#grub2 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #grub2, aggregated by home.social.
-
upgrade 20.04 to 24.04 with RAID1 and FDE #grub2 #upgrade #encryption #raid #doreleaseupgrade
-
upgrade 20.04 to 24.04 with RAID1 and FDE #grub2 #upgrade #encryption #raid #doreleaseupgrade
-
upgrade 20.04 to 24.04 with RAID1 and FDE #grub2 #upgrade #encryption #raid #doreleaseupgrade
-
upgrade 20.04 to 24.04 with RAID1 and FDE #grub2 #upgrade #encryption #raid #doreleaseupgrade
-
upgrade 20.04 to 24.04 with RAID1 and FDE #grub2 #upgrade #encryption #raid #doreleaseupgrade
-
Ubuntu only loads GRUB and won't boot or start recovery mode #grub2 #uefi #2404 #recoverymode
-
After way too many attempts, I finally got a custom GRUB2 EFI bootloader built with Buildroot showing a splash image at boot on real hardware 🎉
The secret? insmod gfxterm_background + font in the right path.
Simple in theory, painful in practice 🤕
-
After way too many attempts, I finally got a custom GRUB2 EFI bootloader built with Buildroot showing a splash image at boot on real hardware 🎉
The secret? insmod gfxterm_background + font in the right path.
Simple in theory, painful in practice 🤕
-
After way too many attempts, I finally got a custom GRUB2 EFI bootloader built with Buildroot showing a splash image at boot on real hardware 🎉
The secret? insmod gfxterm_background + font in the right path.
Simple in theory, painful in practice 🤕
-
After way too many attempts, I finally got a custom GRUB2 EFI bootloader built with Buildroot showing a splash image at boot on real hardware 🎉
The secret? insmod gfxterm_background + font in the right path.
Simple in theory, painful in practice 🤕
-
After way too many attempts, I finally got a custom GRUB2 EFI bootloader built with Buildroot showing a splash image at boot on real hardware 🎉
The secret? insmod gfxterm_background + font in the right path.
Simple in theory, painful in practice 🤕
-
At @bawuenet we're in the process of upgrading our #Xen #xcpng hypervisors to #uefi boot. Of course, we automate things and want to be able to reinstall our hypervisors from network boot. Our EFI netboot system is based on #ipxe which means it can only load EFI binaries. But xcp-ng ships the Xen kernel as a multiboot2 based image.
As probably one of the most weird ways to solve this problem, I've decided to chainload #grub2 from iPXE and learned a bit! 🧵 -
Is anyone using Packer and VMware and Rocky Linux? I'm having an issue with Rocky 10 and the packer boot. Using the example boot command here https://docs.rockylinux.org/10/guides/automation/templates-automation-packer-vsphere/ I end up with a boot box that looks like "xt ip=[blah]" because I think grub changed and <tab> isn't the right key stroke to edit the boot, the 'e' from 'text' is. Thats why I get just 'xt' and what follows. I think I need to then send a control-x to boot. Maybe? Anyone? Anyone? Bueller? My rocky 9 packer build still works great :-) #rockylinux #packer #vmwareESXi #grub2
-
Wie startet dein Linux-System und wie konfigurierst du den Boot-Prozess professionell? Genau hier kommt das Boot-Management ins Spiel – ein absolut kritischer Bereich der Linux-Administration, den du als angehender Administrator unbedingt verstehen musst.
Ohne dieses Grundverständnis stehst du bei Boot-Problemen hilflos da.
https://admindocs.de/linux-administration/linux-administration-10-boot-management-systemstart.shtml
#BootManagement #grub2 #linux #sysadmin #initramfs #linuxtutorial
-
Онлайн миграция системного диска Enterprise Linux на другую СХД
Иногда бывает, что наступает EndOfLife систем хранения данных (СХД) и их нужно выводить из работы, т.к. заканчиваются запчасти. В нашем случае оказалось, что неcколько хостов с Enterprise Linux загружены с этой СХД и необходимо их плавно перевести на другую. Подключить две СХД через SAN к серверам достаточно просто, но как перетащить систему так, чтобы это прошло с минимальным влиянием на бизнес-процессы? В прошлой статье в блоге Bercut я знакомил читателя с утилитой fsarchiver , сегодня мы рассмотрим другой вариант миграции с pvmove и qaucli .
https://habr.com/ru/articles/875824/
#qaucli #pvmove #grub2 #системный_диск #Беркут #Bercut #gdisk #QLogic
-
#Microsoft used its #AI-powered #SecurityCopilot to discover 20 previously unknown vulnerabilities in the #GRUB2, #UBoot, and #Barebox #opensource #bootloaders.
GRUB2 (GRand Unified Bootloader) is the default boot loader for most #Linux distributions, including Ubuntu, while U-Boot and Barebox are commonly used in embedded and #IoT devices.
https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/ #ITSec -
Microsoft AI Security Copilot Finds Hidden Flaws in GRUB2 and Other Bootloaders
#Cybersecurity #Microsoft #SecurityCopilot #GRUB2 #Uboot #Barebox #AI #OpenSourceSecurity #UEFI #Linux #VulnerabilityResearch
-
The North Koreans and Russians have been busy, Insiders abound, and attacker tradecraft continues to evolve!
Catch all this and more in our latest wrap-up of the day's news:
🗞️ https://opalsec.io/daily-news-update-monday-april-1-2025-australia-melbourne/
There are a few noteworthy stories to get across - here's the TL;DR to get you up to speed:
🕵️ North Korean Infiltration: This is way bigger than many think. DPRK nationals are landing jobs inside global companies, gaining privileged access ("keys to the kingdom" level!). DTEX reports active investigations in 7% of their Fortune Global 2000 clients, and CrowdStrike notes nearly 40% of their NK-related IR cases involved insiders. They move fast post-hire, pivoting to supply chains and installing RATs disguised as onboarding. Watch out for highly anomalous login behaviour (like days-long sessions!). Rigorous remote hiring checks (camera on, resume checks, comms style) are crucial.
🎣 ClickFix Tactics by Lazarus: The infamous North Korean group is evolving its 'Contagious Interview' campaign (now dubbed 'ClickFake' by Sekoia). They're targeting crypto job seekers (shifting focus to non-tech roles too!) with fake website/document errors ('ClickFix'). These prompt users to run PowerShell/curl commands, dropping the 'GolangGhost' backdoor. Watch out for lures impersonating giants like Coinbase or Kraken. Sekoia has shared YARA rules – definitely worth checking out.
💻 WordPress MU-Plugin Abuse: Bad actors are getting stealthy by hiding malicious code in WordPress "Must-Use Plugins" (wp-content/mu-plugins/). These execute automatically on every page load without activation, making them hard to spot. Sucuri is seeing redirects to fake browser updates, webshell backdoors fetching code from GitHub, and JS hijackers replacing content or links. Keep those instances patched, clean up unused plugins/themes, and lock down admin accounts (MFA!).
Check out what else happened in the past 24 hours, and subscribe to get each edition straight to your inbox:
📨 https://opalsec.io/daily-news-update-monday-april-1-2025-australia-melbourne/#/portal/signup#CyberSecurity #InfoSec #ThreatIntelligence #Hacking #DataBreach #Phishing #Malware #WordPress #NorthKorea #Russia #Ukraine #AI #SecurityCopilot #GRUB2 #Bootloaders #InsiderThreat #DataProtection #CyberAttack #infosecurity #cybersecuritynews #ClickFix
-
UEFI оказалась не такой уж и сложной технологией.
Оказывается, можно просто создать раздел FAT32 с типом ef, сделать его активным, создать там папку EFI, а в ней BOOT. И положить туда grubx64.efi переименовав его в bootx64.efi. И при перезагрузке прошивка EFI материнской платы сама найдёт этот раздел, залезет в папку EFI/BOOT и загрузит и запустит bootx64.efi. И появится командная строка GRUB2.
Если подложить в правильное место grub.cfg, то появится меню, а не командная строка.
Поскольку я использовал для экспериментов GRUB из ubuntu, то в нём был захардкожен путь /EFI/ubuntu. Соответственно, туда и пришлось класть grub.cfg и grubenv (для удобства).
Но это при условии, если в NVRAM переменные BOOT001, BOOT002 и т.д. отсутствуют или ведут к несуществующим или поломанным загрузчикам. UEFI в первую очередь пытается загрузить файлы загрузчики из этих переменных.
Можно ещё распаковать в EFI раздел rEFInd, который может загружать разные операционные системы в режиме EFI. А поскольку он основывается на GRUB2, тоже умеет напрямую грузить ядро linux.
-
Elendes #Windows!
Dualboot mit #Ubuntu.
Update #Windows
Reboot
Wondows #Bootmanager ignoriert das #Linux
BIOS: ändern.
Voila, #Grub2 startetUnverschämtheit von #Microsoft