Today's boot up triggered a boot password demand after the desktop appeared "Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
On Fri, 24 Sep 2021 17:24:27 -0400, faeychild
<faeychild@nomail.afraid.org> wrote:
Today's boot up triggered a boot password demand after the desktop
appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
That's bizarre. How is the ssd normally being mounted?
Regards, Dave Hodgins
On 25/9/21 07:29, David W. Hodgins wrote:
On Fri, 24 Sep 2021 17:24:27 -0400, faeychildSupposedly at boot from fstab
<faeychild@nomail.afraid.org> wrote:
Today's boot up triggered a boot password demand after the desktop
appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
That's bizarre. How is the ssd normally being mounted?
Regards, Dave Hodgins
# Entry for /dev/nvme0n1p8 :
UUID=7a03c56e-827b-4550-9b98-ca2e9f2582f4 / ext4 noatime,acl 1 1
# Entry for /dev/nvme0n1p1 :
UUID=8662-5EDE /boot/EFI vfat iocharset=utf8,umask=000 0 0
none /proc proc defaults 0 0
# Entry for /dev/sda1 :
UUID=ddce96e5-77d9-45dd-b1c7-4bf10d42fff7 /video ext4 noatime,acl 1 2
# Entry for /dev/nvme0n1p3 :
UUID=0f26b0d8-adf7-45cf-a963-cc5d89c1a8e4 swap swap defaults 0 0
with apologies to Bit Twister; I haven't run his "Label" script yet
I order matters I could shuffle "/dev/sda1" and "/boot/EFI"
to the end of list.
On 25/9/21 07:29, David W. Hodgins wrote:
On Fri, 24 Sep 2021 17:24:27 -0400, faeychildSupposedly at boot from fstab
<faeychild@nomail.afraid.org> wrote:
Today's boot up triggered a boot password demand after the desktop
appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
That's bizarre. How is the ssd normally being mounted?
Regards, Dave Hodgins
# Entry for /dev/nvme0n1p8 :
UUID=7a03c56e-827b-4550-9b98-ca2e9f2582f4 / ext4 noatime,acl 1 1
# Entry for /dev/nvme0n1p1 :
UUID=8662-5EDE /boot/EFI vfat iocharset=utf8,umask=000 0 0
none /proc proc defaults 0 0
# Entry for /dev/sda1 :
UUID=ddce96e5-77d9-45dd-b1c7-4bf10d42fff7 /video ext4 noatime,acl 1 2
# Entry for /dev/nvme0n1p3 :
UUID=0f26b0d8-adf7-45cf-a963-cc5d89c1a8e4 swap swap defaults 0 0
with apologies to Bit Twister; I haven't run his "Label" script yet
I order matters I could shuffle "/dev/sda1" and "/boot/EFI"
to the end of list.
On Fri, 24 Sep 2021 18:18:33 -0400, faeychild
<faeychild@nomail.afraid.org> wrote:
On 25/9/21 07:29, David W. Hodgins wrote:
On Fri, 24 Sep 2021 17:24:27 -0400, faeychildSupposedly at boot from fstab
<faeychild@nomail.afraid.org> wrote:
Today's boot up triggered a boot password demand after the desktop
appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
That's bizarre. How is the ssd normally being mounted?
Regards, Dave Hodgins
# Entry for /dev/nvme0n1p8 :
UUID=7a03c56e-827b-4550-9b98-ca2e9f2582f4 / ext4 noatime,acl 1 1
# Entry for /dev/nvme0n1p1 :
UUID=8662-5EDE /boot/EFI vfat iocharset=utf8,umask=000 0 0
none /proc proc defaults 0 0
# Entry for /dev/sda1 :
UUID=ddce96e5-77d9-45dd-b1c7-4bf10d42fff7 /video ext4 noatime,acl 1 2
# Entry for /dev/nvme0n1p3 :
UUID=0f26b0d8-adf7-45cf-a963-cc5d89c1a8e4 swap swap defaults 0 0
with apologies to Bit Twister; I haven't run his "Label" script yet
I order matters I could shuffle "/dev/sda1" and "/boot/EFI"
to the end of list.
Ok, so it's a pcie ssd "drive", as in a pcie card. It should be
available for
mounting well before the uefi firmware even starts an os, and all of the file
systems mounted by the initrd before it switches root. I don't see
anything there
that could trigger a mount request that's run as the user.
Is that the actual message, as in it explicitly stated "mount SSD"? If
so, then
No It says to mount nvme0***-something which is a partition on the SSD
I note next time
Also my desktop switching is gone again
I haven't been running any root privileged stuff. Mostly the browser and youtube. All happened while I was away from the computer
The only recent change has been the last update
On 25/9/21 15:44, faeychild wrote:
No It says to mount nvme0***-something which is a partition on the SSD
I note next time
Also my desktop switching is gone again
I haven't been running any root privileged stuff. Mostly the browser
and youtube. All happened while I was away from the computer
The only recent change has been the last update
It says that an application is attempting to perform... Authentication
is required to mount /dev/nvme0n1p5. which is a backup partition
It's not listed in fstab. no application is running the session is
starting with a clean desktop.
This does not happen with "junk" user Clearly it is in my $HOME config
files. Is there a way to clear the $HOME folder and repopulate it.
It says that an application is attempting to perform... Authentication
is required to mount /dev/nvme0n1p5. which is a backup partition
It's not listed in fstab. no application is running the session is
starting with a clean desktop.
This does not happen with "junk" user
Clearly it is in my $HOME config files. Is there a way to clear the
$HOME folder and repopulate it.
It says that an application is attempting to perform... Authentication
is required to mount /dev/nvme0n1p5. which is a backup partition
It's not listed in fstab. no application is running the session is
starting with a clean desktop.
This does not happen with "junk" user
Clearly it is in my $HOME config files. Is there a way to clear the
$HOME folder and repopulate it.
Before repopulating, I would look for nvme0n1p5 in all the files in $HOME
and subordinate directories.
cd
grep -R nvme0n1p5 *
You might cd /etc and do the same there.
For example run locate $USER | grep /data
Note: list is not inconclusive depending on apps used.
I have been testing with junk, erasing the 'junk" home directory as
root and finding it reconstructed
The number of files replaced is really extensive.
Where is this replacement "Blue Print" located. Is it a script?
It starts with a copy of the files in /etc/skel/, with the rest created by whatever desktop environment is being run.
Regards, Dave Hodgins
cd
grep -R nvme0n1p5 *
You might cd /etc and do the same there.
Cheers!
jim b.
Today's boot up triggered a boot password demand after the desktop appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
On 25/9/21 07:24, faeychild wrote:
Today's boot up triggered a boot password demand after the desktop
appeared
"Root password is required to mount SSD"
Two boots caused it to pop up but the third boot was clean.
The SSD was mounted OK each time. The password not required.
I wonder do I have a race hazard?
[Breaking News]
The latest update has eliminated the password demand.
I am no longer able to take up the challenge to chase it down :-(
Can't claim to be totally broken hearted though :-)
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 296 |
Nodes: | 16 (2 / 14) |
Uptime: | 45:42:38 |
Calls: | 6,648 |
Files: | 12,197 |
Messages: | 5,329,775 |