Slackware64 14.2 fails to boot after slackpkg upgrade-all
Hi, since some security patches I decided to do some updates, however, some things seemingly didn't work, I think lilo failed to run, and after an unwitting kernel update, the computer failed to boot (don't blame me, it was 2 am...)
So I tried to chroot from a Slackusb, but for some reason, it reports a segmentation fault upon logging in, just after giving me a fortune. I have followed the instructions given here : https://www.linuxquestions.org/quest...86#post5827786 Anyway I can recover my installation ? I'm pretty crippled without my Slackware now. Also if it helps, I have restricted my root access to secure my system, so I think it may have prevented me from directly logging in as root in chroot, although I have no information other than a segmentation fault to confirm this. Booting the computer with the huge kernel seems to bring me to a textual log screen, but none of the peripherals connected to the computer such as the computer will work, making the system unusable. |
FOA, what's written in terminal? I've got "almost" similar problem (after updating to -118). Had to remake initrd.
Second (worst), what's you're partitioning scheme? |
How (and why) did you restrict root access? I'm not really sure why you think it would help secure your system.
Anyway, do you get the segmentation fault right after logging in as root when booting the installation media or when trying to chroot to your system partition? If it's the first one, it sounds like it may be corrupted and you may want to try and reimage your device. If it's the second, we'd need more info on how you restricted root access... |
Quote:
Quote:
Code:
echo 'ALL:ALL EXCEPT GROUP root:DENY' >>/etc/suauth Code:
echo '-:ALL EXCEPT incognito:ALL' >>/etc/login.access And first, when I try to login as root through chroot using this command after mounting the necessary paths as explained in the topic I linked above : Code:
chroot /mnt/Slackware env -i HOME=/root TERM=$TERM PS1='\u@\h:\w# ' PATH=/usr/bin:/usr/sbin:/bin:/sbin bash --login +h |
Well, I've never tried doing this on a system that has root disabled, so it could very well be related to your issue. When you chroot, it uses everything from the folder that you're intending to act as the chroot. So, if root is disabled, once it starts using the chroot, it will hit those limitations and could very well lead to a segmentation fault.
If it is related to root being disabled, I think your only way to resolve this would be to temporarily revert your changes. You can do that while still at the prompt after booting up the installation media before the chroot. However, towards your concern about getting hacked, by default, ssh doesn't allow root logins via password. You can only log in as root using a pre-generated ssh key (although, you can change it to not allow root ssh logins at all or enable password logins, if desired). So, they wouldn't be able to get in that way. Also, you could also change the default ssh port from 22 to some random number, which would make it more difficult to allow others to even figure out the port needed to log in. And I don't think there's any situation where a single user is more secure than a normal user and a separate user with elevated permissions that is only used when necessary. |
Would there be no way to login in with my username with chroot and su once in ?
Cause root ain't disabled, I can still use it if I su through my account. |
Quote:
|
Why do you want to login as your user?
Login as root and fix your bootloader. |
Quote:
|
root login disabled is a pragmatic measure. The only way to login is via installer.
Best run a fs check on root partition first using the installer env: fsck -pf /dev/sda4 |
Quote:
|
Why are you advising to change fs data by altering permission etc then when you dont have a diagnosis?
It's a good idea to run a fsck regardless. |
Quote:
|
Quote:
Quote:
|
Quote:
|
All times are GMT -5. The time now is 12:36 AM. |