While you're here, please consider supporting GamingOnLinux on:
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Login / Register
- New Linux kernel patch submitted to improve Lenovo Legion series support including Lenovo Legion Go
- Team Fortress 2 Comic issue 7 is finally, officially available
- Stalker 2: Heart of Chornobyl gets a massive patch with an AI overhaul and lots of A-Life fixes
- Valve released the Best of Steam - 2024 showing off the highest earners and most played games
- Sony buy up KADOKAWA shares to become largest shareholder of the FromSoftware parent company
- > See more over 30 days here
View PC info
My laptop was turned off this morning, shut down the usual way with no errors or anything like that... It's spent the day sitting in a case, in the shade and well protected.
I sit down at my desk tonight and boot it up, only to see random numbers this scrolling across the screen for a second or two (it just keeps repeating itself):
^[[26~^[[26~^[[26~^[[26~^[[26~^[[26~^[[26~^[[26~^[[26~^[[26~
This goes away after a second or two and I see:
error: unexpectedly disconnected from boot status demon
Please unlock disc cryptdata:
Entering my passphrase, which I've used a thousand times in the two months or so I've had this laptop, seemingly does not work and I get told:
No key available with this passphrase.
It then repeats the original error:
error: unexpectedly disconnected from boot status demon
Please unlock disc cryptdata:
When entering the passphrase, the keyboard does not appear to be producing input (which is not unusual for Linux-based operating systems), and nor does an external keyboard; but if I test them both in the UEFI, they work fine. The built-in keyboard is illuminated from power-on until the error, at which point it remains illuminated (so it's at least getting power); the external keyboard has the 'Num Lock' light illuminated in the UEFI and after initially powering-on, but this turns off once the gibberish ( ^[[26~ ) appears, suggesting that the keyboard is being disabled or otherwise powered off on this error screen.
This is the laptop under my profile, by the way.
Ideas?
Last edited by Cyba.Cowboy on 24 October 2024 at 9:55 am UTC
View PC info
Clean it up maybe? test on live usb to see what the keys are doing.
Odd that UEFI works fine, but maybe it simply ignores some special keys?
Edit: At least on my system ^[[26~ is volume down. Not sure if that helps?
Last edited by whizse on 24 October 2024 at 11:43 am UTC
The ^[[(code)~ is always indication of keyboard input. To see it intentionally you can type "read" as a command and start pressing keys like F1, F2, F12, etc. (ctrl + c to exit)
View PC info
This is after my manufacturer logo and before I would normally input my disk encryption passphrase, prior to the operating system loading.
Instead of seeing the (semi) graphical screen to enter my disk encryption password, I get a Terminal-like screen showing the giberish mentioned above automatically repeating on-screen (not through my input, it just appears on-screen itself for a few seconds), followed by that error message asking for my passphrase, which never works.
There is no possibility of liquid damage on this laptop, and this laptop - which is still only about two months old - has never been subject to any sort of damage; it was also in a protective case all day, sitting in on the back seat of a car with nothing on top of it, so it's unlikely to have been subject to some sort of unknown damage.
I think this relates to LUKS, the disc encryption... But I have no idea why it has randomly done this, when I haven't updated or done anything else that might cause such an issue.
Edit: Actually, I just remembered that I did one thing prior to shut down this morning, which was "purge" Geary from Pop!_OS using:
sudo apt purge geary
I foolishly didn't read what Terminal gave me (e.g. additional packages being removed) and just hit "Y" (I figured that nothing critical would be removed), so maybe I broke something doing this?
Also, for s#!ts and giggles, I launched a "live" session, to test the keyboard using LibreOfice... I checked all of the keys, nothing appears to be "stuck" or otherwise malfunctioning, and keys that offer on-screen input (e.g. letters, numbers, etc...) all appear to be working perfectly.
Last edited by Cyba.Cowboy on 24 October 2024 at 1:04 pm UTC
Likewise, if you get random key-presses when entering a password (even if they are not echoed to the screen) you are not going to produce the right passphrase.
Not saying 100% this is the issue but it does seem the most likely.
View PC info
The only splash screen I see if the manufacturer logo (in my case, ASUS), then it briefly shows that gibberish automatically appearing on-screen, before the error message.
Are you saying I should hold down a particular key when I see the ASUS logo? Any idea what key?
So you're saying that even if I am entering the correct passphrase (which I am), it's likely misinterpreting the input and thus, even though I'm physically pushing the correct keys, the wrong input is being registered by the computer?
What on Earth would even cause this prior to the operating system being booted?
Last edited by Cyba.Cowboy on 24 October 2024 at 1:09 pm UTC
But it seems less likely if you don't have any problems with a live session.
"src/client/plymouth.c: ply_error ("error: unexpectedly disconnected from boot status daemon");"
This is the boot "splash" application that provides a niceish GUI when you enter the passphrase for LUKS. If that exits you are left with the terminal/DOS like text interface.
View PC info
It still looks like its just spamming some key..but if its all right on liveUSB then it might have some strange software bug ofc on your current install.
A broken boot sequence (the "unexpectedly disconnected from boot status demon" error) and not being able to unlock an encrypted partition might be signs of a drive failure... just guessing here of course.
It would be interesting to run some SMART checks on the drive and see if you can unlock and mount it from a live USB. Not really sure what tools would be best for that on Pop_OS?
View PC info
When I had boot issues with my Pop!_OS installation, I was able to use my MintStick (Linux Mint live USB) to troubleshoot and fix the problem. The Mint Team always includes a number of very useful tools for troubleshooting problems on their live USB. In this case, perhaps Disks or GParted might help where SMART data is concerned?
View PC info
I'm considering doing this in the future, because it just causes too many headaches when something goes pear-shaped... My understanding is that for most "mainstream" distros, the default encryption used isn't all that strong, anyway.
Well, I've had a partial win - using this solution, I was able to decrypt my storage drive from a "live" session... But I can't seem to mount the storage drive using this command (as per the 'Ask Ubuntu' answer ):
udisksctl mount -b /dev/mapper/ubuntu--vg-root
If I had to take a guess, I'd say it's because I'm running Pop!_OS and not Ubuntu; but even when I tried "pop" and "popos", I was given the following errors:
Error looking up object for device /dev/mapper/pop--vg-root
Error looking up object for device /dev/mapper/popos--vg-root
Any ideas what I should use instead of "ubuntu"?
I think that if I can mount the drive from within the "live" session, manually backup the data and then do a "clean" install, I can work around this problem... It's not the perfect solution by any stretch of the imagination, but one which keeps my data safe.
Last edited by Pengling on 27 October 2024 at 11:31 pm UTC
Optionally switch to root:
$ sudo su -
If you skip above, just append sudo to the following.
Start by listing your partitions:
Note: This will work fine on bash, but zsh may throw a no matches found if one of those are missing, in that case just remove the missing one. For example: $ fdisk -l /dev/sd*
$ fdisk -l /dev/{hd*,sd*,nvm*}
This will show partitions from all regular drives, now read through it until you find your drive (See disk model). Under that you'll see a list of partitions, for example it might read "/dev/sda3"
There will probably be multiple partitions on your boot drive, some listed as "EFI System" and such. Try the largest partition first that says "Linux filesystem" or "unknown" (Unknown can occur in some LUKS setups, and does not indicate a problem in that case).
The largest one may be /dev/sda3 for example. Let's try to unlock it:
$ cryptsetup luksOpen /dev/sda3 data3
Let's mount it:
$ mkdir /mnt/data3
$ mount -t auto /dev/mapper/data3 /mnt/data3
If successful you should now see your data in /mnt/data:
$ ls /mnt/data3
On most configurations the largest partition is probably your home directory. Repeat the process for other smaller partitions if they exist, replacing "3" with the partition number, for example to mount an encrypted /dev/sda2:
$ cryptsetup luksOpen /dev/sda2 data2
$ mkdir /mnt/data2
$ mount -t auto /dev/mapper/data2 /mnt/data2
This will likely be your filesystem root ( / ) directory. You can swap and change then numbers or devices as needed, the process is the same.
When done, for each one just do:
$ umount /mnt/data2
$ cryptsetup luksClose data2
While swapping numbers as needed. :-)
Something like GNOME Disks, as suggested previously by Caldathras, works for for a traditional drive (mechanical or SSD). For NVMe you probably need a cli tool like "nvme" or "smartctl".
View PC info
It worked all the way up until this point...
When I entered:
mount -t auto /dev/mapper/data3 /mnt/data3
I was told:
mount: /mnt/data3: unknown filesystem type 'LVM2_member'.
Joking aside. That's actually really good news! It means your LUKS encryption header is intact and the data can be decrypted.
Follow the instructions I gave above up to the point of mount. We just need to mount it slightly differently. The logical volumes *should* be automatically picked up. So I'll explain that way first.
This time after creating /mnt/data3, do this:
$ lvdisplay
This should output the logical volume(s), each one with its own LV Path, something like "/dev/data/root" for example.
To mount, simply use the path shown next to "LV Path". For example if it is "/dev/data/root":
$ mount /dev/data/root /mnt/data3
This should mount. Now check it:
$ ls /mnt/data3
Hopefully this gets you to your files. This should be all that is needed on a healthy setup.
Last edited by BlackBloodRum on 31 October 2024 at 7:12 pm UTC
View PC info
root@pop-os:/home/pop-os# lvdisplay
--- Logical volume ---
LV Path /dev/data/root
LV Name root
VG Name data
LV UUID PFMI6C-AhIh-lSgl-4CUa-2nbc-0Qok-9mFwYL
LV Write Access read/write
LV Creation host, time pop-os, 2024-08-16 09:22:16 +0000
LV Status available
# open 0
LV Size <944.85 GiB
Current LE 241881
Segments 1
Allocation inherit
Read ahead sectors auto
- currently set to 256
Block device 252:1
root@pop-os:/home/pop-os# mount /dev/data/root /mnt/data3
mount: /mnt/data3: mount point does not exist.
root@pop-os:/home/pop-os# mount /dev/data/root /mnt/data
mount: /mnt/data: mount point does not exist.
$ mkdir /mnt/data
$ mount /dev/data/root /mnt/data
This should get that mounted.