Which, on Reddit, ended up with the solution to make my secondary drive an ext4 instead of a ntfs3.
So I tried using Gparted to formate the disk, thinking it would be fine since this was a secondary drive. I had two partition, the one in which I assumed the distro was installed and the secondary one which I formated.
When I restarted my computer, I was met with the fatal message “no bootable device”. So it seems I fucked up big time.
Is there any way I can clean the stupid mess I made ? Or should I simply install a fresh installation ?
Thank you guys
Edit : So I notice I can still access every file from booting from the USB I used to install, is there any information I can add from there ?
Reboot and see if you could boot into your system.
There is however some confusing info in:
While your ESP has the right size and right flags for systemd-boot, it doesn’t have the right format. It should be FAT32. Not sure if this could also be part of the issue.
And yes, I think it is a problem indeed since your first solution didn’t solve the problem.
Could I resize the partition and make a partition just for the purpose of booting ? (I’m really not aware if that’s a stupid question or not, I’m so sorry).
If I understand well, I formatted sda1 from nfts to ext4 (because I needed that space in ext4 due to a Proton issue). Not realizing (even if it was right before my eyes) that it was used for booting.
Now, since I booted from the USB, this is not my normal password. Is there a generic password when you use a temporary session like this ?
Nevermind, I simply used “sudo -i”
There is just this thing that frigthen me a bit
`sudo arch-chroot /mnt
[root@EndeavourOS /]#
bootctl install
Created "/efi/EFI".
Created "/efi/EFI/systemd".
Created "/efi/EFI/BOOT".
Created "/efi/loader".
Created "/efi/loader/entries".
Created "/efi/EFI/Linux".
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/systemd/systemd-bootx64.efi".
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/efi/EFI/BOOT/BOOTX64.EFI".
⚠️ Mount point '/efi' which backs the random seed file is world accessible, which is a security hole! ⚠️
⚠️ Random seed file '/efi/loader/.#bootctlrandom-seed32f862dc39ef4e35' is world accessible, which is a security hole! ⚠️
Random seed file /efi/loader/random-seed successfully written (32 bytes).
Created EFI boot entry "Linux Boot Manager".
[root@EndeavourOS /]#