Guest User

Recovery attempt

a guest
Nov 14th, 2025
28
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.18 KB | None | 0 0
  1.  
  2. [nixos@nixos:~]$ sudo -i
  3.  
  4. [root@nixos:~]# lsblk -f
  5. NAME FSTYPE FSVER LABEL UUID FSAVAIL FSUSE% MOUNTPOINTS
  6. loop0 squashfs 4.0 0 100% /nix/.ro-store
  7. sda
  8. ├─sda1 vfat FAT32 C8DF-1D46
  9. └─sda2 ext4 1.0 509efae4-ec18-4057-93d4-a0bf08037f85
  10. sdb iso9660 Joliet Extension nixos-graphical-25.05-x86_64 1980-01-01-00-00-00-00
  11. ├─sdb1 iso9660 Joliet Extension nixos-graphical-25.05-x86_64 1980-01-01-00-00-00-00 0 100% /iso
  12. └─sdb2 vfat FAT12 EFIBOOT 1234-5678
  13.  
  14. [root@nixos:~]# mount /dev/sda2 /mnt
  15.  
  16. [root@nixos:~]# mount /dev/sda1 /mnt/boot
  17.  
  18. [root@nixos:~]# nixos-enter --root /mnt
  19. setting up /etc...
  20.  
  21. [root@nixos:/]# nixos-rebuild boot --install-bootloader --show-trace --flake '/home/klucas/.nix-config'
  22. warning: Git tree '/home/klucas/.nix-config' is dirty
  23. building the system configuration...
  24. warning: Git tree '/home/klucas/.nix-config' is dirty
  25. Running in a chroot, enabling --graceful.
  26. Copied "/nix/store/f8plklbbq3gwkq1wfq89i3f4wy8rabzn-systemd-258/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/EFI/systemd/systemd-bootx64.efi".
  27. Copied "/nix/store/f8plklbbq3gwkq1wfq89i3f4wy8rabzn-systemd-258/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/EFI/BOOT/BOOTX64.EFI".
  28. ⚠ Mount point '/boot' which backs the random seed file is world accessible, which is a security hole! ⚠
  29. ⚠ Random seed file '/boot/loader/random-seed' is world accessible, which is a security hole! ⚠
  30. Random seed file /boot/loader/random-seed successfully refreshed (32 bytes).
  31. Created EFI boot entry "Linux Boot Manager".
  32. Done. The new configuration is /nix/store/zc630d9sshlhp3ppppx39b32zhqn0yqi-nixos-system-nixos-25.11.20251108.b6a8526
  33.  
  34. [root@nixos:/]#
Advertisement
Add Comment
Please, Sign In to add comment