Contenu | Rechercher | Menus

Annonce

Si vous avez des soucis pour rester connecté, déconnectez-vous puis reconnectez-vous depuis ce lien en cochant la case
Me connecter automatiquement lors de mes prochaines visites.

À propos de l'équipe du forum.

#1 Le 26/04/2020, à 22:19

Vertsaxo

supprimer chiffrement global avant mise à jour version

Bonjour,
je voudrais passer à la nouvelle version LTS d'Ubuntu, je suis pour le moment sur la version LTS précédente, 18.4.
j'avais installé avec chiffrement et par précaution j'aurai voulu supprimer le chiffrement avant de faire la mise à jour

et je n'ai aucune idée comment procéder, je ne trouve rien qui m'éclaire.

cordialement

Vert saxo

Hors ligne

#2 Le 26/04/2020, à 22:45

geole

Re : supprimer chiffrement global avant mise à jour version

Bonsoir.
Tu es en version 18.04 encore maintenue 3 ans. Continue de  faire sa mise â jour. Tout ira bien.

Dans deux ans, tu pourras installer la 22.04 â coté. Tu en profiteras pour ne pas chiffrer le logiciel
.
Si tu ne veux plus chiffrer tes données, fabrique une nouvelle partition et fais les transferts des répertoires de données.


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#3 Le 27/04/2020, à 16:33

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour et merci géole pour cette réponse

en fait je voulais mettre à jour pour deux raisons :
mon épouse va acheter un portable sur lequel je voudrais la convaincre d'installer ubuntu plutôt que windows et j'aurai voulu lui montrer le dernier système en date
- cela fait des mois que j'ai un dysfonctionnement avec Ubuntu 18.4 : je suis obligé de passer par le bios à chaque démarrage sinon il ne démarre pas. en activant un réparateur, il me signale le chiffrement et me demande si je veux postposer la réparation pour d'abord désactiver le chiffrement donc je me dis que cela fait sens.


cordialement

Vertsaxo

Hors ligne

#4 Le 27/04/2020, à 16:55

geole

Re : supprimer chiffrement global avant mise à jour version

Bonjour
Tu peux toujours faire un boot-info. Quelquefois on voit des anomalies.
Cela serait bien que tu donnes le nom du  "réparateur " et la phrase exacte de son conseil.
Si tu évoques boot-repair/boot-info , afin d'accéder à la partition, il doit te demander de monter la partition à sa place car il ne connaît pas la phrase d'ouverture pour lire le contenu. Mais cela ne doit pas être une raison pour ne pas chiffrer si tu as trouvé que cela était nécessaire.


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#5 Le 28/04/2020, à 12:06

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
il s'agissait bien de boot-repair
voici le message :
"Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?"

je voulais déchiffrer avant de réparer puis rechiffrer après...

voici le lien vers mes info de boot :
 
http://paste.ubuntu.com/p/C4wVWBJ8nZ/

cordialement,
VertSaxo

Hors ligne

#6 Le 28/04/2020, à 12:52

geole

Re : supprimer chiffrement global avant mise à jour version

Bonjour
Effectivement le message est  aussi visible  dans boot-info

=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?

Je vais tenter de demander à l'auteur de voir s'il ne serait pas possible de changer la traduction. Je pense à une phrase de ce style

=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir monté vos partitions chiffrées  afin que l'outil puisse examiner leur contenu. ([url]http://doc.ubuntu-fr.org/ecryptfs[/url]
Voulez-vous continuer ?)

En fait, comme  c'est chiffré, il est impossible de voir le contenu   de certaines zones et surtout boot-repair n'a pas la possibilité de modifier certains  fichiers.   Je pense notamment au fichier /etc/fstab qui  doit souvent être rectifié.

Pour le boot-info, on a souvent besoin de voir  le contenu de /etc/fstab   lorsque le boot dure plus de 1 minutes 30 secondes afin de  s'assurer qu'il n'est pas prévu le montage de partitions inexistantes ou un mauvais montage de partitions existantes.

Donc soit rassuré
.
Cependant, il me semble souvent inutile de chiffrer le logiciel mais seulement les données personnelles.  Cela  donne le risque de retrouver des données personnelles totalement visibles dans le fichier de swap pour des experts ainsi que dans les plantages de l'O.S. communiqués aux experts ou certains extraits d'O.S.  donc une sécurité au rabais probablement à 99,9999999%  donc acceptable pour pas mal de personnes

a@a:~$ sudo blkid | grep LUK
/dev/sda18: UUID="f3b2bb4d-f5f1-4963-984b-684cb7feb5b0" TYPE="crypto_LUKS" PARTLABEL="sda27_crypt" PARTUUID="4890dbb2-cf70-4307-9422-73d7ffbc2886"
/dev/sda19: UUID="16f1cc0a-2cc5-4ed6-893d-f233cf283821" TYPE="crypto_LUKS" PARTLABEL="sda28_crypt" PARTUUID="2c98f23a-d74f-4ddb-8332-b1be866d0c8c"
a@a:~$ 


Une suggestion:
   Libère 15 Go (30 Go c'est mieux)  d'espace disque et installe ubuntu 20.04  en dual  boot de façon standard à coté , puis tu  installeras ecryptfs pour accéder aux données avec  un montage automatique et des liens pour y accéder automatiquement.  Cela te permettra d'avoir une partition de données chiffrées   indépendante  qui récupérera un peu de place lorsque tu élimineras le logiciel de la version 18.04

Dernière modification par geole (Le 28/04/2020, à 13:17)


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#7 Le 28/04/2020, à 13:06

malbo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
Je colle ci-dessous le contenu du Boot-info dont tu as donné le lien dans le post #5 :

Boot Info Script 71f6c5c + Boot-Repair extra info      [Boot-Info 16mar2020]


============================= Boot Info Summary: ===============================

 => No boot loader is installed in the MBR of /dev/sda.

sda1: __________________________________________________________________________

    File system:       vfat
    Boot sector type:  FAT32
    Boot sector info:  No errors found in the Boot Parameter Block.
    Operating System:  
    Boot files:        

sda2: __________________________________________________________________________

    File system:       ext4
    Boot sector type:  -
    Boot sector info: 
    Operating System:  
    Boot files:        /grub/grub.cfg

sda3: __________________________________________________________________________

    File system:       crypto_LUKS
    Boot sector type:  Unknown
    Boot sector info: 

============================ Drive/Partition Info: =============================

Drive: sda _____________________________________________________________________
Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt

Partition  Boot  Start Sector    End Sector  # of Sectors  Id System

/dev/sda1                   1   976,773,167   976,773,167  ee GPT


GUID Partition Table detected.

Partition  Attrs   Start Sector    End Sector  # of Sectors System
/dev/sda1                 2,048     1,050,623     1,048,576 EFI System partition
/dev/sda2             1,050,624     2,549,759     1,499,136 Data partition (Linux)
/dev/sda3             2,549,760   976,771,071   974,221,312 Data partition (Linux)

Attributes: R=Required, N=No Block IO, B=Legacy BIOS Bootable, +=More bits set

"blkid" output: ________________________________________________________________

Device           UUID                                   TYPE       LABEL

/dev/loop0                                              squashfs   
/dev/loop1                                              squashfs   
/dev/loop10                                             squashfs   
/dev/loop11                                             squashfs   
/dev/loop12                                             squashfs   
/dev/loop13                                             squashfs   
/dev/loop14                                             squashfs   
/dev/loop15                                             squashfs   
/dev/loop16                                             squashfs   
/dev/loop17                                             squashfs   
/dev/loop18                                             squashfs   
/dev/loop19                                             squashfs   
/dev/loop2                                              squashfs   
/dev/loop20                                             squashfs   
/dev/loop21                                             squashfs   
/dev/loop22                                             squashfs   
/dev/loop3                                              squashfs   
/dev/loop4                                              squashfs   
/dev/loop5                                              squashfs   
/dev/loop6                                              squashfs   
/dev/loop7                                              squashfs   
/dev/loop8                                              squashfs   
/dev/loop9                                              squashfs   
/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member 
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e   ext4       
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140   swap       
/dev/sda1        5BC2-2AC0                              vfat       
/dev/sda2        7f24874a-5e0c-45c5-90b4-ada2b13f0994   ext4       
/dev/sda3        5ca0f027-1720-413b-a9b8-3712a9a4457a   crypto_LUKS 

========================= "ls -l /dev/disk/by-id" output: ======================

total 0
lrwxrwxrwx 1 root root  9 Apr 28 10:56 ata-ASUS_DRW-2014S1T -> ../../sr0
lrwxrwxrwx 1 root root  9 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X -> ../../sda
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part2 -> ../../sda2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 ata-Samsung_SSD_860_EVO_500GB_S3Z2NB0M434551X-part3 -> ../../sda3
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-sda3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-ubuntu--vg-root -> ../../dm-1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-name-ubuntu--vg-swap_1 -> ../../dm-2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-CRYPT-LUKS1-5ca0f0271720413ba9b83712a9a4457a-sda3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJ4b3C7hyZmOZnUZRlz5GMw9hqGy1yqOfe -> ../../dm-1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJJIIqpN1oepBNCcd01TVe2YIDJyqGUazS -> ../../dm-2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 lvm-pv-uuid-9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y -> ../../dm-0
lrwxrwxrwx 1 root root  9 Apr 28 11:30 wwn-0x5002538e40ee83f6 -> ../../sda
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part1 -> ../../sda1
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part2 -> ../../sda2
lrwxrwxrwx 1 root root 10 Apr 28 11:30 wwn-0x5002538e40ee83f6-part3 -> ../../sda3

========================= "ls -R /dev/mapper/" output: =========================

/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1

================================ Mount points: =================================

Device           Mount_Point              Type       Options

/dev/mapper/ubuntu--vg-root /                        ext4       (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda1        /boot/efi                vfat       (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sda2        /boot                    ext4       (rw,relatime,data=ordered)


============================= sda2/grub/grub.cfg: ==============================

--------------------------------------------------------------------------------
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#

### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
  set have_grubenv=true
  load_env
fi
if [ "${next_entry}" ] ; then
   set default="${next_entry}"
   set next_entry=
   save_env next_entry
   set boot_once=true
else
   set default="0"
fi

if [ x"${feature_menuentry_id}" = xy ]; then
  menuentry_id_option="--id"
else
  menuentry_id_option=""
fi

export menuentry_id_option

if [ "${prev_saved_entry}" ]; then
  set saved_entry="${prev_saved_entry}"
  save_env saved_entry
  set prev_saved_entry=
  save_env prev_saved_entry
  set boot_once=true
fi

function savedefault {
  if [ -z "${boot_once}" ]; then
    saved_entry="${chosen}"
    save_env saved_entry
  fi
}
function recordfail {
  set recordfail=1
  if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
  if [ x$feature_all_video_module = xy ]; then
    insmod all_video
  else
    insmod efi_gop
    insmod efi_uga
    insmod ieee1275_fb
    insmod vbe
    insmod vga
    insmod video_bochs
    insmod video_cirrus
  fi
}

if [ x$feature_default_font_path = xy ] ; then
   font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
    font="/grub/unicode.pf2"
fi

if loadfont $font ; then
  set gfxmode=auto
  load_video
  insmod gfxterm
  set locale_dir=$prefix/locale
  set lang=fr_FR
  insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
  set timeout=30
else
  if [ x$feature_timeout_style = xy ] ; then
    set timeout_style=hidden
    set timeout=10
  # Fallback hidden-timeout code in case the timeout_style feature is
  # unavailable.
  elif sleep --interruptible 10 ; then
    set timeout=0
  fi
fi
### END /etc/grub.d/00_header ###

### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
  clear
fi
### END /etc/grub.d/05_debian_theme ###

### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
	set gfxpayload="${1}"
	if [ "${1}" = "keep" ]; then
		set vt_handoff=vt.handoff=1
	else
		set vt_handoff=
	fi
}
if [ "${recordfail}" != 1 ]; then
  if [ -e ${prefix}/gfxblacklist.txt ]; then
    if hwmatch ${prefix}/gfxblacklist.txt 3; then
      if [ ${match} = 0 ]; then
        set linux_gfx_mode=keep
      else
        set linux_gfx_mode=text
      fi
    else
      set linux_gfx_mode=text
    fi
  else
    set linux_gfx_mode=keep
  fi
else
  set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	recordfail
	load_video
	gfxmode $linux_gfx_mode
	insmod gzio
	if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
	insmod part_gpt
	insmod ext2
	set root='hd0,gpt2'
	if [ x$feature_platform_search_hint = xy ]; then
	  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
	else
	  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
	fi
        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
	initrd	/initrd.img-4.15.0-96-generic
}
submenu 'Options avancées pour Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	menuentry 'Ubuntu, avec Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Chargement de Linux 4.15.0-96-generic…'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Chargement du disque mémoire initial…'
		initrd	/initrd.img-4.15.0-96-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Chargement de Linux 4.15.0-96-generic…'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Chargement du disque mémoire initial…'
		initrd	/initrd.img-4.15.0-96-generic
	}
	menuentry 'Ubuntu, avec Linux 4.15.0-91-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-91-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Chargement de Linux 4.15.0-91-generic…'
	        linux	/vmlinuz-4.15.0-91-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Chargement du disque mémoire initial…'
		initrd	/initrd.img-4.15.0-91-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-91-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-91-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Chargement de Linux 4.15.0-91-generic…'
	        linux	/vmlinuz-4.15.0-91-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Chargement du disque mémoire initial…'
		initrd	/initrd.img-4.15.0-91-generic
	}
}

### END /etc/grub.d/10_linux ###

### BEGIN /etc/grub.d/20_linux_xen ###

### END /etc/grub.d/20_linux_xen ###

### BEGIN /etc/grub.d/25_custom ###

menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}

menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}

menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}

menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}

menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}

menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}

menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}

menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###

### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###

### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
	fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###

### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries.  Simply type the
# menu entries you want to add after this comment.  Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###

### BEGIN /etc/grub.d/41_custom ###
if [ -f  ${config_directory}/custom.cfg ]; then
  source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f  $prefix/custom.cfg ]; then
  source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###
--------------------------------------------------------------------------------

=================== sda2: Location of files loaded by Grub: ====================

           GiB - GB             File                                 Fragment(s)

   0.667018890 = 0.716206080    grub/grub.cfg                                  3
   0.676742554 = 0.726646784    vmlinuz-4.15.0-91-generic                      1
   0.840801239 = 0.902803456    vmlinuz-4.15.0-96-generic                      2
   0.993160248 = 1.066397696    initrd.img-4.15.0-91-generic                   4
   0.946285248 = 1.016066048    initrd.img-4.15.0-96-generic                   3

======================== Unknown MBRs/Boot Sectors/etc: ========================

Unknown BootLoader on sda3

00000000  4c 55 4b 53 ba be 00 01  61 65 73 00 00 00 00 00  |LUKS....aes.....|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  78 74 73 2d 70 6c 61 69  |........xts-plai|
00000030  6e 36 34 00 00 00 00 00  00 00 00 00 00 00 00 00  |n64.............|
00000040  00 00 00 00 00 00 00 00  73 68 61 32 35 36 00 00  |........sha256..|
00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000060  00 00 00 00 00 00 00 00  00 00 10 00 00 00 00 40  |...............@|
00000070  39 35 25 05 e2 9f f9 a3  50 4a 09 20 b3 ab e5 97  |95%.....PJ. ....|
00000080  a7 0a fb 41 4f f3 93 95  59 55 de 1a 53 45 31 d5  |...AO...YU..SE1.|
00000090  3b 3d 86 25 b5 2d 61 57  64 98 03 25 ac 9f b5 77  |;=.%.-aWd..%...w|
000000a0  e4 eb 0a 15 00 01 7a 23  35 63 61 30 66 30 32 37  |......z#5ca0f027|
000000b0  2d 31 37 32 30 2d 34 31  33 62 2d 61 39 62 38 2d  |-1720-413b-a9b8-|
000000c0  33 37 31 32 61 39 61 34  34 35 37 61 00 00 00 00  |3712a9a4457a....|
000000d0  00 ac 71 f3 00 17 a2 38  82 45 6c 5d 07 96 00 9e  |..q....8.El]....|
000000e0  26 34 43 d9 3b b7 10 b2  90 dc a4 d8 4b 64 ac bc  |&4C.;.......Kd..|
000000f0  49 4b e6 5c 92 d4 26 28  00 00 00 08 00 00 0f a0  |IK.\..&(........|
00000100  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000110  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000120  00 00 00 00 00 00 00 00  00 00 02 00 00 00 0f a0  |................|
00000130  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000140  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000150  00 00 00 00 00 00 00 00  00 00 03 f8 00 00 0f a0  |................|
00000160  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000170  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000180  00 00 00 00 00 00 00 00  00 00 05 f0 00 00 0f a0  |................|
00000190  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001b0  00 00 00 00 00 00 00 00  00 00 07 e8 00 00 0f a0  |................|
000001c0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001e0  00 00 00 00 00 00 00 00  00 00 09 e0 00 00 0f a0  |................|
000001f0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000200


=============================== StdErr Messages: ===============================

File descriptor 9 (/proc/6512/mountinfo) leaked on lvs invocation. Parent PID 16610: bash
File descriptor 63 (pipe:[101541]) leaked on lvs invocation. Parent PID 16610: bash
File descriptor 9 (/proc/6512/mountinfo) leaked on lvchange invocation. Parent PID 17182: bash
File descriptor 63 (pipe:[101541]) leaked on lvchange invocation. Parent PID 17182: bash
/usr/share/boot-sav/b-i-s.sh: line 2544: 972201984S: value too great for base (error token is "972201984S")

ADDITIONAL INFORMATION:

=================== log of boot-info 20200428_1130 ===================
boot-info version : 4ppa82
boot-sav version : 4ppa82
boot-sav-extra version : 4ppa82
glade2script version : 3.2.4~ppa7
BLKID BEFORE LVM ACTIVATION:
/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/loop0: TYPE="squashfs"
/dev/loop1: TYPE="squashfs"
/dev/loop2: TYPE="squashfs"
/dev/loop3: TYPE="squashfs"
/dev/loop4: TYPE="squashfs"
/dev/loop5: TYPE="squashfs"
/dev/loop6: TYPE="squashfs"
/dev/loop7: TYPE="squashfs"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"
/dev/loop8: TYPE="squashfs"
/dev/loop9: TYPE="squashfs"
/dev/loop10: TYPE="squashfs"
/dev/loop11: TYPE="squashfs"
/dev/loop12: TYPE="squashfs"
/dev/loop13: TYPE="squashfs"
/dev/loop14: TYPE="squashfs"
/dev/loop15: TYPE="squashfs"
/dev/loop16: TYPE="squashfs"
/dev/loop17: TYPE="squashfs"
/dev/loop18: TYPE="squashfs"
/dev/loop19: TYPE="squashfs"
/dev/loop20: TYPE="squashfs"
/dev/loop21: TYPE="squashfs"
/dev/loop22: TYPE="squashfs"
MODPROBE
VGSCAN
File descriptor 9 (/proc/6512/mountinfo) leaked on vgscan invocation. Parent PID 6524: /bin/bash
Reading volume groups from cache.
Found volume group "ubuntu-vg" using metadata type lvm2
VGCHANGE
File descriptor 9 (/proc/6512/mountinfo) leaked on vgchange invocation. Parent PID 6524: /bin/bash
2 logical volume(s) in volume group "ubuntu-vg" now active
File descriptor 9 (/proc/6512/mountinfo) leaked on lvscan invocation. Parent PID 6524: /bin/bash
LVSCAN:
ACTIVE            '/dev/ubuntu-vg/root' [463.58 GiB] inherit
ACTIVE            '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
Gtk-Message: 11:30:51.622: GtkDialog mapped without a transient parent. This is discouraged.
Y a-t-il un RAID sur cet ordinateur ? no
File descriptor 9 (/proc/6512/mountinfo) leaked on lvs invocation. Parent PID 8211: /bin/sh
Error: /dev/mapper/sda3_crypt: unrecognised disk label
boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s):      32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount -r /dev/sda3 : Error code 32

=================== os-prober:
/dev/mapper/ubuntu--vg-root:L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession:linux

=================== blkid:
/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/loop0: TYPE="squashfs"
/dev/loop1: TYPE="squashfs"
/dev/loop2: TYPE="squashfs"
/dev/loop3: TYPE="squashfs"
/dev/loop4: TYPE="squashfs"
/dev/loop5: TYPE="squashfs"
/dev/loop6: TYPE="squashfs"
/dev/loop7: TYPE="squashfs"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"
/dev/loop8: TYPE="squashfs"
/dev/loop9: TYPE="squashfs"
/dev/loop10: TYPE="squashfs"
/dev/loop11: TYPE="squashfs"
/dev/loop12: TYPE="squashfs"
/dev/loop13: TYPE="squashfs"
/dev/loop14: TYPE="squashfs"
/dev/loop15: TYPE="squashfs"
/dev/loop16: TYPE="squashfs"
/dev/loop17: TYPE="squashfs"
/dev/loop18: TYPE="squashfs"
/dev/loop19: TYPE="squashfs"
/dev/loop20: TYPE="squashfs"
/dev/loop21: TYPE="squashfs"
/dev/loop22: TYPE="squashfs"

Set sda as corresponding disk of mapper/ubuntu--vg-root

1 disks with OS, 1 OS : 1 Linux, 0 MacOS, 0 Windows, 0 unknown type OS.

mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.
mount -r /dev/sda3 : Error code 32

=================== /etc/grub.d/ :
drwxr-xr-x  2 root root     4096 avril 12 23:21 grub.d
drwxr-xr-x  2 root root     4096 déc.  25 21:12 grub.d.bak
total 80
-rwxr-xr-x 1 root root 10046 nov.  11 06:52 00_header
-rwxr-xr-x 1 root root  6258 mars  18  2019 05_debian_theme
-rwxr-xr-x 1 root root 12693 nov.  11 06:52 10_linux
-rwxr-xr-x 1 root root 11298 nov.  11 06:52 20_linux_xen
-rwxr-xr-x 1 root root  1229 déc.  28 23:39 25_custom
-rwxr-xr-x 1 root root 12059 nov.  11 06:52 30_os-prober
-rwxr-xr-x 1 root root  1418 nov.  11 06:52 30_uefi-firmware
-rwxr-xr-x 1 root root   214 nov.  11 06:52 40_custom
-rwxr-xr-x 1 root root   216 nov.  11 06:52 41_custom
-rw-r--r-- 1 root root   483 nov.  11 06:52 README




=================== /etc/default/grub :

# If you change this file, run 'update-grub' afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
#   info -f grub -n 'Simple configuration'

GRUB_DEFAULT=0
GRUB_TIMEOUT_STYLE=hidden
GRUB_TIMEOUT=10
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
GRUB_CMDLINE_LINUX=""

# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM="0x01234567,0xfefefefe,0x89abcdef,0xefefefef"

# Uncomment to disable graphical terminal (grub-pc only)
#GRUB_TERMINAL=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo'
#GRUB_GFXMODE=640x480

# Uncomment if you don't want GRUB to pass "root=UUID=xxx" parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY="true"

# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE="480 440 1"



/boot/efi detected in the fstab of mapper/ubuntu--vg-root: UUID=5BC2-2AC0	 (sda1)
/boot detected in the fstab of mapper/ubuntu--vg-root: UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994  (sda2)
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/fbx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/bootx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi

=================== efibootmgr -v
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0000,0002,0001,0004,0005
Boot0000* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)
Boot0001* CD/DVD Drive 	BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive 	BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO
Boot0004* UEFI OS	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIBOOTBOOTX64.EFI)
Boot0005* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIUbuntugrubx64.efi)

=================== UEFI/Legacy mode:
BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session.
SecureBoot enabled.


=================== PARTITIONS & DISKS:
mapper/ubuntu--vg-root	: sda,	not-sepboot,	grubenv-ok	grub2,	signed grub-efi ,	update-grub,	64,	with-boot,	is-os,	not--efi--part,	fstab-has-goodBOOT,	fstab-has-goodEFI,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	apt-get,	grub-install,	with--usr,	fstab-without-usr,	not-sep-usr,	standard,	not-far,	notbiosboot, .
sda1	: sda,	not-sepboot,	no-grubenv	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	is-correct-EFI,	part-has-no-fstab,	part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall,	no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	not-far,	notbiosboot, /boot/efi.
sda2	: sda,	is-sepboot,	grubenv-ok	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	is-maybe-EFI,	part-has-no-fstab,	part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall,	no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	not-far,	notbiosboot, /boot.
sda3	: sda,	maybesepboot,	no-grubenv	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	not--efi--part,	part-has-no-fstab,	part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall,	no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	farbios,	notbiosboot, /mnt/boot-sav/sda3.

sda	: GPT,	no-BIOS_boot,	has-correctEFI, 	not-usb,	not-mmc, has-os,	2048 sectors * 512 bytes


=================== parted -lm:

BYT;
/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;

BYT;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;

BYT;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;

BYT;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;

=================== lsblk:
KNAME  TYPE  FSTYPE        SIZE LABEL
loop0  loop  squashfs     14,8M
loop1  loop  squashfs    173,3M
loop2  loop  squashfs     44,2M
loop3  loop  squashfs    160,2M
loop4  loop  squashfs    140,7M
loop5  loop  squashfs    156,7M
loop6  loop  squashfs    140,7M
loop7  loop  squashfs     91,3M
loop8  loop  squashfs      3,5M
loop9  loop  squashfs     91,4M
loop10 loop  squashfs      4,2M
loop11 loop  squashfs      4,2M
loop12 loop  squashfs      3,7M
loop13 loop  squashfs    265,4M
loop14 loop  squashfs     14,8M
loop15 loop  squashfs     54,6M
loop16 loop  squashfs      956K
loop17 loop  squashfs    173,5M
loop18 loop  squashfs      3,7M
loop19 loop  squashfs     44,9M
loop20 loop  squashfs     54,7M
loop21 loop  squashfs    260,7M
loop22 loop  squashfs      956K
sda    disk              465,8G
sda1   part  vfat          512M
sda2   part  ext4          732M
sda3   part  crypto_LUKS 464,6G
sr0    rom                1024M
dm-0   crypt LVM2_member 464,6G
dm-1   lvm   ext4        463,6G
dm-2   lvm   swap          980M

KNAME  ROTA RO RM STATE   MOUNTPOINT
loop0     1  1  0         /snap/gnome-characters/375
loop1     1  1  0         /snap/skype/112
loop2     1  1  0         /snap/gtk-common-themes/1353
loop3     1  1  0         /snap/gnome-3-28-1804/116
loop4     1  1  0         /snap/gnome-3-26-1604/92
loop5     1  1  0         /snap/gnome-3-28-1804/110
loop6     1  1  0         /snap/gnome-3-26-1604/98
loop7     1  1  0         /snap/core/8592
loop8     1  1  0         /snap/falkon/60
loop9     1  1  0         /snap/core/8689
loop10    1  1  0         /snap/gnome-calculator/544
loop11    1  1  0         /snap/gnome-calculator/501
loop12    1  1  0         /snap/gnome-system-monitor/123
loop13    1  1  0         /snap/kde-frameworks-5-core18/29
loop14    1  1  0         /snap/gnome-characters/399
loop15    1  1  0         /snap/core18/1288
loop16    1  1  0         /snap/gnome-logs/73
loop17    1  1  0         /snap/skype/115
loop18    1  1  0         /snap/gnome-system-monitor/127
loop19    1  1  0         /snap/gtk-common-themes/1440
loop20    1  1  0         /snap/core18/1668
loop21    1  1  0         /snap/kde-frameworks-5-core18/32
loop22    1  1  0         /snap/gnome-logs/81
sda       0  0  0 running
sda1      0  0  0         /boot/efi
sda2      0  0  0         /boot
sda3      0  0  0
sr0       1  0  1 running
dm-0      0  0  0 running
dm-1      0  0  0 running /
dm-2      0  0  0 running [SWAP]


=================== mount:
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=4003652k,nr_inodes=1000913,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=807244k,mode=755)
/dev/mapper/ubuntu--vg-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/unified type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,name=systemd)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
cgroup on /sys/fs/cgroup/rdma type cgroup (rw,nosuid,nodev,noexec,relatime,rdma)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=25,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=2597)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
configfs on /sys/kernel/config type configfs (rw,relatime)
/var/lib/snapd/snaps/gnome-characters_375.snap on /snap/gnome-characters/375 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/skype_112.snap on /snap/skype/112 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gtk-common-themes_1353.snap on /snap/gtk-common-themes/1353 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-28-1804_116.snap on /snap/gnome-3-28-1804/116 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-26-1604_92.snap on /snap/gnome-3-26-1604/92 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-28-1804_110.snap on /snap/gnome-3-28-1804/110 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/falkon_60.snap on /snap/falkon/60 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-3-26-1604_98.snap on /snap/gnome-3-26-1604/98 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core_8592.snap on /snap/core/8592 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core_8689.snap on /snap/core/8689 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-calculator_544.snap on /snap/gnome-calculator/544 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-calculator_501.snap on /snap/gnome-calculator/501 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-system-monitor_123.snap on /snap/gnome-system-monitor/123 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-characters_399.snap on /snap/gnome-characters/399 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/kde-frameworks-5-core18_29.snap on /snap/kde-frameworks-5-core18/29 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core18_1288.snap on /snap/core18/1288 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-logs_73.snap on /snap/gnome-logs/73 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/skype_115.snap on /snap/skype/115 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-system-monitor_127.snap on /snap/gnome-system-monitor/127 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gtk-common-themes_1440.snap on /snap/gtk-common-themes/1440 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/core18_1668.snap on /snap/core18/1668 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/kde-frameworks-5-core18_32.snap on /snap/kde-frameworks-5-core18/32 type squashfs (ro,nodev,relatime,x-gdu.hide)
/var/lib/snapd/snaps/gnome-logs_81.snap on /snap/gnome-logs/81 type squashfs (ro,nodev,relatime,x-gdu.hide)
/dev/sda2 on /boot type ext4 (rw,relatime,data=ordered)
/dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=807240k,mode=700,uid=1000,gid=1000)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)


=================== ls:
/sys/block/dm-0 (filtered):  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-1 (filtered):  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-2 (filtered):  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/sda (filtered):  alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sda1 sda2 sda3 size slaves stat subsystem trace uevent
/sys/block/sr0 (filtered):  alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/dev (filtered):  autofs block bsg btrfs-control bus cdrom cdrw char console core cpu cpu_dma_latency cuse disk dm-0 dm-1 dm-2 dri dvd dvdrw ecryptfs fb0 fd full fuse hidraw0 hidraw1 hidraw2 hpet hugepages hwrng i2c-0 i2c-1 i2c-2 i2c-3 i2c-4 initctl input kmsg lightnvm log mapper mcelog media0 mei0 mem memory_bandwidth mqueue net network_latency network_throughput null port ppp psaux ptmx pts random rfkill rtc rtc0 sda sda1 sda2 sda3 sg0 sg1 shm snapshot snd sr0 stderr stdin stdout ubuntu-vg uhid uinput urandom userio v4l vfio vga_arbiter vhci vhost-net vhost-vsock video0 zero
ls /dev/mapper:  control sda3_crypt ubuntu--vg-root ubuntu--vg-swap_1

=================== hexdump -n512 -C /dev/sda1
00000000  eb 58 90 6d 6b 66 73 2e  66 61 74 00 02 08 20 00  |.X.mkfs.fat... .|
00000010  02 00 00 00 00 f8 00 00  3f 00 ff 00 00 08 00 00  |........?.......|
00000020  00 00 10 00 00 04 00 00  00 00 00 00 02 00 00 00  |................|
00000030  01 00 06 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000040  80 01 29 c0 2a c2 5b 4e  4f 20 4e 41 4d 45 20 20  |..).*.[NO NAME  |
00000050  20 20 46 41 54 33 32 20  20 20 0e 1f be 77 7c ac  |  FAT32   ...w|.|
00000060  22 c0 74 0b 56 b4 0e bb  07 00 cd 10 5e eb f0 32  |".t.V.......^..2|
00000070  e4 cd 16 cd 19 eb fe 54  68 69 73 20 69 73 20 6e  |.......This is n|
00000080  6f 74 20 61 20 62 6f 6f  74 61 62 6c 65 20 64 69  |ot a bootable di|
00000090  73 6b 2e 20 20 50 6c 65  61 73 65 20 69 6e 73 65  |sk.  Please inse|
000000a0  72 74 20 61 20 62 6f 6f  74 61 62 6c 65 20 66 6c  |rt a bootable fl|
000000b0  6f 70 70 79 20 61 6e 64  0d 0a 70 72 65 73 73 20  |oppy and..press |
000000c0  61 6e 79 20 6b 65 79 20  74 6f 20 74 72 79 20 61  |any key to try a|
000000d0  67 61 69 6e 20 2e 2e 2e  20 0d 0a 00 00 00 00 00  |gain ... .......|
000000e0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
*
000001f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 55 aa  |..............U.|
00000200

=================== df -Th:

Filesystem                  Type      Size  Used Avail Use% Mounted on
udev                        devtmpfs  3.9G     0  3.9G   0% /dev
tmpfs                       tmpfs     789M  1.7M  787M   1% /run
/dev/mapper/ubuntu--vg-root ext4      456G   14G  419G   4% /
tmpfs                       tmpfs     3.9G  123M  3.8G   4% /dev/shm
tmpfs                       tmpfs     5.0M  4.0K  5.0M   1% /run/lock
tmpfs                       tmpfs     3.9G     0  3.9G   0% /sys/fs/cgroup
/dev/loop0                  squashfs   15M   15M     0 100% /snap/gnome-characters/375
/dev/loop1                  squashfs  174M  174M     0 100% /snap/skype/112
/dev/loop2                  squashfs   45M   45M     0 100% /snap/gtk-common-themes/1353
/dev/loop3                  squashfs  161M  161M     0 100% /snap/gnome-3-28-1804/116
/dev/loop4                  squashfs  141M  141M     0 100% /snap/gnome-3-26-1604/92
/dev/loop5                  squashfs  157M  157M     0 100% /snap/gnome-3-28-1804/110
/dev/loop8                  squashfs  3.5M  3.5M     0 100% /snap/falkon/60
/dev/loop6                  squashfs  141M  141M     0 100% /snap/gnome-3-26-1604/98
/dev/loop7                  squashfs   92M   92M     0 100% /snap/core/8592
/dev/loop9                  squashfs   92M   92M     0 100% /snap/core/8689
/dev/loop10                 squashfs  4.3M  4.3M     0 100% /snap/gnome-calculator/544
/dev/loop11                 squashfs  4.3M  4.3M     0 100% /snap/gnome-calculator/501
/dev/loop12                 squashfs  3.8M  3.8M     0 100% /snap/gnome-system-monitor/123
/dev/loop14                 squashfs   15M   15M     0 100% /snap/gnome-characters/399
/dev/loop13                 squashfs  266M  266M     0 100% /snap/kde-frameworks-5-core18/29
/dev/loop15                 squashfs   55M   55M     0 100% /snap/core18/1288
/dev/loop16                 squashfs  1.0M  1.0M     0 100% /snap/gnome-logs/73
/dev/loop17                 squashfs  174M  174M     0 100% /snap/skype/115
/dev/loop18                 squashfs  3.8M  3.8M     0 100% /snap/gnome-system-monitor/127
/dev/loop19                 squashfs   45M   45M     0 100% /snap/gtk-common-themes/1440
/dev/loop20                 squashfs   55M   55M     0 100% /snap/core18/1668
/dev/loop21                 squashfs  261M  261M     0 100% /snap/kde-frameworks-5-core18/32
/dev/loop22                 squashfs  1.0M  1.0M     0 100% /snap/gnome-logs/81
/dev/sda2                   ext4      705M  155M  499M  24% /boot
/dev/sda1                   vfat      511M   10M  502M   2% /boot/efi
tmpfs                       tmpfs     789M   36K  789M   1% /run/user/1000

=================== fdisk -l:
Disk /dev/loop0: 14.8 MiB, 15462400 bytes, 30200 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop1: 173.3 MiB, 181760000 bytes, 355000 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop2: 44.2 MiB, 46325760 bytes, 90480 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop3: 160.2 MiB, 167931904 bytes, 327992 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop4: 140.7 MiB, 147501056 bytes, 288088 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop5: 156.7 MiB, 164290560 bytes, 320880 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop6: 140.7 MiB, 147501056 bytes, 288088 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop7: 91.3 MiB, 95748096 bytes, 187008 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: B39D9B19-7F8F-497A-B3DE-92DD6683C417

Device       Start       End   Sectors   Size Type
/dev/sda1     2048   1050623   1048576   512M EFI System
/dev/sda2  1050624   2549759   1499136   732M Linux filesystem
/dev/sda3  2549760 976771071 974221312 464.6G Linux filesystem




Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop8: 3.5 MiB, 3612672 bytes, 7056 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop9: 91.4 MiB, 95805440 bytes, 187120 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop10: 4.2 MiB, 4403200 bytes, 8600 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop11: 4.2 MiB, 4403200 bytes, 8600 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop12: 3.7 MiB, 3825664 bytes, 7472 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop13: 265.4 MiB, 278261760 bytes, 543480 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop14: 14.8 MiB, 15462400 bytes, 30200 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop15: 54.6 MiB, 57274368 bytes, 111864 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop16: 956 KiB, 978944 bytes, 1912 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop17: 173.5 MiB, 181915648 bytes, 355304 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop18: 3.7 MiB, 3825664 bytes, 7472 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop19: 44.9 MiB, 47063040 bytes, 91920 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop20: 54.7 MiB, 57294848 bytes, 111904 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop21: 260.7 MiB, 273375232 bytes, 533936 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes


Disk /dev/loop22: 956 KiB, 978944 bytes, 1912 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes




=================== Suggested repair
The default repair of the Boot-Repair utility would purge (in order to sign-grub) and reinstall the grub-efi-amd64-signed of mapper/ubuntu--vg-root, using the following options:        sda2/boot, sda1/boot/efi,
Additional repair would be performed: unhide-bootmenu-10s    use-standard-efi-file  restore-efi-backups


=================== Advice in case of suggested repair
Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?


=================== Final advice in case of suggested repair
N'oubliez pas de régler votre BIOS pour qu'il amorce sur le fichier sda1/efi/.../grub*.efi !


=================== User settings
The settings chosen by the user will not act on the boot.

Passe la commande suivante dans un terminal :

cat /etc/fstab 

Et colle le retour complet(*) dans ta réponse.

(*) le retour complet, c'est ça : https://forum.ubuntu-fr.org/viewtopic.p … #p22040823

Dernière modification par malbo (Le 28/04/2020, à 13:09)

Hors ligne

#8 Le 29/04/2020, à 10:16

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour Malbo,
voici ce que cela donne. cordialement

vincent@vincent-UBUntu:~$ cat /etc/fstab 
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
# <file system> <mount point>   <type>  <options>       <dump>  <pass>
/dev/mapper/ubuntu--vg-root /               ext4    errors=remount-ro 0       1
# /boot was on /dev/sda2 during installation
UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994 /boot           ext4    defaults        0       2
# /boot/efi was on /dev/sda1 during installation
#UUID=5BC2-2AC0  /boot/efi       vfat    umask=0077      0       1
/dev/mapper/ubuntu--vg-swap_1 none            swap    sw              0       0
UUID=5BC2-2AC0	/boot/efi	vfat	defaults	0	1
vincent@vincent-UBUntu:~$

Dernière modification par Vertsaxo (Le 29/04/2020, à 23:23)

Hors ligne

#9 Le 29/04/2020, à 11:06

cqfd93

Re : supprimer chiffrement global avant mise à jour version

Modération

Bonjour,

Pour ajouter toi-même les balises code à ton message #8 :

  • Cliquer sur le lien « Modifier » en bas à droite du message

  • Sélectionner le texte

  • Cliquer sur le <> de l'éditeur de message
    1471986854.png


cqfd93

Hors ligne

#10 Le 29/04/2020, à 14:47

malbo

Re : supprimer chiffrement global avant mise à jour version

Pour moi, le résultat de la commande "cat /etc/fstab " est correct. Moi je ne sais pas comment supprimer le chiffrement de l'installation. Je ne sais même pas si c'est possible...

Hors ligne

#11 Le 30/04/2020, à 21:09

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

J'ai sauvegardé mes données sur une clé, puis j'ai exécuté bootrepair en passant outre l'avertissement sur la nécessité de déchiffrer préalablement, cela ne corrige pas le problème de boot noir.
C'est peut-être un problème sans solution à mon niveau de compréhension en tout cas.

voici le lien vers l'URL lié à la réparation : http://paste.ubuntu.com/p/285x2hj96p/

je suppose que je peux toujours prendre le risque de passer à 20.04 maintenant que je me suis protégé du risque de perte de données (?)

cordialement
Vertsaxo

Dernière modification par Vertsaxo (Le 30/04/2020, à 21:41)

Hors ligne

#12 Le 30/04/2020, à 22:33

geole

Re : supprimer chiffrement global avant mise à jour version

Vertsaxo a écrit :

- cela fait des mois que j'ai un dysfonctionnement avec Ubuntu 18.4 : je suis obligé de passer par le bios à chaque démarrage sinon il ne démarre pas.a

Peux-tu indiquer la référence commerciale de ton ordinateur si c'est un portable?
Peux-tu détailler la manipulation bios que tu fais?
Si ton ordinateur est un HP, il faut souvent faire une manipulation du bios.

Dernière modification par geole (Le 30/04/2020, à 22:36)


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#13 Le 01/05/2020, à 10:51

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour Géole,
c'est un ordinateur assemblé avec un processeur intel et une carte Asus
carte mère : B85-PLUS
Intel(R) Core(TM) i3-4130 CPU @ 3.40GHz

je ne fais aucune manipulation du Bios, simplement ce que j'ai remarqué c'est que si je laisse l'ordinateur démarrer par lui-même, il se bloque sur un écran noir, alors que si j'appuie sur la touche Suppr pour entrer dans le bios puis que je  clique "démarrer" il démarre ensuite normalement en me demandant la clé de décryptage, ce qui est normal.

Par ailleurs, après avoir lancé boot-repair, le message final me dit de "ne pas oublier  de régler le BIOS pour qu'il amorce sur le fichier sda1/EFI/ubuntu/shimx64.efi " je ne sais pas si cela a qlq chose à voir, puisque que cela boot. Les indications de démarrage ne sont pas formulées avec un chemin.

Hors ligne

#14 Le 01/05/2020, à 12:53

geole

Re : supprimer chiffrement global avant mise à jour version

Bonjour
Je ne sais pas donner d'idées sur le problème rencontré. Il serait bon que tu fasses un boot-info (Une nouvelle version est sortie).
Pour un peu, je penserais à un mauvais arrêt.
Peux-tu donner ce retour

sudo journalctl -b-1 | tail -50

Pour le second problème, boot-repair a bien renseigné la nvram tel qu'on peut le voir
efibootmgr -v
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0000,0002,0001,0004
Boot0000* ubuntu    HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)

/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"

Dernière modification par geole (Le 01/05/2020, à 12:57)


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#15 Le 01/05/2020, à 17:10

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

(re) bonjour Geole
voici le lien vers ce que donne le boot-info :
http://paste.ubuntu.com/p/cbbyGsYzWQ/

après le sudo jourlactl... j'obtiens ceci :

vincent@vincent-UBUntu:~$ sudo journalctl -b-1 | tail -50
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Load Kernel Modules.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local Encrypted Volumes.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Cryptography Setup for sda3_crypt...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Forward Password Requests to Wall Directory Watch.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Network Time Synchronization...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Load/Save Random Seed.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Update UTMP about System Boot/Shutdown.
avril 30 22:23:36 vincent-UBUntu systemd-cryptsetup[3606]: Failed to deactivate: Device or resource busy
avril 30 22:23:36 vincent-UBUntu systemd[1]: systemd-cryptsetup@sda3_crypt.service: Control process exited, code=exited status=1
avril 30 22:23:36 vincent-UBUntu systemd[1]: systemd-cryptsetup@sda3_crypt.service: Failed with result 'exit-code'.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Cryptography Setup for sda3_crypt.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-systemd\x2dcryptsetup.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Network Time Synchronization.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Create Volatile Files and Directories.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local File Systems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /boot/efi...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /media/vincent/C08E-EDBA...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /run/user/1000...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /boot/efi.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /run/user/1000.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Swap.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivating swap /dev/ubuntu-vg/swap_1...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounting /boot...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped File System Check on /dev/disk/by-uuid/5BC2-2AC0.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /media/vincent/C08E-EDBA.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Clean the /media/vincent/C08E-EDBA mount point...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Clean the /media/vincent/C08E-EDBA mount point.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-clean\x2dmount\x2dpoint.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/ubuntu-vg/swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-uuid/851c2f98-6fc4-4e15-a64a-3d357dc8a140.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-id/dm-uuid-LVM-7A7CBLkeemaYG8jTIp0zxt4Khed60UdJJIIqpN1oepBNCcd01TVe2YIDJyqGUazS.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/disk/by-id/dm-name-ubuntu--vg-swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/dm-2.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Deactivated swap /dev/mapper/ubuntu--vg-swap_1.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Unmounted /boot.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Unmount All Filesystems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped File System Check on /dev/disk/by-uuid/7f24874a-5e0c-45c5-90b4-ada2b13f0994.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Removed slice system-systemd\x2dfsck.slice.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped target Local File Systems (Pre).
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Create Static Device Nodes in /dev.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopping Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Stopped Remount Root and Kernel File Systems.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Shutdown.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Reached target Final Step.
avril 30 22:23:36 vincent-UBUntu systemd[1]: Starting Power-Off...
avril 30 22:23:36 vincent-UBUntu systemd[1]: Shutting down.
avril 30 22:23:36 vincent-UBUntu lvm[3617]:   2 logical volume(s) in volume group "ubuntu-vg" unmonitored
avril 30 22:23:36 vincent-UBUntu kernel: systemd-shutdow: 47 output lines suppressed due to ratelimiting
avril 30 22:23:36 vincent-UBUntu systemd-shutdown[1]: Syncing filesystems and block devices.
avril 30 22:23:36 vincent-UBUntu systemd-journald[451]: Journal stopped

je n'ai pas le niveau pour comprendre ce que tu as écrit à propos de la nvram et boot-repair, désolé.
cordialement

Hors ligne

#16 Le 01/05/2020, à 17:44

geole

Re : supprimer chiffrement global avant mise à jour version

Je ne sais pas trouver le problème de ton écran noir et de l'obligation de repasser  par le bios.
Il faudrait que tu fasses ces  trois commandes pour disposer de la nouvelle version de boot-info

sudo apt  update
sudo apt upgrade
boot-info

Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#17 Le 01/05/2020, à 21:00

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Hors ligne

#18 Le 02/05/2020, à 07:27

malbo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
Je colle ci-dessous le Boot-info dont tu as donné le lien ( http://paste.ubuntu.com/p/6CcQ4Nrz9h/ ) dans ton dernier post :

boot-info-4ppa95                                              [20200501_2059]


============================== Boot Info Summary ===============================

 => No boot loader is installed in the MBR of /dev/sda.
 => FreeDOS (eXtended FDisk) is installed in the MBR of /dev/sdb.

sda1: __________________________________________________________________________

    File system:       vfat
    Boot sector type:  FAT32
    Boot sector info:  No errors found in the Boot Parameter Block.
    Operating System:  
    Boot files:        

sda2: __________________________________________________________________________

    File system:       ext4
    Boot sector type:  -
    Boot sector info: 
    Operating System:  
    Boot files:        /grub/grub.cfg

sda3: __________________________________________________________________________

    File system:       crypto_LUKS
    Boot sector type:  Unknown
    Boot sector info: 

sdb1: __________________________________________________________________________

    File system:       vfat
    Boot sector type:  Windows XP: FAT32
    Boot sector info:  No errors found in the Boot Parameter Block.
    Operating System:  
    Boot files:        

============================ Drive/Partition Info ==============================

Drive: sda _____________________________________________________________________
Disque /dev/sda : 465,8 GiB, 500107862016 octets, 976773168 secteurs
Unités : secteur de 1 × 512 = 512 octets
Taille de secteur (logique / physique)Â : 512Â octets / 512Â octets
taille d'E/S (minimale / optimale)Â : 512Â octets / 512Â octets
Type d'étiquette de disque : gpt

Partition  Boot  Start Sector    End Sector  # of Sectors  Id System

/dev/sda1                   1   976,773,167   976,773,167  ee GPT


GUID Partition Table detected.

Partition  Attrs   Start Sector    End Sector  # of Sectors System
/dev/sda1                 2,048     1,050,623     1,048,576 EFI System partition
/dev/sda2             1,050,624     2,549,759     1,499,136 Data partition (Linux)
/dev/sda3             2,549,760   976,771,071   974,221,312 Data partition (Linux)

Attributes: R=Required, N=No Block IO, B=Legacy BIOS Bootable, +=More bits set

Drive: sdb _____________________________________________________________________
Disque /dev/sdb : 7,5 GiB, 8053063680 octets, 15728640 secteurs
Unités : secteur de 1 × 512 = 512 octets
Taille de secteur (logique / physique)Â : 512Â octets / 512Â octets
taille d'E/S (minimale / optimale)Â : 512Â octets / 512Â octets
Type d'étiquette de disque : dos

Partition  Boot  Start Sector    End Sector  # of Sectors  Id System

/dev/sdb1               1,552    15,728,639    15,727,088   b W95 FAT32


blkid (filtered): ______________________________________________________________

Device           UUID                                   TYPE       LABEL

/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member 
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e   ext4       
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140   swap       
/dev/sda1        5BC2-2AC0                              vfat       
/dev/sda2        7f24874a-5e0c-45c5-90b4-ada2b13f0994   ext4       
/dev/sda3        5ca0f027-1720-413b-a9b8-3712a9a4457a   crypto_LUKS 
/dev/sdb1        C08E-EDBA                              vfat       

============================== ls -R /dev/mapper/ ==============================

/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1

================================= Mount points =================================

Device           Mount_Point              Type       Options

/dev/mapper/ubuntu--vg-root /                        ext4       (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda1        /boot/efi                vfat       (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sda2        /boot                    ext4       (rw,relatime,data=ordered)
/dev/sdb1        /media/vincent/C08E-EDBA vfat       (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)


======================== sda2/grub/grub.cfg (filtered) =========================

#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
  set have_grubenv=true
  load_env
fi
if [ "${next_entry}" ] ; then
   set default="${next_entry}"
   set next_entry=
   save_env next_entry
   set boot_once=true
else
   set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
  menuentry_id_option="--id"
else
  menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
  set saved_entry="${prev_saved_entry}"
  save_env saved_entry
  set prev_saved_entry=
  save_env prev_saved_entry
  set boot_once=true
fi
function savedefault {
  if [ -z "${boot_once}" ]; then
    saved_entry="${chosen}"
    save_env saved_entry
  fi
}
function recordfail {
  set recordfail=1
  if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
  if [ x$feature_all_video_module = xy ]; then
    insmod all_video
  else
    insmod efi_gop
    insmod efi_uga
    insmod ieee1275_fb
    insmod vbe
    insmod vga
    insmod video_bochs
    insmod video_cirrus
  fi
}
if [ x$feature_default_font_path = xy ] ; then
   font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
    font="/grub/unicode.pf2"
fi
if loadfont $font ; then
  set gfxmode=auto
  load_video
  insmod gfxterm
  set locale_dir=$prefix/locale
  set lang=fr_FR
  insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
  set timeout=10
else
  if [ x$feature_timeout_style = xy ] ; then
    set timeout_style=hidden
    set timeout=10
  # Fallback hidden-timeout code in case the timeout_style feature is
  # unavailable.
  elif sleep --interruptible 10 ; then
    set timeout=10
  fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
  clear
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
	set gfxpayload="${1}"
	if [ "${1}" = "keep" ]; then
		set vt_handoff=vt.handoff=1
	else
		set vt_handoff=
	fi
}
if [ "${recordfail}" != 1 ]; then
  if [ -e ${prefix}/gfxblacklist.txt ]; then
    if hwmatch ${prefix}/gfxblacklist.txt 3; then
      if [ ${match} = 0 ]; then
        set linux_gfx_mode=keep
      else
        set linux_gfx_mode=text
      fi
    else
      set linux_gfx_mode=text
    fi
  else
    set linux_gfx_mode=keep
  fi
else
  set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	recordfail
	load_video
	gfxmode $linux_gfx_mode
	insmod gzio
	if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
	insmod part_gpt
	insmod ext2
	set root='hd0,gpt2'
	if [ x$feature_platform_search_hint = xy ]; then
	  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
	else
	  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
	fi
        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
	initrd	/initrd.img-4.15.0-99-generic
}
submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	menuentry 'Ubuntu, with Linux 4.15.0-99-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-99-generic ...'
	        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-99-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-99-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-99-generic ...'
	        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-99-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-96-generic ...'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-96-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-96-generic ...'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-96-generic
	}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/25_custom ###
menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}
menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}
menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}
menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}
menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}
menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}
menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}
menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###
### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
	fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries.  Simply type the
# menu entries you want to add after this comment.  Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f  ${config_directory}/custom.cfg ]; then
  source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f  $prefix/custom.cfg ]; then
  source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###

==================== sda2: Location of files loaded by Grub ====================

           GiB - GB             File                                 Fragment(s)

   0.626422882 = 0.672616448    grub/grub.cfg                                  1
   0.840801239 = 0.902803456    vmlinuz-4.15.0-96-generic                      2
   0.688465118 = 0.739233792    vmlinuz-4.15.0-99-generic                      2
   0.946285248 = 1.016066048    initrd.img-4.15.0-96-generic                   3
   0.835491180 = 0.897101824    initrd.img-4.15.0-99-generic                   5

======================== Unknown MBRs/Boot Sectors/etc =========================

Unknown BootLoader on sda3

00000000  4c 55 4b 53 ba be 00 01  61 65 73 00 00 00 00 00  |LUKS....aes.....|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  78 74 73 2d 70 6c 61 69  |........xts-plai|
00000030  6e 36 34 00 00 00 00 00  00 00 00 00 00 00 00 00  |n64.............|
00000040  00 00 00 00 00 00 00 00  73 68 61 32 35 36 00 00  |........sha256..|
00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000060  00 00 00 00 00 00 00 00  00 00 10 00 00 00 00 40  |...............@|
00000070  39 35 25 05 e2 9f f9 a3  50 4a 09 20 b3 ab e5 97  |95%.....PJ. ....|
00000080  a7 0a fb 41 4f f3 93 95  59 55 de 1a 53 45 31 d5  |...AO...YU..SE1.|
00000090  3b 3d 86 25 b5 2d 61 57  64 98 03 25 ac 9f b5 77  |;=.%.-aWd..%...w|
000000a0  e4 eb 0a 15 00 01 7a 23  35 63 61 30 66 30 32 37  |......z#5ca0f027|
000000b0  2d 31 37 32 30 2d 34 31  33 62 2d 61 39 62 38 2d  |-1720-413b-a9b8-|
000000c0  33 37 31 32 61 39 61 34  34 35 37 61 00 00 00 00  |3712a9a4457a....|
000000d0  00 ac 71 f3 00 17 a2 38  82 45 6c 5d 07 96 00 9e  |..q....8.El]....|
000000e0  26 34 43 d9 3b b7 10 b2  90 dc a4 d8 4b 64 ac bc  |&4C.;.......Kd..|
000000f0  49 4b e6 5c 92 d4 26 28  00 00 00 08 00 00 0f a0  |IK.\..&(........|
00000100  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000110  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000120  00 00 00 00 00 00 00 00  00 00 02 00 00 00 0f a0  |................|
00000130  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000140  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000150  00 00 00 00 00 00 00 00  00 00 03 f8 00 00 0f a0  |................|
00000160  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000170  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000180  00 00 00 00 00 00 00 00  00 00 05 f0 00 00 0f a0  |................|
00000190  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001b0  00 00 00 00 00 00 00 00  00 00 07 e8 00 00 0f a0  |................|
000001c0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001e0  00 00 00 00 00 00 00 00  00 00 09 e0 00 00 0f a0  |................|
000001f0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000200


=============================== StdErr Messages ================================

File descriptor 63 (pipe:[212208]) leaked on lvs invocation. Parent PID 21159: /bin/bash
File descriptor 63 (pipe:[212208]) leaked on lvchange invocation. Parent PID 31765: /bin/bash
/usr/share/boot-sav/b-i-s-functions.sh: ligne 1659: 972201984S : valeur trop grande pour la base (le symbole erroné est « 972201984S »)
============================ ADDITIONAL INFORMATION ============================

boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s):      32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1

==================== blkid (filtered) before lvm activation ====================

/dev/mapper/sda3_crypt: UUID="9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y" TYPE="LVM2_member"
/dev/mapper/ubuntu--vg-root: UUID="63e94123-f7b7-4bee-92eb-91e10b16064e" TYPE="ext4"
/dev/sda1: UUID="5BC2-2AC0" TYPE="vfat" PARTLABEL="EFI System Partition" PARTUUID="7bba2564-ae05-4964-b02d-3219a5ae6b08"
/dev/sda2: UUID="7f24874a-5e0c-45c5-90b4-ada2b13f0994" TYPE="ext4" PARTUUID="627cfc4b-0e4e-4898-8373-852ccacad01a"
/dev/sda3: UUID="5ca0f027-1720-413b-a9b8-3712a9a4457a" TYPE="crypto_LUKS" PARTUUID="0c91b943-4e98-4ecc-93ca-ee734fe542e0"
/dev/sdb1: UUID="C08E-EDBA" TYPE="vfat" PARTUUID="f6391d8b-01"
/dev/mapper/ubuntu--vg-swap_1: UUID="851c2f98-6fc4-4e15-a64a-3d357dc8a140" TYPE="swap"

=============================== modprobe dm-mod ================================

vgscan --mknodes
Reading volume groups from cache.
Found volume group "ubuntu-vg" using metadata type lvm2
vgchange -ay
2 logical volume(s) in volume group "ubuntu-vg" now active
lvscan:   ACTIVE            '/dev/ubuntu-vg/root' [463.58 GiB] inherit
ACTIVE            '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
Y a-t-il un RAID sur cet ordinateur ? no
Error: /dev/mapper/sda3_crypt: unrecognised disk label
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
Set sda as corresponding disk of mapper/ubuntu--vg-root
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.

=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.

=================== mount -r /dev/sda3 : Error code 32
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.

=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3
mount: /mnt/boot-sav/sda3 : type de système de fichiers « crypto_LUKS » inconnu.

=================== mount -r /dev/sda3 : Error code 32

================================ 1 OS detected =================================

OS#1:   L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession on mapper/ubuntu--vg-root

=========================== /etc/grub.d/ (filtered) ============================

drwxr-xr-x  2 root root     4096 avril 30 21:25 grub.d
drwxr-xr-x  2 root root     4096 déc.  25 21:12 grub.d.bak
-rwxr-xr-x 1 root root 10046 mars  11 21:57 00_header
-rwxr-xr-x 1 root root  6258 mars  11 21:57 05_debian_theme
-rwxr-xr-x 1 root root 12693 mars  11 21:57 10_linux
-rwxr-xr-x 1 root root 11298 mars  11 21:57 20_linux_xen
-rwxr-xr-x 1 root root  1229 avril 30 21:25 25_custom
-rwxr-xr-x 1 root root 12059 mars  11 21:57 30_os-prober
-rwxr-xr-x 1 root root  1418 mars  11 21:57 30_uefi-firmware
-rwxr-xr-x 1 root root   214 mars  11 21:57 40_custom
-rwxr-xr-x 1 root root   216 mars  11 21:57 41_custom

=================== /boot/efi detected in the fstab of mapper/ubuntu--vg-root: UUID=5BC2-2AC0	 (sda1)

=================== /boot detected in the fstab of mapper/ubuntu--vg-root: UUID=7f24874a-5e0c-45c5-90b4-ada2b13f0994  (sda2)

================================== m5sum efi ===================================

f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446  /boot/efi/efi/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/efi/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688  /boot/efi/efi/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/efi/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700  /boot/efi/efi/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446  /boot/efi/efi/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/efi/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688  /boot/efi/efi/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/efi/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700  /boot/efi/efi/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/Boot/bootx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/Boot/grubx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/EFI/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/EFI/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446  /boot/efi/EFI/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/EFI/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688  /boot/efi/EFI/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6  /boot/efi/EFI/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700  /boot/efi/EFI/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4  /boot/efi/EFI/ubuntu/shimx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/fbx64.efi
Presence of EFI/Boot file detected: /boot/efi/EFI/Boot/grubx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/bootx64.efi
Presence of EFI/Boot file detected: /boot/efi/Boot/grubx64.efi
Presence of bkp file detected: /boot/efi/EFI/BOOT/bkpbootx64.efi

================================ efibootmgr -v =================================

BootCurrent: 0004
Timeout: 1 seconds
BootOrder: 0000,0004,0002,0001,0005,0006
Boot0000* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIubuntushimx64.efi)
Boot0001* CD/DVD Drive 	BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive 	BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO..NOo.......7.G.e.n.e.r.i.c. .F.l.a.s.h. .D.i.s.k.................&..Gd-.;.A..MQ..L.1.7.2.9.E.3.D.3........BO
Boot0004* UEFI OS	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIBOOTBOOTX64.EFI)
Boot0005* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(EFIUbuntugrubx64.efi)
Boot0006* UEFI: Generic Flash Disk	PciRoot(0x0)/Pci(0x1a,0x0)/USB(0,0)/USB(5,0)/HD(1,MBR,0xf6391d8b,0x610,0xeff9f0)..BO

=============================== UEFI/Legacy mode ===============================

BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session. SecureBoot enabled.

=============================== PARTITIONS (1/3) ===============================

mapper/ubuntu--vg-root	: sda,	not-sepboot,	grubenv-ok	grub2,	signed grub-efi ,	update-grub,	64,	with-boot,	is-os,	isnotESP,	fstab-has-goodBOOT
sda1	: sda,	not-sepboot,	no-grubenv	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	is---ESP,	part-has-no-fstab
sda2	: sda,	is-sepboot,	grubenv-ok	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	isnotESP,	part-has-no-fstab
sda3	: sda,	maybesepboot,	no-grubenv	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	isnotESP,	part-has-no-fstab
sdb1	: sdb,	not-sepboot,	no-grubenv	nogrub,	no-docgrub,	no-update-grub,	32,	no-boot,	no-os,	isnotESP,	part-has-no-fstab

=============================== PARTITIONS (2/3) ===============================

mapper/ubuntu--vg-root	: fstab-has-goodEFI,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	apt-get,	grub-install
sda1	: part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall
sda2	: part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall
sda3	: part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall
sdb1	: part-has-no-fstab,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot,	nopakmgr,	nogrubinstall

=============================== PARTITIONS (3/3) ===============================

mapper/ubuntu--vg-root	: with--usr,	fstab-without-usr,	not-sep-usr,	standard,	not-far,	notbiosboot, .
sda1	: no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	not-far,	notbiosboot, /boot/efi.
sda2	: no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	not-far,	notbiosboot, /boot.
sda3	: no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	farbios,	notbiosboot, /mnt/boot-sav/sda3.
sdb1	: no---usr,	part-has-no-fstab,	not-sep-usr,	standard,	not-far,	notbiosboot, /media/vincent/C08E-EDBA.

==================================== DISKS =====================================

sda	: GPT,	no-BIOS_boot,	has---ESP, 	not-usb,	not-mmc, has-os,	2048 sectors * 512 bytes
sdb	: not-GPT,	BIOSboot-not-needed,	has-noESP, 	usb-disk,	not-mmc, no-os,	1552 sectors * 512 bytes

================================== parted -lm ==================================

BYT;
/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;
BYT;
/dev/sdb:8053MB:scsi:512:512:msdos:Generic Flash Disk:;
1:795kB:8053MB:8052MB:fat32::;
BYT;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;
BYT;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;
BYT;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;

=============== lsblk -o KNAME,TYPE,FSTYPE,SIZE,LABEL (filtered) ===============

KNAME  TYPE  FSTYPE        SIZE LABEL
sda    disk              465,8G
sda1   part  vfat          512M
sda2   part  ext4          732M
sda3   part  crypto_LUKS 464,6G
sdb    disk                7,5G
sdb1   part  vfat          7,5G
sr0    rom                1024M
dm-0   crypt LVM2_member 464,6G
dm-1   lvm   ext4        463,6G
dm-2   lvm   swap          980M

============ lsblk -o KNAME,ROTA,RO,RM,STATE,MOUNTPOINT (filtered) =============

KNAME  ROTA RO RM STATE   MOUNTPOINT
sda       0  0  0 running
sda1      0  0  0         /boot/efi
sda2      0  0  0         /boot
sda3      0  0  0
sdb       1  0  1 running
sdb1      1  0  1         /media/vincent/C08E-EDBA
sr0       1  0  1 running
dm-0      0  0  0 running
dm-1      0  0  0 running /
dm-2      0  0  0 running [SWAP]

=============================== mount (filtered) ===============================

/dev/mapper/ubuntu--vg-root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda2 on /boot type ext4 (rw,relatime,data=ordered)
/dev/sda1 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/sdb1 on /media/vincent/C08E-EDBA type vfat (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)

================================ ls (filtered) =================================

/sys/block/dm-0:  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-1:  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/dm-2:  alignment_offset bdi capability dev discard_alignment dm ext_range hidden holders inflight integrity power queue range removable ro size slaves stat subsystem trace uevent
/sys/block/sda:  alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sda1 sda2 sda3 size slaves stat subsystem trace uevent
/sys/block/sdb:  alignment_offset bdi capability dev device discard_alignment events events_async events_poll_msecs ext_range hidden holders inflight integrity power queue range removable ro sdb1 size slaves stat subsystem trace uevent
/dev:  autofs block bsg btrfs-control bus cdrom cdrw char console core cpu cpu_dma_latency cuse disk dm-0 dm-1 dm-2 dri dvd dvdrw ecryptfs fb0 fd full fuse hidraw0 hidraw1 hidraw2 hpet hugepages hwrng initctl input kmsg lightnvm log mapper mcelog media0 mei0 mem memory_bandwidth mqueue net null port ppp psaux ptmx pts random rfkill rtc rtc0 sda sda1 sda2 sda3 sdb sdb1 sg0 sg1 sg2 shm snapshot snd sr0 stderr stdin stdout ubuntu-vg uhid uinput urandom userio v4l vfio vga_arbiter vhci vhost-net vhost-vsock video0 zero
ls /dev/mapper:  sda3_crypt ubuntu--vg-root ubuntu--vg-swap_1

============================== df -Th (filtered) ===============================

Filesystem                  Type      Size  Used Avail Use% Mounted on
/dev/mapper/ubuntu--vg-root ext4      456G   14G  419G   4% /
/dev/sda2                   ext4      705M  155M  499M  24% /boot
/dev/sda1                   vfat      511M   13M  499M   3% /boot/efi
/dev/sdb1                   vfat      7.5G  462M  7.1G   7% /media/vincent/C08E-EDBA

============================= fdisk -l (filtered) ==============================

Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Disklabel type: gpt
Device       Start       End   Sectors   Size Type
/dev/sda1     2048   1050623   1048576   512M EFI System
/dev/sda2  1050624   2549759   1499136   732M Linux filesystem
/dev/sda3  2549760 976771071 974221312 464.6G Linux filesystem
Disk /dev/sdb: 7.5 GiB, 8053063680 bytes, 15728640 sectors
Disklabel type: dos
Device     Boot Start      End  Sectors  Size Id Type
/dev/sdb1        1552 15728639 15727088  7.5G  b W95 FAT32
Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors
(debug) reinstall grub2 place-in-MBR no-BIOS_boot (mapper/ubuntu--vg-root)

=============================== Suggested repair ===============================

The default repair of the Boot-Repair utility would purge (in order to fix packages) and reinstall the grub2 of mapper/ubuntu--vg-root into the MBR of sda, using the following options:        sda2/boot,
Grub-efi would not be selected by default because: no-win-efi
Additional repair would be performed: unhide-bootmenu-10s      restore-efi-backups


===================== Blockers in case of suggested repair ======================

GPT détecté. Veuillez créer une partition BIOS-Boot (>1MB, système de fichiers non formaté, drapeau bios_grub). Cela peut être réalisé via des outils tels que Gparted. Puis réessayez.
Alternativement, vous pouvez réessayer après avoir activé l'option [Partition /boot/efi séparée :].

===================== Advice in case of suggested repair ======================

Vous souhaiterez peut-être réessayer après avoir déchiffré vos partitions. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?

=================== Final advice in case of suggested repair ===================

N'oubliez pas de régler votre BIOS pour qu'il amorce sur le disque sda (ATA Samsung SSD 860) !

================================= User settings ================================

The settings chosen by the user will not act on the boot.

Hors ligne

#19 Le 02/05/2020, à 14:38

geole

Re : supprimer chiffrement global avant mise à jour version

Bonjour
J'extrais cela du rapport boot-info

sda1: __________________________________________________________________________
    File system:       vfat
    Boot sector type:  FAT32
    Boot sector info:  No errors found in the Boot Parameter Block.
    Operating System:  
    Boot files:        
sda2: __________________________________________________________________________

Je suis un peu surpris de ne pas y trouver des fichiers de boot.
Pour en avoir la certitude, peux-tu exécuter  et poster le retour de ces commandes

sudo umount  -v   /dev/sda1
sudo mount   -v  /dev/sda1   /mnt
ls -ls  /mnt
ls -ls /mnt/EFI
ls  -ls /mnt/EFI/ubuntu

Dernière modification par geole (Le 02/05/2020, à 21:31)


Les grilles de l'installateur https://doc.ubuntu-fr.org/tutoriel/inst … _subiquity
"gedit admin:///etc/fstab" est proscrit,  utilisez "pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY xdg-open /etc/fstab" Voir  https://doc.ubuntu-fr.org/gedit
Les partitions EXT4 des disques externes => https://forum.ubuntu-fr.org/viewtopic.p … #p22697248

En ligne

#20 Le 02/05/2020, à 21:19

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

En réponse à la demande de Géole,
voici ce que donnent les cinq commandes

vincent@vincent-UBUntu:~$ sudo umount  -v   /dev/sda1
[sudo] Mot de passe de vincent : 
umount: /boot/efi (/dev/sda1) démonté
vincent@vincent-UBUntu:~$ sudo mount   -v  /dev/sda1   /mnt
mount : /dev/sda1 monté sur /mnt.
vincent@vincent-UBUntu:~$ ls -ls  /mnt
total 12
4 drwxr-xr-x 2 root root 4096 avril 30 21:25 Boot
4 drwxr-xr-x 4 root root 4096 juil.  7  2019 EFI
4 drwxr-xr-x 2 root root 4096 déc.  25 21:15 ubuntu
vincent@vincent-UBUntu:~$ ls -ls /mnt/EFI
total 8
4 drwxr-xr-x 2 root root 4096 avril 30 21:25 BOOT
4 drwxr-xr-x 3 root root 4096 juil.  7  2019 ubuntu
vincent@vincent-UBUntu:~$ ls  -ls /mnt/EFI/ubuntu
total 3724
   4 -rwxr-xr-x 1 root root     108 avril 30 21:25 BOOTX64.CSV
   4 drwxr-xr-x 2 root root    4096 juil.  7  2019 fw
  76 -rwxr-xr-x 1 root root   75992 juil.  7  2019 fwupx64.efi
   4 -rwxr-xr-x 1 root root     121 avril 30 21:25 grub.cfg
1092 -rwxr-xr-x 1 root root 1116536 avril 30 21:25 grubx64.efi
1240 -rwxr-xr-x 1 root root 1269496 avril 30 21:25 mmx64.efi
1304 -rwxr-xr-x 1 root root 1334816 avril 30 21:25 shimx64.efi
vincent@vincent-UBUntu:~$ 

Dernière modification par Vertsaxo (Le 04/05/2020, à 16:16)

Hors ligne

#21 Le 06/05/2020, à 22:36

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
j'ai suivi le conseil de Malbo donné pour un autre utilisateur en 2018 dans ce message :
https://forum.ubuntu-fr.org/viewtopic.php?id=2025371
et cela a marché. mon pc démarre sans que je doive passer par le bios.
cordialement
Vertsaxo

Hors ligne

#22 Le 07/05/2020, à 09:00

malbo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
Dans le lien que tu as donné dans le post #21, j'ai conseillé à darkwin314 de désactiver la possibilité de démarrer en mode EFI pour imposer le démarrage en mode Bios. Je ne vois pas le rapport avec ton installation qui est faite en mode EFI. Mais peut-être que la situation a beaucoup évolué : je te prie de faire un Boot-info depuis une session de ton Ubuntu installé et de donner l'URL de ce Boot-info dans ta réponse.

Hors ligne

#23 Le 07/05/2020, à 22:19

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
voici le lien vers le résultat du boot-info que je viens de lancer :
http://paste.ubuntu.com/p/TSRvjWdKhB/

Hors ligne

#24 Le 08/05/2020, à 07:32

malbo

Re : supprimer chiffrement global avant mise à jour version

Bonjour,
Je colle ci-dessous le Boot-info dont tu as donné le lien ( http://paste.ubuntu.com/p/TSRvjWdKhB/ ) dans ton post #23 :

boot-info-4ppa96                                              [20200507_2217]

============================== Boot Info Summary ===============================

 => No boot loader is installed in the MBR of /dev/sda.

sda1: __________________________________________________________________________

    File system:       vfat
    Boot sector type:  FAT32
    Boot sector info:  No errors found in the Boot Parameter Block.
    Operating System:  
    Boot files:        /efi/BOOT/bkpbootx64.efi /efi/BOOT/bootx64.efi 
                       /efi/BOOT/fbx64.efi /efi/BOOT/grubx64.efi 
                       /efi/ubuntu/fwupx64.efi /efi/ubuntu/grubx64.efi 
                       /efi/ubuntu/mmx64.efi /efi/ubuntu/shimx64.efi 
                       /efi/ubuntu/grub.cfg

sda2: __________________________________________________________________________

    File system:       ext4
    Boot sector type:  -
    Boot sector info: 
    Operating System:  
    Boot files:        /grub/grub.cfg

sda3: __________________________________________________________________________

    File system:       crypto_LUKS
    Boot sector type:  Unknown
    Boot sector info: 


================================ 1 OS detected =================================

OS#1:   L'OS actuellement utilisé - Ubuntu 18.04.4 LTS CurrentSession on mapper/ubuntu--vg-root

============================== System Information ==============================

boot-info is executed in installed-session (Ubuntu 18.04.4 LTS, bionic, Ubuntu, x86_64)
CPU op-mode(s):      32-bit, 64-bit
BOOT_IMAGE=/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=1
BIOS is EFI-compatible, and is setup in EFI-mode for this installed-session.

================================ efibootmgr -v =================================
BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0002,0000,0004,0001,0005
Boot0000* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\ubuntu\shimx64.efi)
Boot0001* CD/DVD Drive 	BBS(CDROM,,0x0)..GO..NO........O.A.S.U.S. . . . .D.R.W.-.2.0.1.4.S.1.T.................>..Gd-.;.A..MQ..L. . . . . . . . . . . . . . . . . . . . ........BO
Boot0002* Hard Drive 	BBS(HD,,0x0)..GO..NO........O.S.a.m.s.u.n.g. .S.S.D. .8.6.0. .E.V.O. .5.0.0.G.B.................>..Gd-.;.A..MQ..L.3.S.2.Z.B.N.M.0.3.4.5.4.1.5. .X. . . . ........BO
Boot0004* UEFI OS	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\BOOT\BOOTX64.EFI)
Boot0005* ubuntu	HD(1,GPT,7bba2564-ae05-4964-b02d-3219a5ae6b08,0x800,0x100000)/File(\EFI\Ubuntu\grubx64.efi) SecureBoot enabled.

================================== EFI files ===================================

f7a57b08bc7c1c85417ae4cea582d1d4   mapper/ubuntu--vg-root/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   mapper/ubuntu--vg-root/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446   mapper/ubuntu--vg-root/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6   mapper/ubuntu--vg-root/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688   mapper/ubuntu--vg-root/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6   mapper/ubuntu--vg-root/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700   mapper/ubuntu--vg-root/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   mapper/ubuntu--vg-root/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda1/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda1/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446   sda1/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6   sda1/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688   sda1/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6   sda1/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700   sda1/ubuntu/mmx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda1/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda2/Boot/bootx64.efi
64a633007e3d5a9a5943e417442548d6   sda2/Boot/grubx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda2/ubuntu/shimx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda2/BOOT/bkpbootx64.efi
f7a57b08bc7c1c85417ae4cea582d1d4   sda2/BOOT/bootx64.efi
bed45d1c9554cea09924d3814cb7c446   sda2/BOOT/fbx64.efi
64a633007e3d5a9a5943e417442548d6   sda2/BOOT/grubx64.efi
256fe27540b54b71cf38110338247688   sda2/ubuntu/fwupx64.efi
64a633007e3d5a9a5943e417442548d6   sda2/ubuntu/grubx64.efi
4487628005555bfd4a4c0a47211e0700   sda2/ubuntu/mmx64.efi


============================= Drive/Partition Info =============================


Disks info: ____________________________________________________________________

sda	: GPT,	no-BIOS_boot,	has---ESP, 	not-usb,	not-mmc, has-os,	2048 sectors * 512 bytes

Partitions info (1/3): _________________________________________________________

mapper/ubuntu--vg-root	: is-os,	64, apt-get,	signed grub-efi ,	grub2,	grub-install,	grubenv-ok,	update-grub,	not-far
sda1	: no-os,	32, nopakmgr,	no-docgrub,	nogrub,	nogrubinstall,	no-grubenv,	no-update-grub,	not-far
sda2	: no-os,	32, nopakmgr,	no-docgrub,	nogrub,	nogrubinstall,	grubenv-ok,	no-update-grub,	not-far
sda3	: no-os,	32, nopakmgr,	no-docgrub,	nogrub,	nogrubinstall,	no-grubenv,	no-update-grub,	farbios

Partitions info (2/3): _________________________________________________________

mapper/ubuntu--vg-root	: isnotESP,	fstab-has-goodEFI,	notbiosboot,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot
sda1	: is---ESP,	part-has-no-fstab,	notbiosboot,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot
sda2	: isnotESP,	part-has-no-fstab,	notbiosboot,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot
sda3	: isnotESP,	part-has-no-fstab,	notbiosboot,	no-nt,	no-winload,	no-recov-nor-hid,	no-bmgr,	notwinboot

Partitions info (3/3): _________________________________________________________

mapper/ubuntu--vg-root	: not-sepboot,	with-boot,	fstab-has-goodBOOT,	not-sep-usr,	with--usr,	fstab-without-usr,	standard,	sda
sda1	: not-sepboot,	no-boot,	part-has-no-fstab,	not-sep-usr,	no---usr,	part-has-no-fstab,	standard,	sda
sda2	: is-sepboot,	no-boot,	part-has-no-fstab,	not-sep-usr,	no---usr,	part-has-no-fstab,	standard,	sda
sda3	: maybesepboot,	no-boot,	part-has-no-fstab,	not-sep-usr,	no---usr,	part-has-no-fstab,	standard,	sda

fdisk -l (filtered): ___________________________________________________________

Disk /dev/sda: 465.8 GiB, 500107862016 bytes, 976773168 sectors
Disklabel type: gpt
Device       Start       End   Sectors   Size Type
/dev/sda1     2048   1050623   1048576   512M EFI System
/dev/sda2  1050624   2549759   1499136   732M Linux filesystem
/dev/sda3  2549760 976771071 974221312 464.6G Linux filesystem
Disk /dev/mapper/sda3_crypt: 464.6 GiB, 498799214592 bytes, 974217216 sectors
Disk /dev/mapper/ubuntu--vg-root: 463.6 GiB, 497767415808 bytes, 972201984 sectors
Disk /dev/mapper/ubuntu--vg-swap_1: 980 MiB, 1027604480 bytes, 2007040 sectors

parted -lm (filtered): _________________________________________________________

/dev/sda:500GB:scsi:512:512:gpt:ATA Samsung SSD 860:;
1:1049kB:538MB:537MB:fat32:EFI System Partition:boot, esp;
2:538MB:1305MB:768MB:ext4::;
3:1305MB:500GB:499GB:::;
/dev/mapper/ubuntu--vg-swap_1:1028MB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:1028MB:1028MB:linux-swap(v1)::;
/dev/mapper/ubuntu--vg-root:498GB:dm:512:512:loop:Linux device-mapper (linear):;
1:0.00B:498GB:498GB:ext4::;
/dev/mapper/sda3_crypt:499GB:dm:512:512:unknown:Linux device-mapper (crypt):;

df -Th (filtered): _____________________________________________________________

Filesystem                  Type      Size  Used Avail Use% Mounted on
/dev/mapper/ubuntu--vg-root ext4      456G   14G  419G   4% /
/dev/sda2                   ext4      705M  155M  499M  24% /boot

blkid (filtered): ______________________________________________________________

Device           UUID                                   TYPE       LABEL
/dev/mapper/sda3_crypt 9tG1PM-f4YY-G8nq-JeL0-Q11Q-pRg1-z3sQ1y LVM2_member 
/dev/mapper/ubuntu--vg-root 63e94123-f7b7-4bee-92eb-91e10b16064e   ext4       
/dev/mapper/ubuntu--vg-swap_1 851c2f98-6fc4-4e15-a64a-3d357dc8a140   swap       
/dev/sda1        5BC2-2AC0                              vfat       
/dev/sda2        7f24874a-5e0c-45c5-90b4-ada2b13f0994   ext4       
/dev/sda3        5ca0f027-1720-413b-a9b8-3712a9a4457a   crypto_LUKS 


Mount points: __________________________________________________________________

/dev/mapper/ubuntu--vg-root /                        ext4       (rw,relatime,errors=remount-ro,data=ordered)
/dev/sda2        /boot                    ext4       (rw,relatime,data=ordered)


============================== ls -R /dev/mapper/ ==============================

/dev/mapper:
control
sda3_crypt
ubuntu--vg-root
ubuntu--vg-swap_1


=========================== sda1/efi/ubuntu/grub.cfg ===========================

search.fs_uuid 7f24874a-5e0c-45c5-90b4-ada2b13f0994 root hd0,gpt2 
set prefix=($root)'/grub'
configfile $prefix/grub.cfg

======================== sda2/grub/grub.cfg (filtered) =========================

#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
  set have_grubenv=true
  load_env
fi
if [ "${next_entry}" ] ; then
   set default="${next_entry}"
   set next_entry=
   save_env next_entry
   set boot_once=true
else
   set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
  menuentry_id_option="--id"
else
  menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
  set saved_entry="${prev_saved_entry}"
  save_env saved_entry
  set prev_saved_entry=
  save_env prev_saved_entry
  set boot_once=true
fi
function savedefault {
  if [ -z "${boot_once}" ]; then
    saved_entry="${chosen}"
    save_env saved_entry
  fi
}
function recordfail {
  set recordfail=1
  if [ -n "${have_grubenv}" ]; then if [ -z "${boot_once}" ]; then save_env recordfail; fi; fi
}
function load_video {
  if [ x$feature_all_video_module = xy ]; then
    insmod all_video
  else
    insmod efi_gop
    insmod efi_uga
    insmod ieee1275_fb
    insmod vbe
    insmod vga
    insmod video_bochs
    insmod video_cirrus
  fi
}
if [ x$feature_default_font_path = xy ] ; then
   font=unicode
else
insmod part_gpt
insmod ext2
set root='hd0,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
else
  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
fi
    font="/grub/unicode.pf2"
fi
if loadfont $font ; then
  set gfxmode=auto
  load_video
  insmod gfxterm
  set locale_dir=$prefix/locale
  set lang=fr_FR
  insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
  set timeout=10
else
  if [ x$feature_timeout_style = xy ] ; then
    set timeout_style=hidden
    set timeout=10
  # Fallback hidden-timeout code in case the timeout_style feature is
  # unavailable.
  elif sleep --interruptible 10 ; then
    set timeout=10
  fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
set menu_color_normal=white/black
set menu_color_highlight=black/light-gray
if background_color 44,0,30,0; then
  clear
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
	set gfxpayload="${1}"
	if [ "${1}" = "keep" ]; then
		set vt_handoff=vt.handoff=1
	else
		set vt_handoff=
	fi
}
if [ "${recordfail}" != 1 ]; then
  if [ -e ${prefix}/gfxblacklist.txt ]; then
    if hwmatch ${prefix}/gfxblacklist.txt 3; then
      if [ ${match} = 0 ]; then
        set linux_gfx_mode=keep
      else
        set linux_gfx_mode=text
      fi
    else
      set linux_gfx_mode=text
    fi
  else
    set linux_gfx_mode=keep
  fi
else
  set linux_gfx_mode=text
fi
export linux_gfx_mode
menuentry 'Ubuntu' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	recordfail
	load_video
	gfxmode $linux_gfx_mode
	insmod gzio
	if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
	insmod part_gpt
	insmod ext2
	set root='hd0,gpt2'
	if [ x$feature_platform_search_hint = xy ]; then
	  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
	else
	  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
	fi
        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
	initrd	/initrd.img-4.15.0-99-generic
}
submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
	menuentry 'Ubuntu, with Linux 4.15.0-99-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-99-generic ...'
	        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-99-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-99-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-99-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-99-generic ...'
	        linux	/vmlinuz-4.15.0-99-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-99-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-96-generic' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-advanced-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		gfxmode $linux_gfx_mode
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-96-generic ...'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro  quiet splash $vt_handoff
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-96-generic
	}
	menuentry 'Ubuntu, with Linux 4.15.0-96-generic (recovery mode)' --class ubuntu --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-4.15.0-96-generic-recovery-63e94123-f7b7-4bee-92eb-91e10b16064e' {
		recordfail
		load_video
		insmod gzio
		if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
		insmod part_gpt
		insmod ext2
		set root='hd0,gpt2'
		if [ x$feature_platform_search_hint = xy ]; then
		  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,gpt2 --hint-efi=hd0,gpt2 --hint-baremetal=ahci0,gpt2  7f24874a-5e0c-45c5-90b4-ada2b13f0994
		else
		  search --no-floppy --fs-uuid --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
		fi
		echo	'Loading Linux 4.15.0-96-generic ...'
	        linux	/vmlinuz-4.15.0-96-generic root=/dev/mapper/ubuntu--vg-root ro recovery nomodeset 
		echo	'Loading initial ramdisk ...'
		initrd	/initrd.img-4.15.0-96-generic
	}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/25_custom ###
menuentry "EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/bkpbootx64.efi
}
menuentry "EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/BOOT/fbx64.efi
}
menuentry "EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/fwupx64.efi
}
menuentry "EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 5BC2-2AC0
chainloader (${root})/EFI/ubuntu/mmx64.efi
}
menuentry "efi/EFI/BOOT/bkpbootx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/bkpbootx64.efi
}
menuentry "efi/EFI/BOOT/fbx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/BOOT/fbx64.efi
}
menuentry "efi/EFI/ubuntu/fwupx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/fwupx64.efi
}
menuentry "efi/EFI/ubuntu/mmx64.efi" {
search --fs-uuid --no-floppy --set=root 7f24874a-5e0c-45c5-90b4-ada2b13f0994
chainloader (${root})/efi/EFI/ubuntu/mmx64.efi
}
### END /etc/grub.d/25_custom ###
### BEGIN /etc/grub.d/30_os-prober ###
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'System setup' $menuentry_id_option 'uefi-firmware' {
	fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries.  Simply type the
# menu entries you want to add after this comment.  Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f  ${config_directory}/custom.cfg ]; then
  source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f  $prefix/custom.cfg ]; then
  source $prefix/custom.cfg;
fi
### END /etc/grub.d/41_custom ###

==================== sda2: Location of files loaded by Grub ====================

           GiB - GB             File                                 Fragment(s)

   0.626422882 = 0.672616448    grub/grub.cfg                                  1
   0.840801239 = 0.902803456    vmlinuz-4.15.0-96-generic                      2
   0.688465118 = 0.739233792    vmlinuz-4.15.0-99-generic                      2
   1.010154724 = 1.084645376    initrd.img-4.15.0-96-generic                   4
   0.954097748 = 1.024454656    initrd.img-4.15.0-99-generic                   7


======================== Unknown MBRs/Boot Sectors/etc =========================

Unknown BootLoader on sda3

00000000  4c 55 4b 53 ba be 00 01  61 65 73 00 00 00 00 00  |LUKS....aes.....|
00000010  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000020  00 00 00 00 00 00 00 00  78 74 73 2d 70 6c 61 69  |........xts-plai|
00000030  6e 36 34 00 00 00 00 00  00 00 00 00 00 00 00 00  |n64.............|
00000040  00 00 00 00 00 00 00 00  73 68 61 32 35 36 00 00  |........sha256..|
00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000060  00 00 00 00 00 00 00 00  00 00 10 00 00 00 00 40  |...............@|
00000070  39 35 25 05 e2 9f f9 a3  50 4a 09 20 b3 ab e5 97  |95%.....PJ. ....|
00000080  a7 0a fb 41 4f f3 93 95  59 55 de 1a 53 45 31 d5  |...AO...YU..SE1.|
00000090  3b 3d 86 25 b5 2d 61 57  64 98 03 25 ac 9f b5 77  |;=.%.-aWd..%...w|
000000a0  e4 eb 0a 15 00 01 7a 23  35 63 61 30 66 30 32 37  |......z#5ca0f027|
000000b0  2d 31 37 32 30 2d 34 31  33 62 2d 61 39 62 38 2d  |-1720-413b-a9b8-|
000000c0  33 37 31 32 61 39 61 34  34 35 37 61 00 00 00 00  |3712a9a4457a....|
000000d0  00 ac 71 f3 00 17 a2 38  82 45 6c 5d 07 96 00 9e  |..q....8.El]....|
000000e0  26 34 43 d9 3b b7 10 b2  90 dc a4 d8 4b 64 ac bc  |&4C.;.......Kd..|
000000f0  49 4b e6 5c 92 d4 26 28  00 00 00 08 00 00 0f a0  |IK.\..&(........|
00000100  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000110  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000120  00 00 00 00 00 00 00 00  00 00 02 00 00 00 0f a0  |................|
00000130  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000140  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000150  00 00 00 00 00 00 00 00  00 00 03 f8 00 00 0f a0  |................|
00000160  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000170  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000180  00 00 00 00 00 00 00 00  00 00 05 f0 00 00 0f a0  |................|
00000190  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001b0  00 00 00 00 00 00 00 00  00 00 07 e8 00 00 0f a0  |................|
000001c0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001e0  00 00 00 00 00 00 00 00  00 00 09 e0 00 00 0f a0  |................|
000001f0  00 00 de ad 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000200


=============================== StdErr Messages ================================

File descriptor 63 (pipe:[57614]) leaked on lvs invocation. Parent PID 3258: /bin/bash
File descriptor 63 (pipe:[57614]) leaked on lvchange invocation. Parent PID 12396: /bin/bash
/usr/share/boot-sav/b-i-s-functions.sh: ligne 1655: 972201984S : valeur trop grande pour la base (le symbole erroné est « 972201984S »)

================================= User choice ==================================

Y a-t-il un RAID sur cet ordinateur ? no

================================ LVM activation ================================
modprobe dm-mod

vgscan --mknodes
  Reading volume groups from cache.
  Found volume group "ubuntu-vg" using metadata type lvm2
vgchange -ay
  2 logical volume(s) in volume group "ubuntu-vg" now active
lvscan
  ACTIVE            '/dev/ubuntu-vg/root' [463.58 GiB] inherit
  ACTIVE            '/dev/ubuntu-vg/swap_1' [980.00 MiB] inherit
blkid -g

=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3

mount -r /dev/sda3 : Error code 32
=================== mount /dev/sda3 : Error code 32
mount -r /dev/sda3 /mnt/boot-sav/sda3

mount -r /dev/sda3 : Error code 32
Suggested repair: ______________________________________________________________

The default repair of the Boot-Repair utility would purge (in order to fix packages) and reinstall the grub2 of mapper/ubuntu--vg-root into the MBR of sda, using the following options:        sda2/boot,
Grub-efi would not be selected by default because: no-win-efi 
Additional repair would be performed: unhide-bootmenu-10s      restore-efi-backups

Blockers in case of suggested repair: __________________________________________

 GPT détecté. Veuillez créer une partition BIOS-Boot (>1MB, système de fichiers non formaté, drapeau bios_grub). Cela peut être réalisé via des outils tels que Gparted. Puis réessayez.
Alternativement, vous pouvez réessayer après avoir activé l'option [Partition /boot/efi séparée :].

Advice in case of suggested repair: ____________________________________________

You may want to retry after mounting your encrypted partitions so that the tool can verify their contents. (http://doc.ubuntu-fr.org/ecryptfs)
Voulez-vous continuer ?

On peut voir "boot-info-4ppa96" sur la première ligne du Boot-info. Cette version 4ppa96 de Boot-info est obsolète (on en est à la version 4ppa103). Je te prie de donner le retour complet de la commande suivante :

sudo apt update

Motif : on pourra vérifier si tu reçois bien les mises à jour pour Boot-info. On doit y trouver une ligne "http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic InRelease"

Dernière modification par malbo (Le 08/05/2020, à 07:38)

Hors ligne

#25 Le 08/05/2020, à 09:50

Vertsaxo

Re : supprimer chiffrement global avant mise à jour version

Voici le retour de la commande :

vincent@vincent-UBUntu:~$ sudo apt update
[sudo] Mot de passe de vincent : 
Atteint :1 http://fr.archive.ubuntu.com/ubuntu bionic InRelease
Réception de :2 http://fr.archive.ubuntu.com/ubuntu bionic-updates InRelease [88,7 kB]
Réception de :3 http://security.ubuntu.com/ubuntu bionic-security InRelease [88,7 kB]
Ign :4 http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic InRelease     
Ign :5 http://linux.dropbox.com/ubuntu bionic InRelease                        
Réception de :6 http://linux.dropbox.com/ubuntu bionic Release [6600 B]       
Ign :7 http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic InRelease   
Réception de :8 http://fr.archive.ubuntu.com/ubuntu bionic-backports InRelease [74,6 kB]
Réception de :9 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic InRelease [15,4 kB]
Err :10 http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic Release
  404  Not Found [IP : 91.189.95.83 80]
Err :12 http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic Release  
  404  Not Found [IP : 91.189.95.83 80]
Réception de :13 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main i386 Packages [675 kB]
Réception de :14 http://security.ubuntu.com/ubuntu bionic-security/main amd64 DEP-11 Metadata [40,6 kB]
Réception de :15 http://security.ubuntu.com/ubuntu bionic-security/universe amd64 DEP-11 Metadata [42,1 kB]
Réception de :16 http://security.ubuntu.com/ubuntu bionic-security/multiverse amd64 DEP-11 Metadata [2464 B]
Réception de :17 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [932 kB]
Réception de :18 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic/main i386 Packages [1972 B]
Réception de :19 http://ppa.launchpad.net/yannubuntu/boot-repair/ubuntu bionic/main amd64 Packages [1972 B]
Réception de :20 http://fr.archive.ubuntu.com/ubuntu bionic-updates/main amd64 DEP-11 Metadata [303 kB]
Réception de :21 http://fr.archive.ubuntu.com/ubuntu bionic-updates/universe amd64 DEP-11 Metadata [273 kB]
Réception de :22 http://fr.archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 DEP-11 Metadata [2468 B]
Réception de :23 http://fr.archive.ubuntu.com/ubuntu bionic-backports/universe amd64 DEP-11 Metadata [7972 B]
Lecture des listes de paquets... Fait                                       
E: Le dépôt http://ppa.launchpad.net/sunab/sozi-release/ubuntu bionic Release n'a pas de fichier Release.
N: Les mises à jour depuis un tel dépôt ne peuvent s'effectuer de manière sécurisée, et sont donc désactivées par défaut.
N: Voir les pages de manuel d'apt-secure(8) pour la création des dépôts et les détails de configuration d'un utilisateur.
E: Le dépôt http://ppa.launchpad.net/ubuntu-audio-dev/ppa/ubuntu bionic Release n'a pas de fichier Release.
N: Les mises à jour depuis un tel dépôt ne peuvent s'effectuer de manière sécurisée, et sont donc désactivées par défaut.
N: Voir les pages de manuel d'apt-secure(8) pour la création des dépôts et les détails de configuration d'un utilisateur.
vincent@vincent-UBUntu:~$ 

Hors ligne