Hello Hans,
this is exactly what I did. To be precise, I followed this guide [1], with
the difference that instead of "crypt" I used the actual name, luks-<UUID>
(Disks thanksfully shows everything relevant). It's not the first time I'm
doing this. Yet I experience the errors mentioned. Sure, I'm not using the
-u flag with update-initramfs as I see no point in updating what's already
broken, I just use -ck all. But that shouldn't make a difference.

Best
Richard

[1]: https://wiki.debian.org/GrubEFIReinstall

Am Mi., 24. Apr. 2024 um 08:35 Uhr schrieb Hans <hans.ullr...@loop.de>:

> Am Dienstag, 23. April 2024, 22:26:17 CEST schrieb Richard:
>
> Hi Richard,
>
> this is, what I am doing when this happens:
>
> 1. booting into a live system (any new is working, I prefer kali-linux)
>
> 2. If you are using encrypted filesystems, open it. But you have to name
> it like it is named in /etc/crypttab of the defective system
>
> 3. Now mount the device with root-filesystem to /mnt
>
> 4. If you have /boot as a separated partition, mount it to /mnt/boot
>
> 5. Now mount needed system directories to /mnt
>
>     mount --bind /sys /mnt/sys
>
>     mount --bind /proc /mnt/proc
>
>     mount --bind /dev /mnt/dev
>
> 6. If everything is mounted correct, you can chroot into the mounted system
>
>     chroot /mnt
>
> 7. Now you can create a new initrd
>
>     update-initramfs -u
>
>
>
> 8. exit the chroot and reboot.
>
>
> ------------------------------
>
>
> Note:
>
> 1. if you have encrypted filesystems, check in the chroot the files
>
> /etc/crypttab
>
> /etc/cryptsetup-initramfs/conf-hook
>
> In conf-hook check the last line, the parm "ASKPASS=Y" should be commented
> out.
>
> 2. You can check the UUID of every partition with the command
>
>     blkid /dev/sda1
>
> and compare it with the entries in /etc/fstab, /etc/crypttab and
> everywhere else it is used.
>
> 3. In chroot, you can of course also create a new initrd, using
>
>     update-initramfs -c -k all
>
> 4. Please remember, when you have encrypted partitions, then the UUID of
> the device is other, than the partitions, you later mount. Example:
>
> blkid /dev/sda3
>
> UUID=1234556-dfre-3456.............
>
> Now
>
> cryptsetup luksOpen /dev/sda3 crypt_sda3
>
> blkid /dev/mapper/crypt_sda3
>
> UUID=9876g54-765g-87hg............
>
> Watch this, when changing any UUIDs in /etc/fstab or anywhere else.
>
> Last but not least: Hope this helps, good luck!
>
> Best
>
> Hans
>
>
>
>

Reply via email to