiB, 978944 bytes, 1912 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
=================== Suggested repair
The default repair of the Boot-Repair utility would purge (in order to sign-grub) and reinstall the grub-efi-amd64-signed of mapper/ubuntu--vg-root, using the following options: sda2/boot, sda1/boot/efi,
Additional repair would be performed: unhide-bootmenu-10s use-standard-efi-file restore-efi-backups
=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?
=================== Final advice in case of suggested repair
N'oubliez pas de régler votre BIOS pour qu'il amorce sur le fichier sda1/efi/.../grub*.efi !
=================== User settings
The settings chosen by the user will not act on the boot.
Passe la commande suivante dans un terminal :
cat /etc/fstab
Et colle le retour complet(*) dans ta réponse.
(*) le retour complet, c'est ça : https://forum.ubuntu-fr.org/viewtopic.p … #p22040823
Dernière modification par malbo (Le 28/04/2020, à 12:09)
Hors ligne
#8 Le 29/04/2020, à 09:16
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour Malbo,
voici ce que cela donne. cordialement
vincent@vincent-UBUntu:~$ cat /etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
# <file system> <mount point> <type> <options> <dump> <pass>
/dev/mapper/ubuntu--vg-root / ext4 errors=remount-ro 0 1
# /boot was on /dev/sda2 during installation
UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994 /boot ext4 defaults 0 2
# /boot/efi was on /dev/sda1 during installation
#UUID=5BC2-2AC0 /boot/efi vfat umask=0077 0 1
/dev/mapper/ubuntu--vg-swap_1 none swap sw 0 0
UUID=5BC2-2AC0 /boot/efi vfat defaults 0 1
vincent@vincent-UBUntu:~$
Dernière modification par Vertsaxo (Le 29/04/2020, à 22:23)
Hors ligne
#10 Le 29/04/2020, à 13:47
- malbo
Re : supprimer chiffrement global avant mise à jour version
Pour moi, le résultat de la commande "cat /etc/fstab " est correct. Moi je ne sais pas comment supprimer le chiffrement de l'installation. Je ne sais même pas si c'est possible...
Hors ligne
#11 Le 30/04/2020, à 20:09
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
J'ai sauvegardé mes données sur une clé, puis j'ai exécuté bootrepair en passant outre l'avertissement sur la nécessité de déchiffrer préalablement, cela ne corrige pas le problème de boot noir.
C'est peut-être un problème sans solution à mon niveau de compréhension en tout cas.
voici le lien vers l'URL lié à la réparation : http://paste.ubuntu.com/p/285x2hj96p/
je suppose que je peux toujours prendre le risque de passer à 20.04 maintenant que je me suis protégé du risque de perte de données (?)
cordialement
Vertsaxo
Dernière modification par Vertsaxo (Le 30/04/2020, à 20:41)
Hors ligne
#12 Le 30/04/2020, à 21:33
- geole
Re : supprimer chiffrement global avant mise à jour version
- cela fait des mois que j'ai un dysfonctionnement avec Ubuntu 18.4 : je suis obligé de passer par le bios à chaque démarrage sinon il ne démarre pas.a
Peux-tu indiquer la référence commerciale de ton ordinateur si c'est un portable?
Peux-tu détailler la manipulation bios que tu fais?
Si ton ordinateur est un HP, il faut souvent faire une manipulation du bios.
Dernière modification par geole (Le 30/04/2020, à 21:36)
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#13 Le 01/05/2020, à 09:51
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour Géole,
c'est un ordinateur assemblé avec un processeur intel et une carte Asus
carte mère : B85-PLUS
Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz
je ne fais aucune manipulation du Bios, simplement ce que j'ai remarqué c'est que si je laisse l'ordinateur démarrer par lui-même, il se bloque sur un écran noir, alors que si j'appuie sur la touche Suppr pour entrer dans le bios puis que je clique "démarrer" il démarre ensuite normalement en me demandant la clé de décryptage, ce qui est normal.
Par ailleurs, après avoir lancé boot-repair, le message final me dit de "ne pas oublier de régler le BIOS pour qu'il amorce sur le fichier sda1/EFI/ubuntu/shimx64.efi " je ne sais pas si cela a qlq chose à voir, puisque que cela boot. Les indications de démarrage ne sont pas formulées avec un chemin.
Hors ligne
#14 Le 01/05/2020, à 11:53
- geole
Re : supprimer chiffrement global avant mise à jour version
Bonjour
Je ne sais pas donner d'idées sur le problème rencontré. Il serait bon que tu fasses un boot-info (Une nouvelle version est sortie).
Pour un peu, je penserais à un mauvais arrêt.
Peux-tu donner ce retour
sudo journalctl -b-1 | tail -50
Pour le second problème, boot-repair a bien renseigné la nvram tel qu'on peut le voir
efibootmgr -v
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0000,0002,0001,0004
Boot0000* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
Dernière modification par geole (Le 01/05/2020, à 11:57)
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#15 Le 01/05/2020, à 16:10
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
(re) bonjour Geole
voici le lien vers ce que donne le boot-info :
http://paste.ubuntu.com/p/cbbyGsYzWQ/
après le sudo jourlactl... j'obtiens ceci :
vincent@vincent-UBUntu:~$ sudo journalctl -b-1 | tail -50
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Load Kernel Modules.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local Encrypted Volumes.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Cryptography Setup for sda3_crypt...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Forward Password Requests to Wall Directory Watch.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Network Time Synchronization...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Load/Save Random Seed.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Update UTMP about System Boot/Shutdown.
avril 30 22:23:36 vincent-UBUntu systemd-cryptsetup[3606]: Failed to deactivate: Device or resource busy
avril 30 22:23:36 vincent-UBUntu systemd[1]: systemd-cryptsetup@sda3_crypt.service: Control process exited, code=exited status=1
avril 30 22:23:36 vincent-UBUntu systemd[1]: systemd-cryptsetup@sda3_crypt.service: Failed with result 'exit-code'.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Cryptography Setup for sda3_crypt.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-systemd\x2dcryptsetup.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Network Time Synchronization.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Create Volatile Files and Directories.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local File Systems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /boot/efi...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /media/vincent/C08E-EDBA...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /run/user/1000...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /boot/efi.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /run/user/1000.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Swap.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivating swap /dev/ubuntu-vg/swap_1...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /boot...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped File System Check on /dev/disk/by-uuid/5BC2-2AC0.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /media/vincent/C08E-EDBA.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Clean the /media/vincent/C08E-EDBA mount point...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Clean the /media/vincent/C08E-EDBA mount point.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-clean\x2dmount\x2dpoint.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/ubuntu-vg/swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-uuid/851c2f98-6fc4-4e15-a64a-3d357dc8a140.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-id/dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJJIIqpN1oepBNCcd01TVe2YIDJyqGUazS.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-id/dm-name-ubuntu--vg-swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/dm-2.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/mapper/ubuntu--vg-swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /boot.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Unmount All Filesystems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped File System Check on /dev/disk/by-uuid/7f24874a-5e0c-45c5-90b4-ada2b13f0994.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-systemd\x2dfsck.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local File Systems (Pre).
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Create Static Device Nodes in /dev.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Remount Root and Kernel File Systems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Shutdown.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Final Step.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Starting Power-Off...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Shutting down.
avril 30 22:23:36 vincent-UBUntu lvm[3617]: 2 logical volume(s) in volume group "ubuntu-vg" unmonitored
avril 30 22:23:36 vincent-UBUntu kernel: systemd-shutdow: 47 output lines suppressed due to ratelimiting
avril 30 22:23:36 vincent-UBUntu systemd-shutdown[1]: Syncing filesystems and block devices.
avril 30 22:23:36 vincent-UBUntu systemd-journald[451]: Journal stopped
je n'ai pas le niveau pour comprendre ce que tu as écrit à propos de la nvram et boot-repair, désolé.
cordialement
Hors ligne
#16 Le 01/05/2020, à 16:44
- geole
Re : supprimer chiffrement global avant mise à jour version
Je ne sais pas trouver le problème de ton écran noir et de l'obligation de repasser par le bios.
Il faudrait que tu fasses ces trois commandes pour disposer de la nouvelle version de boot-info
sudo apt update
sudo apt upgrade
boot-info
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#17 Le 01/05/2020, à 20:00
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
voici le lien géole
Hors ligne
#18 Le 02/05/2020, à 06:27
- malbo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
Je colle ci-dessous le Boot-info dont tu as donné le lien ( http://paste.ubuntu.com/p/6CcQ4Nrz9h/ ) dans ton dernier post :
boot-info-4ppa95 [20200501_2059]
============================== Boot Info Summary ===============================
=> No boot loader is installed in the MBR of /dev/sda.
=> FreeDOS (eXtended FDisk) is installed in the MBR of /dev/sdb.
sda1: __________________________________________________________________________
File system: vfat
Boot sector type: FAT32
Boot sector info: No errors found in the Boot Parameter Block.
Operating System:
Boot files:
sda2: __________________________________________________________________________
File system: ext4
Boot sector type: -
Boot sector info:
Operating System:
Boot files: /grub/grub.cfg
sda3: __________________________________________________________________________
File system: crypto_LUKS
Boot sector type: Unknown
Boot sector info:
sdb1: __________________________________________________________________________
File system: vfat
Boot sector type: Windows XP: FAT32
Boot sector info: No errors found in the Boot Parameter Block.
Operating System:
Boot files:
============================ Drive/Partition Info ==============================
Drive: sda _____________________________________________________________________
Disque /dev/sda : 465,8 GiB, 500107862016 octets, 976773168 secteurs
Unités : secteur de 1 × 512 = 512 octets
Taille de secteur (logique / physique)Â : 512Â octets / 512Â octets
taille d'E/S (minimale / optimale)Â : 512Â octets / 512Â octets
Type d'étiquette de disque : gpt
Partition Boot Start Sector End Sector # of Sectors Id System
/dev/sda1 1 976,773,167 976,773,167 ee GPT
GUID Partition Table detected.
Partition Attrs Start Sector End Sector # of Sectors System
/dev/sda1 2,048 1,050,623 1,048,576 EFI System partition
/dev/sda2 1,050,624 2,549,759 1,499,136 Data partition (Linux)
/dev/sda3 2,549,760 976,771,071 974,221,312 Data partition (Linux)
Attributes: R=Required, N=No Block IO, B=Legacy BIOS Bootable, +=More bits set
Drive: sdb _____________________________________________________________________
Disque /dev/sdb : 7,5 GiB, 8053063680 octets, 15728640 secteurs
Unités : secteur de 1 × 512 = 512 octets
Taille de secteur (logique / physique)Â : 512Â octets / 512Â octets
taille d'E/S (minimale / optimale)Â : 512Â octets / 512Â octets
Type d'étiquette de disque : dos
Partition Boot Start Sector End Sector # of Sectors Id System
/dev/sdb1 1,552 15,728,639 15,727,088 b W95 FAT32
blkid (filtered): ______________________________________________________________
Device UUID TYPE LABEL
/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e ext4
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140 swap
/dev/sda1 5BC2-2AC0 vfat
/dev/sda2 7f24874a-5e0c-45c5-90b4-ada2b13f0994 ext4
/dev/sda3 5ca0f027-1720-413b-a9b8-3712a9a4457a crypto_LUKS
/dev/sdb1 C08E-EDBA vfat
============================== ls -R /dev/mapper/ ==============================
/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1
================================= Mount points =================================
Device Mount_Point Type Options
/dev/mapper/ubuntu--vg-root / ext4 (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda1 /boot/efi vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sda2 /boot ext4 (rw,relatime,data=ordered)
/dev/sdb1 /media/vincent/C08E-EDBA vfat (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)
======================== sda2/grub/grub.cfg (filtered) =========================
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
set have_grubenv=true
load_env
fi
if [ "${next_entry}" ] ; then
set default="${next_entry}"
set next_entry=
save_env next_entry
set boot_once=true
else
set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
menuentry_id_option="--id"
else
menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
set saved_entry="${prev_saved_entry}"
save_env saved_entry
set prev_saved_entry=
save_env prev_saved_entry
set boot_once=true
fi
function savedefault {
if [ -z "${boot_once}" ]; then
saved_entry="${chosen}"
save_env saved_entry
fi
}
function recordfail {
set recordfail=1
if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
if [ x$feature_all_video_module = xy ]; then
insmod all_video
else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
fi
}
if [ x$feature_default_font_path = xy ] ; then
font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
font="/grub/unicode.pf2"
fi
if loadfont $font ; then
set gfxmode=auto
load_video
insmod gfxterm
set locale_dir=$prefix/locale
set lang=fr_FR
insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
set timeout=10
else
if [ x$feature_timeout_style = xy ] ; then
set timeout_style=hidden
set timeout=10
# Fallback hidden-timeout code in case the timeout_style feature is
# unavailable.
elif sleep --interruptible 10 ; then
set timeout=10
fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
clear
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
set gfxpayload="${1}"
if [ "${1}" = "keep" ]; then
set vt_handoff=vt.handoff=1
else
set vt_handoff=
fi
}
if [ "${recordfail}" != 1 ]; then
if [ -e ${prefix}/gfxblacklist.txt ]; then
if hwmatch ${prefix}/gfxblacklist.txt 3; then
if [ ${match} = 0 ]; then
set linux_gfx_mode=keep
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=keep
fi
else
set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
initrd /initrd.img-4.15.0-99-generic
}
submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
menuentry 'Ubuntu, with Linux 4.15.0-99-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-99-generic ...'
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-99-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-99-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-99-generic ...'
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-99-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-96-generic ...'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-96-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-96-generic ...'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-96-generic
}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/25_custom ###
menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}
menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}
menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}
menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}
menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}
menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}
menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}
menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###
### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries. Simply type the
# menu entries you want to add after this comment. Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f ${config_directory}/custom.cfg ]; then
source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f $prefix/custom.cfg ]; then
source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###
==================== sda2: Location of files loaded by Grub ====================
GiB - GB File Fragment(s)
0.626422882 = 0.672616448 grub/grub.cfg 1
0.840801239 = 0.902803456 vmlinuz-4.15.0-96-generic 2
0.688465118 = 0.739233792 vmlinuz-4.15.0-99-generic 2
0.946285248 = 1.016066048 initrd.img-4.15.0-96-generic 3
0.835491180 = 0.897101824 initrd.img-4.15.0-99-generic 5
======================== Unknown MBRs/Boot Sectors/etc =========================
Unknown BootLoader on sda3
00000000 4c 55 4b 53 ba be 00 01 61 65 73 00 00 00 00 00 |LUKS....aes.....|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 78 74 73 2d 70 6c 61 69 |........xts-plai|
00000030 6e 36 34 00 00 00 00 00 00 00 00 00 00 00 00 00 |n64.............|
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 40 |...............@|
00000070 39 35 25 05 e2 9f f9 a3 50 4a 09 20 b3 ab e5 97 |95%.....PJ. ....|
00000080 a7 0a fb 41 4f f3 93 95 59 55 de 1a 53 45 31 d5 |...AO...YU..SE1.|
00000090 3b 3d 86 25 b5 2d 61 57 64 98 03 25 ac 9f b5 77 |;=.%.-aWd..%...w|
000000a0 e4 eb 0a 15 00 01 7a 23 35 63 61 30 66 30 32 37 |......z#5ca0f027|
000000b0 2d 31 37 32 30 2d 34 31 33 62 2d 61 39 62 38 2d |-1720-413b-a9b8-|
000000c0 33 37 31 32 61 39 61 34 34 35 37 61 00 00 00 00 |3712a9a4457a....|
000000d0 00 ac 71 f3 00 17 a2 38 82 45 6c 5d 07 96 00 9e |..q....8.El]....|
000000e0 26 34 43 d9 3b b7 10 b2 90 dc a4 d8 4b 64 ac bc |&4C.;.......Kd..|
000000f0 49 4b e6 5c 92 d4 26 28 00 00 00 08 00 00 0f a0 |IK.\..&(........|
00000100 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000120 00 00 00 00 00 00 00 00 00 00 02 00 00 00 0f a0 |................|
00000130 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000150 00 00 00 00 00 00 00 00 00 00 03 f8 00 00 0f a0 |................|
00000160 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000180 00 00 00 00 00 00 00 00 00 00 05 f0 00 00 0f a0 |................|
00000190 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001b0 00 00 00 00 00 00 00 00 00 00 07 e8 00 00 0f a0 |................|
000001c0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001e0 00 00 00 00 00 00 00 00 00 00 09 e0 00 00 0f a0 |................|
000001f0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000200
=============================== StdErr Messages ================================
File descriptor 63 (pipe:[212208]) leaked on lvs invocation. Parent PID 21159: /bin/bash
File descriptor 63 (pipe:[212208]) leaked on lvchange invocation. Parent PID 31765: /bin/bash
/usr/share/boot-sav/b-i-s-functions.sh: ligne 1659: 972201984S : valeur trop grande pour la base (le symbole erroné est « 972201984S »)
============================ ADDITIONAL INFORMATION ============================
boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s): 32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
==================== blkid (filtered) before lvm activation ====================
/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/sdb1: UUID="C08E-EDBA" TYPE="vfat" PARTUUID="f6391d8b-01"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"
=============================== modprobe dm-mod ================================
vgscan --mknodes
Reading volume groups from cache.
Found volume group "ubuntu-vg" using metadata type lvm2
vgchange -ay
2 logical volume(s) in volume group "ubuntu-vg" now active
lvscan: ACTIVE '/dev/ubuntu-vg/root' [463.58 GiB] inherit
ACTIVE '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
Y a-t-il un RAID sur cet ordinateur ? no
Error: /dev/mapper/sda3_crypt: unrecognised disk label
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
=================== mount -r /dev/sda3 : Error code 32
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
=================== mount -r /dev/sda3 : Error code 32
================================ 1 OS detected =================================
OS#1: L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession on mapper/ubuntu--vg-root
=========================== /etc/grub.d/ (filtered) ============================
drwxr-xr-x 2 root root 4096 avril 30 21:25 grub.d
drwxr-xr-x 2 root root 4096 déc. 25 21:12 grub.d.bak
-rwxr-xr-x 1 root root 10046 mars 11 21:57 00_header
-rwxr-xr-x 1 root root 6258 mars 11 21:57 05_debian_theme
-rwxr-xr-x 1 root root 12693 mars 11 21:57 10_linux
-rwxr-xr-x 1 root root 11298 mars 11 21:57 20_linux_xen
-rwxr-xr-x 1 root root 1229 avril 30 21:25 25_custom
-rwxr-xr-x 1 root root 12059 mars 11 21:57 30_os-prober
-rwxr-xr-x 1 root root 1418 mars 11 21:57 30_uefi-firmware
-rwxr-xr-x 1 root root 214 mars 11 21:57 40_custom
-rwxr-xr-x 1 root root 216 mars 11 21:57 41_custom
=================== /boot/efi detected in the fstab of mapper/ubuntu--vg-root: UUID=5BC2-2AC0 (sda1)
=================== /boot detected in the fstab of mapper/ubuntu--vg-root: UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994 (sda2)
================================== m5sum efi ===================================
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 /boot/efi/efi/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/efi/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 /boot/efi/efi/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/efi/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 /boot/efi/efi/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 /boot/efi/efi/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/efi/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 /boot/efi/efi/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/efi/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 /boot/efi/efi/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/Boot/bootx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/Boot/grubx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/EFI/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/EFI/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 /boot/efi/EFI/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/EFI/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 /boot/efi/EFI/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 /boot/efi/EFI/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 /boot/efi/EFI/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 /boot/efi/EFI/ubuntu/shimx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/fbx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/grubx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/grubx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
================================ efibootmgr -v =================================
BootCurrent: 0004
Timeout: 1 seconds
BootOrder: 0000,0004,0002,0001,0005,0006
Boot0000* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)
Boot0001* CD/DVD Drive BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO..NOo.......7.G.e.n.e.r.i.c. .F.l.a.s.h. .D.i.s.k.................&..Gd-.;.A..MQ..L.1.7.2.9.E.3.D.3........BO
Boot0004* UEFI OS HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIBOOTBOOTX64.EFI)
Boot0005* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIUbuntugrubx64.efi)
Boot0006* UEFI: Generic Flash Disk PciRoot(0x0)/Pci(0x1a,0x0)/USB(0,0)/USB(5,0)/HD(1,MBR,0xf6391d8b,0x610,0xeff9f0)..BO
=============================== UEFI/Legacy mode ===============================
BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session. SecureBoot enabled.
=============================== PARTITIONS (1/3) ===============================
mapper/ubuntu--vg-root : sda, not-sepboot, grubenv-ok grub2, signed grub-efi , update-grub, 64, with-boot, is-os, isnotESP, fstab-has-goodBOOT
sda1 : sda, not-sepboot, no-grubenv nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, is---ESP, part-has-no-fstab
sda2 : sda, is-sepboot, grubenv-ok nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, isnotESP, part-has-no-fstab
sda3 : sda, maybesepboot, no-grubenv nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, isnotESP, part-has-no-fstab
sdb1 : sdb, not-sepboot, no-grubenv nogrub, no-docgrub, no-update-grub, 32, no-boot, no-os, isnotESP, part-has-no-fstab
=============================== PARTITIONS (2/3) ===============================
mapper/ubuntu--vg-root : fstab-has-goodEFI, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, apt-get, grub-install
sda1 : part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall
sda2 : part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall
sda3 : part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall
sdb1 : part-has-no-fstab, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot, nopakmgr, nogrubinstall
=============================== PARTITIONS (3/3) ===============================
mapper/ubuntu--vg-root : with--usr, fstab-without-usr, not-sep-usr, standard, not-far, notbiosboot, .
sda1 : no---usr, part-has-no-fstab, not-sep-usr, standard, not-far, notbiosboot, /boot/efi.
sda2 : no---usr, part-has-no-fstab, not-sep-usr, standard, not-far, notbiosboot, /boot.
sda3 : no---usr, part-has-no-fstab, not-sep-usr, standard, farbios, notbiosboot, /mnt/boot-sav/sda3.
sdb1 : no---usr, part-has-no-fstab, not-sep-usr, standard, not-far, notbiosboot, /media/vincent/C08E-EDBA.
==================================== DISKS =====================================
sda : GPT, no-BIOS_boot, has---ESP, not-usb, not-mmc, has-os, 2048 sectors * 512 bytes
sdb : not-GPT, BIOSboot-not-needed, has-noESP, usb-disk, not-mmc, no-os, 1552 sectors * 512 bytes
================================== parted -lm ==================================
BYT;
/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;
BYT;
/dev/sdb:8053MB:scsi:512:512:msdos:Generic Flash Disk:;
1:795kB:8053MB:8052MB:fat32::;
BYT;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;
BYT;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;
BYT;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;
=============== lsblk -o KNAME,TYPE,FSTYPE,SIZE,LABEL (filtered) ===============
KNAME TYPE FSTYPE SIZE LABEL
sda disk 465,8G
sda1 part vfat 512M
sda2 part ext4 732M
sda3 part crypto_LUKS 464,6G
sdb disk 7,5G
sdb1 part vfat 7,5G
sr0 rom 1024M
dm-0 crypt LVM2_member 464,6G
dm-1 lvm ext4 463,6G
dm-2 lvm swap 980M
============ lsblk -o KNAME,ROTA,RO,RM,STATE,MOUNTPOINT (filtered) =============
KNAME ROTA RO RM STATE MOUNTPOINT
sda 0 0 0 running
sda1 0 0 0 /boot/efi
sda2 0 0 0 /boot
sda3 0 0 0
sdb 1 0 1 running
sdb1 1 0 1 /media/vincent/C08E-EDBA
sr0 1 0 1 running
dm-0 0 0 0 running
dm-1 0 0 0 running /
dm-2 0 0 0 running [SWAP]
=============================== mount (filtered) ===============================
/dev/mapper/ubuntu--vg-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda2 on /boot type ext4 (rw,relatime,data=ordered)
/dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sdb1 on /media/vincent/C08E-EDBA type vfat (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)
================================ ls (filtered) =================================
/sys/block/dm-0: alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-1: alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-2: alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/sda: alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sda1 sda2 sda3 size slaves stat subsystem trace uevent
/sys/block/sdb: alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sdb1 size slaves stat subsystem trace uevent
/dev: autofs block bsg btrfs-control bus cdrom cdrw char console core cpu cpu_dma_latency cuse disk dm-0 dm-1 dm-2 dri dvd dvdrw ecryptfs fb0 fd full fuse hidraw0 hidraw1 hidraw2 hpet hugepages hwrng initctl input kmsg lightnvm log mapper mcelog media0 mei0 mem memory_bandwidth mqueue net null port ppp psaux ptmx pts random rfkill rtc rtc0 sda sda1 sda2 sda3 sdb sdb1 sg0 sg1 sg2 shm snapshot snd sr0 stderr stdin stdout ubuntu-vg uhid uinput urandom userio v4l vfio vga_arbiter vhci vhost-net vhost-vsock video0 zero
ls /dev/mapper: sda3_crypt ubuntu--vg-root ubuntu--vg-swap_1
============================== df -Th (filtered) ===============================
Filesystem Type Size Used Avail Use% Mounted on
/dev/mapper/ubuntu--vg-root ext4 456G 14G 419G 4% /
/dev/sda2 ext4 705M 155M 499M 24% /boot
/dev/sda1 vfat 511M 13M 499M 3% /boot/efi
/dev/sdb1 vfat 7.5G 462M 7.1G 7% /media/vincent/C08E-EDBA
============================= fdisk -l (filtered) ==============================
Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Disklabel type: gpt
Device Start End Sectors Size Type
/dev/sda1 2048 1050623 1048576 512M EFI System
/dev/sda2 1050624 2549759 1499136 732M Linux filesystem
/dev/sda3 2549760 976771071 974221312 464.6G Linux filesystem
Disk /dev/sdb: 7.5 GiB, 8053063680 bytes, 15728640 sectors
Disklabel type: dos
Device Boot Start End Sectors Size Id Type
/dev/sdb1 1552 15728639 15727088 7.5G b W95 FAT32
Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors
(debug) reinstall grub2 place-in-MBR no-BIOS_boot (mapper/ubuntu--vg-root)
=============================== Suggested repair ===============================
The default repair of the Boot-Repair utility would purge (in order to fix packages) and reinstall the grub2 of mapper/ubuntu--vg-root into the MBR of sda, using the following options: sda2/boot,
Grub-efi would not be selected by default because: no-win-efi
Additional repair would be performed: unhide-bootmenu-10s restore-efi-backups
===================== Blockers in case of suggested repair ======================
GPT détecté. Veuillez créer une partition BIOS-Boot (>1MB, système de fichiers non formaté, drapeau bios_grub). Cela peut être réalisé via des outils tels que Gparted. Puis réessayez.
Alternativement, vous pouvez réessayer après avoir activé l'option [Partition /boot/efi séparée :].
===================== Advice in case of suggested repair ======================
Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?
=================== Final advice in case of suggested repair ===================
N'oubliez pas de régler votre BIOS pour qu'il amorce sur le disque sda (ATA Samsung SSD 860) !
================================= User settings ================================
The settings chosen by the user will not act on the boot.
Hors ligne
#19 Le 02/05/2020, à 13:38
- geole
Re : supprimer chiffrement global avant mise à jour version
Bonjour
J'extrais cela du rapport boot-info
sda1: __________________________________________________________________________
File system: vfat
Boot sector type: FAT32
Boot sector info: No errors found in the Boot Parameter Block.
Operating System:
Boot files:
sda2: __________________________________________________________________________
Je suis un peu surpris de ne pas y trouver des fichiers de boot.
Pour en avoir la certitude, peux-tu exécuter et poster le retour de ces commandes
sudo umount -v /dev/sda1
sudo mount -v /dev/sda1 /mnt
ls -ls /mnt
ls -ls /mnt/EFI
ls -ls /mnt/EFI/ubuntu
Dernière modification par geole (Le 02/05/2020, à 20:31)
Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit, utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248
Hors ligne
#20 Le 02/05/2020, à 20:19
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
En réponse à la demande de Géole,
voici ce que donnent les cinq commandes
vincent@vincent-UBUntu:~$ sudo umount -v /dev/sda1
[sudo] Mot de passe de vincent :
umount: /boot/efi (/dev/sda1) démonté
vincent@vincent-UBUntu:~$ sudo mount -v /dev/sda1 /mnt
mount : /dev/sda1 monté sur /mnt.
vincent@vincent-UBUntu:~$ ls -ls /mnt
total 12
4 drwxr-xr-x 2 root root 4096 avril 30 21:25 Boot
4 drwxr-xr-x 4 root root 4096 juil. 7 2019 EFI
4 drwxr-xr-x 2 root root 4096 déc. 25 21:15 ubuntu
vincent@vincent-UBUntu:~$ ls -ls /mnt/EFI
total 8
4 drwxr-xr-x 2 root root 4096 avril 30 21:25 BOOT
4 drwxr-xr-x 3 root root 4096 juil. 7 2019 ubuntu
vincent@vincent-UBUntu:~$ ls -ls /mnt/EFI/ubuntu
total 3724
4 -rwxr-xr-x 1 root root 108 avril 30 21:25 BOOTX64.CSV
4 drwxr-xr-x 2 root root 4096 juil. 7 2019 fw
76 -rwxr-xr-x 1 root root 75992 juil. 7 2019 fwupx64.efi
4 -rwxr-xr-x 1 root root 121 avril 30 21:25 grub.cfg
1092 -rwxr-xr-x 1 root root 1116536 avril 30 21:25 grubx64.efi
1240 -rwxr-xr-x 1 root root 1269496 avril 30 21:25 mmx64.efi
1304 -rwxr-xr-x 1 root root 1334816 avril 30 21:25 shimx64.efi
vincent@vincent-UBUntu:~$
Dernière modification par Vertsaxo (Le 04/05/2020, à 15:16)
Hors ligne
#21 Le 06/05/2020, à 21:36
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
j'ai suivi le conseil de Malbo donné pour un autre utilisateur en 2018 dans ce message :
https://forum.ubuntu-fr.org/viewtopic.php?id=2025371
et cela a marché. mon pc démarre sans que je doive passer par le bios.
cordialement
Vertsaxo
Hors ligne
#22 Le 07/05/2020, à 08:00
- malbo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
Dans le lien que tu as donné dans le post #21, j'ai conseillé à darkwin314 de désactiver la possibilité de démarrer en mode EFI pour imposer le démarrage en mode Bios. Je ne vois pas le rapport avec ton installation qui est faite en mode EFI. Mais peut-être que la situation a beaucoup évolué : je te prie de faire un Boot-info depuis une session de ton Ubuntu installé et de donner l'URL de ce Boot-info dans ta réponse.
Hors ligne
#23 Le 07/05/2020, à 21:19
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
voici le lien vers le résultat du boot-info que je viens de lancer :
http://paste.ubuntu.com/p/TSRvjWdKhB/
Hors ligne
#24 Le 08/05/2020, à 06:32
- malbo
Re : supprimer chiffrement global avant mise à jour version
Bonjour,
Je colle ci-dessous le Boot-info dont tu as donné le lien ( http://paste.ubuntu.com/p/TSRvjWdKhB/ ) dans ton post #23 :
boot-info-4ppa96 [20200507_2217]
============================== Boot Info Summary ===============================
=> No boot loader is installed in the MBR of /dev/sda.
sda1: __________________________________________________________________________
File system: vfat
Boot sector type: FAT32
Boot sector info: No errors found in the Boot Parameter Block.
Operating System:
Boot files: /efi/BOOT/bkpbootx64.efi /efi/BOOT/bootx64.efi
/efi/BOOT/fbx64.efi /efi/BOOT/grubx64.efi
/efi/ubuntu/fwupx64.efi /efi/ubuntu/grubx64.efi
/efi/ubuntu/mmx64.efi /efi/ubuntu/shimx64.efi
/efi/ubuntu/grub.cfg
sda2: __________________________________________________________________________
File system: ext4
Boot sector type: -
Boot sector info:
Operating System:
Boot files: /grub/grub.cfg
sda3: __________________________________________________________________________
File system: crypto_LUKS
Boot sector type: Unknown
Boot sector info:
================================ 1 OS detected =================================
OS#1: L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession on mapper/ubuntu--vg-root
============================== System Information ==============================
boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s): 32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session.
================================ efibootmgr -v =================================
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0002,0000,0004,0001,0005
Boot0000* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\ubuntu\shimx64.efi)
Boot0001* CD/DVD Drive BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO
Boot0004* UEFI OS HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\BOOT\BOOTX64.EFI)
Boot0005* ubuntu HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\Ubuntu\grubx64.efi) SecureBoot enabled.
================================== EFI files ===================================
f7a57b08bc7c1c85417ae4cea582d1d4 mapper/ubuntu--vg-root/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 mapper/ubuntu--vg-root/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 mapper/ubuntu--vg-root/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 mapper/ubuntu--vg-root/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 mapper/ubuntu--vg-root/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 mapper/ubuntu--vg-root/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 mapper/ubuntu--vg-root/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 mapper/ubuntu--vg-root/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda1/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda1/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 sda1/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 sda1/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 sda1/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 sda1/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 sda1/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda1/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda2/Boot/bootx64.efi
64a633007e3d5a9a5943e417442548d6 sda2/Boot/grubx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda2/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda2/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4 sda2/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446 sda2/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6 sda2/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688 sda2/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6 sda2/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700 sda2/ubuntu/mmx64.efi
============================= Drive/Partition Info =============================
Disks info: ____________________________________________________________________
sda : GPT, no-BIOS_boot, has---ESP, not-usb, not-mmc, has-os, 2048 sectors * 512 bytes
Partitions info (1/3): _________________________________________________________
mapper/ubuntu--vg-root : is-os, 64, apt-get, signed grub-efi , grub2, grub-install, grubenv-ok, update-grub, not-far
sda1 : no-os, 32, nopakmgr, no-docgrub, nogrub, nogrubinstall, no-grubenv, no-update-grub, not-far
sda2 : no-os, 32, nopakmgr, no-docgrub, nogrub, nogrubinstall, grubenv-ok, no-update-grub, not-far
sda3 : no-os, 32, nopakmgr, no-docgrub, nogrub, nogrubinstall, no-grubenv, no-update-grub, farbios
Partitions info (2/3): _________________________________________________________
mapper/ubuntu--vg-root : isnotESP, fstab-has-goodEFI, notbiosboot, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot
sda1 : is---ESP, part-has-no-fstab, notbiosboot, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot
sda2 : isnotESP, part-has-no-fstab, notbiosboot, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot
sda3 : isnotESP, part-has-no-fstab, notbiosboot, no-nt, no-winload, no-recov-nor-hid, no-bmgr, notwinboot
Partitions info (3/3): _________________________________________________________
mapper/ubuntu--vg-root : not-sepboot, with-boot, fstab-has-goodBOOT, not-sep-usr, with--usr, fstab-without-usr, standard, sda
sda1 : not-sepboot, no-boot, part-has-no-fstab, not-sep-usr, no---usr, part-has-no-fstab, standard, sda
sda2 : is-sepboot, no-boot, part-has-no-fstab, not-sep-usr, no---usr, part-has-no-fstab, standard, sda
sda3 : maybesepboot, no-boot, part-has-no-fstab, not-sep-usr, no---usr, part-has-no-fstab, standard, sda
fdisk -l (filtered): ___________________________________________________________
Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Disklabel type: gpt
Device Start End Sectors Size Type
/dev/sda1 2048 1050623 1048576 512M EFI System
/dev/sda2 1050624 2549759 1499136 732M Linux filesystem
/dev/sda3 2549760 976771071 974221312 464.6G Linux filesystem
Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors
parted -lm (filtered): _________________________________________________________
/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;
df -Th (filtered): _____________________________________________________________
Filesystem Type Size Used Avail Use% Mounted on
/dev/mapper/ubuntu--vg-root ext4 456G 14G 419G 4% /
/dev/sda2 ext4 705M 155M 499M 24% /boot
blkid (filtered): ______________________________________________________________
Device UUID TYPE LABEL
/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e ext4
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140 swap
/dev/sda1 5BC2-2AC0 vfat
/dev/sda2 7f24874a-5e0c-45c5-90b4-ada2b13f0994 ext4
/dev/sda3 5ca0f027-1720-413b-a9b8-3712a9a4457a crypto_LUKS
Mount points: __________________________________________________________________
/dev/mapper/ubuntu--vg-root / ext4 (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda2 /boot ext4 (rw,relatime,data=ordered)
============================== ls -R /dev/mapper/ ==============================
/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1
=========================== sda1/efi/ubuntu/grub.cfg ===========================
search.fs_uuid 7f24874a-5e0c-45c5-90b4-ada2b13f0994 root hd0,gpt2
set prefix=($root)'/grub'
configfile $prefix/grub.cfg
======================== sda2/grub/grub.cfg (filtered) =========================
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
set have_grubenv=true
load_env
fi
if [ "${next_entry}" ] ; then
set default="${next_entry}"
set next_entry=
save_env next_entry
set boot_once=true
else
set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
menuentry_id_option="--id"
else
menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
set saved_entry="${prev_saved_entry}"
save_env saved_entry
set prev_saved_entry=
save_env prev_saved_entry
set boot_once=true
fi
function savedefault {
if [ -z "${boot_once}" ]; then
saved_entry="${chosen}"
save_env saved_entry
fi
}
function recordfail {
set recordfail=1
if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
if [ x$feature_all_video_module = xy ]; then
insmod all_video
else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
fi
}
if [ x$feature_default_font_path = xy ] ; then
font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
font="/grub/unicode.pf2"
fi
if loadfont $font ; then
set gfxmode=auto
load_video
insmod gfxterm
set locale_dir=$prefix/locale
set lang=fr_FR
insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
set timeout=10
else
if [ x$feature_timeout_style = xy ] ; then
set timeout_style=hidden
set timeout=10
# Fallback hidden-timeout code in case the timeout_style feature is
# unavailable.
elif sleep --interruptible 10 ; then
set timeout=10
fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
clear
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
set gfxpayload="${1}"
if [ "${1}" = "keep" ]; then
set vt_handoff=vt.handoff=1
else
set vt_handoff=
fi
}
if [ "${recordfail}" != 1 ]; then
if [ -e ${prefix}/gfxblacklist.txt ]; then
if hwmatch ${prefix}/gfxblacklist.txt 3; then
if [ ${match} = 0 ]; then
set linux_gfx_mode=keep
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=text
fi
else
set linux_gfx_mode=keep
fi
else
set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
initrd /initrd.img-4.15.0-99-generic
}
submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
menuentry 'Ubuntu, with Linux 4.15.0-99-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-99-generic ...'
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-99-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-99-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-99-generic ...'
linux /vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-99-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
gfxmode $linux_gfx_mode
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-96-generic ...'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash $vt_handoff
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-96-generic
}
menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
recordfail
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2 7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
echo 'Loading Linux 4.15.0-96-generic ...'
linux /vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset
echo 'Loading initial ramdisk ...'
initrd /initrd.img-4.15.0-96-generic
}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/25_custom ###
menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}
menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}
menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}
menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}
menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}
menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}
menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}
menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###
### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries. Simply type the
# menu entries you want to add after this comment. Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f ${config_directory}/custom.cfg ]; then
source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f $prefix/custom.cfg ]; then
source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###
==================== sda2: Location of files loaded by Grub ====================
GiB - GB File Fragment(s)
0.626422882 = 0.672616448 grub/grub.cfg 1
0.840801239 = 0.902803456 vmlinuz-4.15.0-96-generic 2
0.688465118 = 0.739233792 vmlinuz-4.15.0-99-generic 2
1.010154724 = 1.084645376 initrd.img-4.15.0-96-generic 4
0.954097748 = 1.024454656 initrd.img-4.15.0-99-generic 7
======================== Unknown MBRs/Boot Sectors/etc =========================
Unknown BootLoader on sda3
00000000 4c 55 4b 53 ba be 00 01 61 65 73 00 00 00 00 00 |LUKS....aes.....|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 78 74 73 2d 70 6c 61 69 |........xts-plai|
00000030 6e 36 34 00 00 00 00 00 00 00 00 00 00 00 00 00 |n64.............|
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 40 |...............@|
00000070 39 35 25 05 e2 9f f9 a3 50 4a 09 20 b3 ab e5 97 |95%.....PJ. ....|
00000080 a7 0a fb 41 4f f3 93 95 59 55 de 1a 53 45 31 d5 |...AO...YU..SE1.|
00000090 3b 3d 86 25 b5 2d 61 57 64 98 03 25 ac 9f b5 77 |;=.%.-aWd..%...w|
000000a0 e4 eb 0a 15 00 01 7a 23 35 63 61 30 66 30 32 37 |......z#5ca0f027|
000000b0 2d 31 37 32 30 2d 34 31 33 62 2d 61 39 62 38 2d |-1720-413b-a9b8-|
000000c0 33 37 31 32 61 39 61 34 34 35 37 61 00 00 00 00 |3712a9a4457a....|
000000d0 00 ac 71 f3 00 17 a2 38 82 45 6c 5d 07 96 00 9e |..q....8.El]....|
000000e0 26 34 43 d9 3b b7 10 b2 90 dc a4 d8 4b 64 ac bc |&4C.;.......Kd..|
000000f0 49 4b e6 5c 92 d4 26 28 00 00 00 08 00 00 0f a0 |IK.\..&(........|
00000100 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000120 00 00 00 00 00 00 00 00 00 00 02 00 00 00 0f a0 |................|
00000130 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000150 00 00 00 00 00 00 00 00 00 00 03 f8 00 00 0f a0 |................|
00000160 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000180 00 00 00 00 00 00 00 00 00 00 05 f0 00 00 0f a0 |................|
00000190 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001b0 00 00 00 00 00 00 00 00 00 00 07 e8 00 00 0f a0 |................|
000001c0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
000001e0 00 00 00 00 00 00 00 00 00 00 09 e0 00 00 0f a0 |................|
000001f0 00 00 de ad 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000200
=============================== StdErr Messages ================================
File descriptor 63 (pipe:[57614]) leaked on lvs invocation. Parent PID 3258: /bin/bash
File descriptor 63 (pipe:[57614]) leaked on lvchange invocation. Parent PID 12396: /bin/bash
/usr/share/boot-sav/b-i-s-functions.sh: ligne 1655: 972201984S : valeur trop grande pour la base (le symbole erroné est « 972201984S »)
================================= User choice ==================================
Y a-t-il un RAID sur cet ordinateur ? no
================================ LVM activation ================================
modprobe dm-mod
vgscan --mknodes
Reading volume groups from cache.
Found volume group "ubuntu-vg" using metadata type lvm2
vgchange -ay
2 logical volume(s) in volume group "ubuntu-vg" now active
lvscan
ACTIVE '/dev/ubuntu-vg/root' [463.58 GiB] inherit
ACTIVE '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
blkid -g
=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount -r /dev/sda3 : Error code 32
=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount -r /dev/sda3 : Error code 32
Suggested repair: ______________________________________________________________
The default repair of the Boot-Repair utility would purge (in order to fix packages) and reinstall the grub2 of mapper/ubuntu--vg-root into the MBR of sda, using the following options: sda2/boot,
Grub-efi would not be selected by default because: no-win-efi
Additional repair would be performed: unhide-bootmenu-10s restore-efi-backups
Blockers in case of suggested repair: __________________________________________
GPT détecté. Veuillez créer une partition BIOS-Boot (>1MB, système de fichiers non formaté, drapeau bios_grub). Cela peut être réalisé via des outils tels que Gparted. Puis réessayez.
Alternativement, vous pouvez réessayer après avoir activé l'option [Partition /boot/efi séparée :].
Advice in case of suggested repair: ____________________________________________
You may want to retry after mounting your encrypted partitions so that the tool can verify their contents. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?
On peut voir "boot-info-4ppa96" sur la première ligne du Boot-info. Cette version 4ppa96 de Boot-info est obsolète (on en est à la version 4ppa103). Je te prie de donner le retour complet de la commande suivante :
sudo apt update
Motif : on pourra vérifier si tu reçois bien les mises à jour pour Boot-info. On doit y trouver une ligne "http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic InRelease"
Dernière modification par malbo (Le 08/05/2020, à 06:38)
Hors ligne
#25 Le 08/05/2020, à 08:50
- Vertsaxo
Re : supprimer chiffrement global avant mise à jour version
Voici le retour de la commande :
vincent@vincent-UBUntu:~$ sudo apt update
[sudo] Mot de passe de vincent :
Atteint :1 http://fr.archive.ubuntu.com/ubuntu bionic InRelease
Réception de :2 http://fr.archive.ubuntu.com/ubuntu bionic-updates InRelease [88,7 kB]
Réception de :3 http://security.ubuntu.com/ubuntu bionic-security InRelease [88,7 kB]
Ign :4 http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic InRelease
Ign :5 http://linux.dropbox.com/ubuntu bionic InRelease
Réception de :6 http://linux.dropbox.com/ubuntu bionic Release [6600 B]
Ign :7 http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic InRelease
Réception de :8 http://fr.archive.ubuntu.com/ubuntu bionic-backports InRelease [74,6 kB]
Réception de :9 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic InRelease [15,4 kB]
Err :10 http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic Release
404 Not Found [IP : 91.189.95.83 80]
Err :12 http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic Release
404 Not Found [IP : 91.189.95.83 80]
Réception de :13 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main i386 Packages [675 kB]
Réception de :14 http://security.ubuntu.com/ubuntu bionic-security/main amd64 DEP-11 Metadata [40,6 kB]
Réception de :15 http://security.ubuntu.com/ubuntu bionic-security/universe amd64 DEP-11 Metadata [42,1 kB]
Réception de :16 http://security.ubuntu.com/ubuntu bionic-security/multiverse amd64 DEP-11 Metadata [2464 B]
Réception de :17 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [932 kB]
Réception de :18 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic/main i386 Packages [1972 B]
Réception de :19 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic/main amd64 Packages [1972 B]
Réception de :20 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main amd64 DEP-11 Metadata [303 kB]
Réception de :21 http://fr.archive.ubuntu.com/ubuntu bionic-updates/universe amd64 DEP-11 Metadata [273 kB]
Réception de :22 http://fr.archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 DEP-11 Metadata [2468 B]
Réception de :23 http://fr.archive.ubuntu.com/ubuntu bionic-backports/universe amd64 DEP-11 Metadata [7972 B]
Lecture des listes de paquets... Fait
E: Le dépôt http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic Release n'a pas de fichier Release.
N: Les mises à jour depuis un tel dépôt ne peuvent s'effectuer de manière sécurisée, et sont donc désactivées par défaut.
N: Voir les pages de manuel d'apt-secure(8) pour la création des dépôts et les détails de configuration d'un utilisateur.
E: Le dépôt http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic Release n'a pas de fichier Release.
N: Les mises à jour depuis un tel dépôt ne peuvent s'effectuer de manière sécurisée, et sont donc désactivées par défaut.
N: Voir les pages de manuel d'apt-secure(8) pour la création des dépôts et les détails de configuration d'un utilisateur.
vincent@vincent-UBUntu:~$
Hors ligne