You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ms.custom: sap:My VM is not booting, linux-related-content
12
12
ms.topic: troubleshooting
13
-
ms.date: 02/25/2025
13
+
ms.date: 02/26/2025
14
14
ms.author: divargas
15
15
ms.reviewer: ekpathak, v-leedennis, v-weizhu
16
16
---
@@ -68,27 +68,27 @@ See the following sections for detailed errors, possible causes, and solutions.
68
68
> [!NOTE]
69
69
> In the commands mentioned in the following sections, replace `/dev/sdX` with the corresponding Operating System (OS) disk device.
70
70
71
-
### <aid="offline-troubleshooting"></a> Reinstall GRUB and regenerate GRUB configuration file using Auto Repair (ALAR)
71
+
### <aid="offline-troubleshooting"></a> Reinstall GRUB and regenerate GRUB configuration file using Azure Linux Auto Repair
72
72
73
73
Azure Linux Auto Repair (ALAR) scripts are part of the VM repair extension described in [Use Azure Linux Auto Repair (ALAR) to fix a Linux VM](./repair-linux-vm-using-alar.md). ALAR covers the automation of multiple repair scenarios, including GRUB rescue issues.
74
74
75
-
The ALAR scripts use the repair extension `repair-button` to fix GRUB issues by specifying `--button-command grubfix` for Generation 1 VMs, or `--button-command efifix` for Generation 2 VMs. This parameter triggers the automated recovery. Implement the following commands to automate the fix of common GRUB errors that could be fixed by reinstalling GRUB and regenerating the corresponding configuration file:
75
+
The ALAR scripts use the repair extension `repair-button` to fix GRUB issues by specifying `--button-command grubfix` for Generation 1 VMs, or `--button-command efifix` for Generation 2 VMs. This parameter triggers the automated recovery. Implement the following commands to automate the fix of common GRUB errors by reinstalling GRUB and regenerating the corresponding configuration file:
76
76
77
77
***Linux VMs without UEFI (BIOS based - Gen1):**
78
78
79
-
```azurecli-interactive
80
-
az extension add -n vm-repair
81
-
az extension update -n vm-repair
82
-
az vm repair repair-button --button-command 'grubfix' --verbose $RGNAME --name $VMNAME
83
-
```
79
+
```azurecli-interactive
80
+
az extension add -n vm-repair
81
+
az extension update -n vm-repair
82
+
az vm repair repair-button --button-command 'grubfix' --verbose $RGNAME --name $VMNAME
83
+
```
84
84
85
85
* **Linux VMs with UEFI (Gen2):**
86
86
87
-
```azurecli-interactive
88
-
az extension add -n vm-repair
89
-
az extension update -n vm-repair
90
-
az vm repair repair-button --button-command 'efifix' --verbose $RGNAME --name $VMNAME
91
-
```
87
+
```azurecli-interactive
88
+
az extension add -n vm-repair
89
+
az extension update -n vm-repair
90
+
az vm repair repair-button --button-command 'efifix' --verbose $RGNAME --name $VMNAME
91
+
```
92
92
93
93
> [!IMPORTANT]
94
94
> Replace the resource group name `$RGNAME` and VM name `$VMNAME` accordingly.
@@ -149,16 +149,18 @@ This error might be associated with one of the following issues:
149
149
150
150
To resolve this issue, follow the steps in [Fix /boot file system corruption](#fix-boot-file-system-corruption).
151
151
152
-
* GRUB boot loader is pointing to an invalid disk or partition.
152
+
* GRUB boot loader points to an invalid disk or partition.
153
153
154
154
To resolve this issue, [reinstall GRUB and regenerate GRUB configuration file](#reinstall-grub-regenerate-grub-configuration-file).
155
155
156
-
* OS disk partition table issues caused by human error.
156
+
* OS disk partition table issues caused by human errors.
157
157
158
-
To resolve such issues, follow the steps in [Error: No such partition](#no-such-partition) with recommendations to re-create the `/boot` partition if missing or created incorrectly.
158
+
To resolve such issues, follow the steps in [Error: No such partition](#no-such-partition) to re-create the `/boot` partition if missing or created incorrectly.
159
159
160
160
### <a id="fix-boot-file-system-corruption"></a>Fix /boot file system corruption
161
161
162
+
To fix `/boot` file system corruption, follow these steps:
163
+
162
164
1. Check whether a rescue/repair VM was created. If it wasn't created, follow step 1 in [Troubleshoot GRUB rescue issue offline](#offline-troubleshooting) to create the VM.
163
165
164
166
2. Refer to [Troubleshoot file system corruption errors in Azure Linux](linux-recovery-cannot-start-file-system-errors.md) to resolve the corruption issues in the corresponding `/boot` partition.
@@ -338,7 +340,7 @@ If the `/boot` partition is missing, re-create it by following these steps:
338
340
/dev/sdc1: UUID="<UUID>" TYPE="ext4"
339
341
```
340
342
341
-
3. If the `/boot` file system isn't visible in`blkid` after you re-create the partition, this means that the /boot data no longer exists. You have to re-create the /boot file system (by using the same UUID and file system format that's in the `/etc/fstab` /boot entry), and then [restore its contents from a backup](/azure/backup/backup-azure-arm-restore-vms).
343
+
3. If the `/boot` file system isn't visible in `blkid` after you re-create the partition, this means that the `/boot` data no longer exists. You have to re-create the `/boot` file system (by using the same UUID and file system format that's in the `/etc/fstab` `/boot` entry), and then [restore its contents from a backup](/azure/backup/backup-azure-arm-restore-vms).
342
344
343
345
#### <a id="re-create-boot-partition-in-gpt-systems"></a>Re-create /boot partition in GPT systems
344
346
@@ -421,7 +423,7 @@ The following screenshot shows the error message:
421
423
422
424
:::image type="content" source="./media/troubleshoot-vm-boot-error/grub-efi-get-secure-boot-not-found.jpg" alt-text="Screenshot of grub error 'grub_efi_get_secure_boot' not found.":::
423
425
424
-
Linux kernel version `4.12.14`(that's used in SLES 12 SP5) doesn't support the [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) option. Therefore, if secure boot is enabled during the deployment of the VM (that is, the **Security type** field is set to [Trusted launch virtual machines](/azure/virtual-machines/trusted-launch)), the virtual machine generates the secure boot error through the console when you try to start by using this SUSE kernel version on a Gen2 VM image.
426
+
Linux kernel version 4.12.14(that's used in SLES 12 SP5) doesn't support the [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) option. Therefore, if secure boot is enabled during the deployment of the VM (that is, the **Security type** field is set to [Trusted launch virtual machines](/azure/virtual-machines/trusted-launch)), the virtual machine generates the secure boot error through the console when you try to start by using this SUSE kernel version on a Gen2 VM image.
0 commit comments