I updated my system a little while back and after reboot, I get the error “timed out waiting for device /dev/desk…” along with a few dependency errors about file systems, file system check, etc.
It seems to be failing to find the disk. Can someone help me with this?
I think I am going to need to login using an ISO since the below asks for my root password, my normal password doesn’t seem to work. Is there a separate root password I should know? I can’t get past “Give root password for maintenance (or press Control-D to continue):”
The Errors are as follows:
[ TIME ] Timed out waiting for device /dev/desk/by-uuid/4365…
[DEPEND] Dependency failed for /home/workstation0/Toshiba
[DEPEND] Dependency failed for Local Files systems.
[DEPEND] Dependency failed for File System Check on /dev/disk/by-uui/4365…
You are in emergency mode. After logging in, type “journalctl”…
By default, the installer sets them to be the same password. However, you can override that or if your password has changed during the install they may be different.
So I tried to chroot in using the above link. I can see the hard drive, but when I try to access using 'sudo cryptsetup open /dev/sda2 mycryptdevice I get "no key available with this passphrase. I am pretty sure the password is correct. I also checked to make sure caplocks wasn’t on. Was there any update that caused issues with encrypted drives? It has been a several weeks since the update killed the computer. I just haven’t had the chance to get to it till now.
I am accessing using a live ISO and am unable to chroot in so there is thing if /etc/fstab lsblk -o name,type,fstype,size,uuid
[liveuser@eos-2022.08.05 ~]$ lsblk -o name,type,fstype,size,uuid
NAME TYPE FSTYPE SIZE UUID
loop0 loop squashfs 1.6G
sda disk 119.2G
├─sda1 part vfat 300M 36EE-XXXX
├─sda2 part crypto_LUKS 110.1G cf2991b1-db38-XXXX-182b21b2b115
└─sda3 part crypto_LUKS 8.8G ea763b8d-0f5c-XXXX-7fe0dc38087a
sdb disk 931.5G
└─sdb1 part 931.5G
sdc disk iso9660 14.9G 2022-08-05-07-19-08-00
├─sdc1 part iso9660 1.7G 2022-08-05-07-19-08-00
└─sdc2 part vfat 104M 826B-8B64
sr0 rom 1024M
sda disk 119.2G
├─sda1 part vfat 300M 36EE-XXXX
├─sda2 part crypto_LUKS 110.1G cf2991b1-db38-XXXX-182b21b2b115
└─sda3 part crypto_LUKS 8.8G ea763b8d-0f5c-XXXX-7fe0dc38087a
we can see /dev/sda2 is indeed your system partition so as long the partition is intact you should be able to open the encryption with your passsphrase (not the user password)
You can also open it from gparted on the livesession as mentioned in the wiki too…
Without LUKS open up the containment there is not much we can do.
nice!
by any chance you are using BTRFS?
and sudo mount /dev/sdXn /mnt/efi is not correct … you need to put in your esp device what should be /dev/sda1 and inaddition i bet you are using grub ? and older install not installed with latest release? so the ESP is mounted under /boot/efi and according to this fact this would be the command: sudo mount /dev/sda1 /mnt/boot/efi
[root@EndeavourOS /]# lsblk -o name,type,fstype,size,uuid
NAME TYPE FSTYPE SIZE UUID
loop0 loop 1.6G
sda disk 119.2G
├─sda1 part 300M
├─sda2 part 110.1G
│ └─mycryptdevice crypt 110.1G
└─sda3 part 8.8G
sdb disk 931.5G
└─sdb1 part 931.5G
sdc disk 14.9G
├─sdc1 part 1.7G
└─sdc2 part 104M
sr0 rom 1024M
[root@EndeavourOS /]#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system> <mount point> <type> <options> <dump> <pass>
UUID=36EE-B488 /boot/efi vfat umask=0077 0 2
/dev/mapper/luks-cf2991b1-db38-44df-b0eb-182b21b2b115 / ext4 defaults,noatime 0 1
/dev/mapper/luks-ea763b8d-0f5c-4581-89f1-7fe0dc38087a swap swap defaults,noatime 0 2
UUID=43651a5d-3f0d-4d20-b147-7fa7e710283c /home/workstation0/1Toshiba >
tmpfs /tmp tmpfs defaults,noatime,mode=1777 0 0