Windows is not available in os-prober

I had manjaro 1 week ago, but I uninstall it 4 days ago because an issue with sudden restart, for that reason, I tested pop-os, ubuntu and as the bug continue, I just reinstalled yesterday manjaro kde neon to try kernel 5.15, and check if that doesn’t have the restart issue, but, now, I have the issue with grub, I thought it was because I didn’t have internet during installation, so, today I reinstall manjaro, and, os-prober still not finding windows

I wonder if for os-prober to detect other boot loaders on a different drive (other than the currently used EFI system partition), they need to be discovered via mounts? :person_shrugging:

(Not entirely sure of the os-prober logic.

@anonimoinc, can you try again, but this time first manually mount the following partition:

sudo mkdir -p /efi

sudo mount /dev/sda2 /efi

Then try update-grub again?

Hi @winnie , I run the first command, but in the second got this error

mount: /efi: special device /dev/sda2 does not exist.
       dmesg(1) may have more information after failed mount system call.

I wonder what this is then?

After running the command, check dmesg with dmesg | tail -n 50 for anything related to mount errors.


Did you install Windows in MBR mode?


What are the contents of /boot/efi/EFI

Do you see any Windows folders or boot-loaders?

^ there

I can’t suggest anything more as I don’t understand the Windows setup here.

Result of sudo dmesg | tail -n 50

[  481.411242] audit: type=1334 audit(1653886440.940:362): prog-id=152 op=LOAD
[  481.411266] audit: type=1300 audit(1653886440.940:362): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  481.411277] audit: type=1327 audit(1653886440.940:362): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  481.464046] audit: type=1334 audit(1653886440.996:363): prog-id=0 op=UNLOAD
[  484.479236] audit: type=1334 audit(1653886444.010:364): prog-id=153 op=LOAD
[  484.479261] audit: type=1300 audit(1653886444.010:364): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  484.479272] audit: type=1327 audit(1653886444.010:364): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  484.540796] audit: type=1334 audit(1653886444.073:365): prog-id=0 op=UNLOAD
[  487.445695] audit: type=1334 audit(1653886446.976:366): prog-id=154 op=LOAD
[  487.445721] audit: type=1300 audit(1653886446.976:366): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  487.445730] audit: type=1327 audit(1653886446.976:366): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  487.520623] audit: type=1334 audit(1653886447.053:367): prog-id=0 op=UNLOAD
[  490.414967] audit: type=1334 audit(1653886449.946:368): prog-id=155 op=LOAD
[  490.414991] audit: type=1300 audit(1653886449.946:368): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  490.415002] audit: type=1327 audit(1653886449.946:368): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  490.500908] audit: type=1334 audit(1653886450.033:369): prog-id=0 op=UNLOAD
[  493.488019] audit: type=1334 audit(1653886453.016:370): prog-id=156 op=LOAD
[  493.488045] audit: type=1300 audit(1653886453.016:370): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  493.488055] audit: type=1327 audit(1653886453.016:370): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  493.560777] audit: type=1334 audit(1653886453.093:371): prog-id=0 op=UNLOAD
[  496.457429] audit: type=1334 audit(1653886455.986:372): prog-id=157 op=LOAD
[  496.457462] audit: type=1300 audit(1653886455.986:372): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  496.457478] audit: type=1327 audit(1653886455.986:372): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  496.518453] audit: type=1334 audit(1653886456.050:373): prog-id=0 op=UNLOAD
[  499.427292] audit: type=1334 audit(1653886458.956:374): prog-id=158 op=LOAD
[  499.427319] audit: type=1300 audit(1653886458.956:374): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  499.427329] audit: type=1327 audit(1653886458.956:374): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  499.497419] audit: type=1334 audit(1653886459.030:375): prog-id=0 op=UNLOAD
[  501.155129] audit: type=1100 audit(1653886460.686:376): pid=6249 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:authentication grantors=pam_faillock,pam_permit,pam_faillock acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[  501.155403] audit: type=1101 audit(1653886460.686:377): pid=6249 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[  502.498869] kauditd_printk_skb: 4 callbacks suppressed
[  502.498881] audit: type=1334 audit(1653886462.030:382): prog-id=159 op=LOAD
[  502.498898] audit: type=1300 audit(1653886462.030:382): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  502.498909] audit: type=1327 audit(1653886462.030:382): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  502.564033] audit: type=1334 audit(1653886462.096:383): prog-id=0 op=UNLOAD
[  505.468408] audit: type=1334 audit(1653886465.000:384): prog-id=160 op=LOAD
[  505.468432] audit: type=1300 audit(1653886465.000:384): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  505.468442] audit: type=1327 audit(1653886465.000:384): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  505.524035] audit: type=1334 audit(1653886465.056:385): prog-id=0 op=UNLOAD
[  508.437518] audit: type=1334 audit(1653886467.966:386): prog-id=161 op=LOAD
[  508.437544] audit: type=1300 audit(1653886467.966:386): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  508.437555] audit: type=1327 audit(1653886467.966:386): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  508.500600] audit: type=1334 audit(1653886468.033:387): prog-id=0 op=UNLOAD
[  511.406348] audit: type=1334 audit(1653886470.936:388): prog-id=162 op=LOAD
[  511.406363] audit: type=1300 audit(1653886470.936:388): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[  511.406370] audit: type=1327 audit(1653886470.936:388): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[  511.467516] audit: type=1334 audit(1653886471.000:389): prog-id=0 op=UNLOAD
[  513.516185] audit: type=1101 audit(1653886473.046:390): pid=6260 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[  513.517141] audit: type=1110 audit(1653886473.046:391): pid=6260 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:setcred grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[  513.520205] audit: type=1105 audit(1653886473.050:392): pid=6260 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:session_open grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'

I don’t think I installed windows in MBR mode, or at least, I didn’t change the default windows installation, also, (if this is important) The first time I installed manjaro, it recognize windows just with sudo update-grub

The content of /boot/efi/EFI is

boot  Manjaro

That just can’t be right. Nothing else?

Then either Windows is using the legacy MBR boot, or its EFI boot loaders are stored on /dev/sda2 which you can’t even mount to check? :flushed:


This was immediately after the mount of /dev/sda2 failed?


What are the outputs of:

cat /etc/fstab

and

mount

Sorry, this is after mount failed

[ 1222.523917] audit: type=1334 audit(1653887182.056:874): prog-id=0 op=UNLOAD
[ 1225.445337] audit: type=1334 audit(1653887184.976:875): prog-id=394 op=LOAD
[ 1225.445361] audit: type=1300 audit(1653887184.976:875): arch=c000003e syscall=321 success=yes exit=32 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1225.445372] audit: type=1327 audit(1653887184.976:875): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1225.517196] audit: type=1334 audit(1653887185.050:876): prog-id=0 op=UNLOAD
[ 1228.415153] audit: type=1334 audit(1653887187.946:877): prog-id=395 op=LOAD
[ 1228.415180] audit: type=1300 audit(1653887187.946:877): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1228.415192] audit: type=1327 audit(1653887187.946:877): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1228.470705] audit: type=1334 audit(1653887188.003:878): prog-id=0 op=UNLOAD
[ 1231.486895] audit: type=1334 audit(1653887191.020:879): prog-id=396 op=LOAD
[ 1231.486920] audit: type=1300 audit(1653887191.020:879): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1231.486931] audit: type=1327 audit(1653887191.020:879): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1231.550915] audit: type=1334 audit(1653887191.083:880): prog-id=0 op=UNLOAD
[ 1234.388460] audit: type=1334 audit(1653887193.920:881): prog-id=397 op=LOAD
[ 1234.388485] audit: type=1300 audit(1653887193.920:881): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1234.388497] audit: type=1327 audit(1653887193.920:881): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1237.500638] audit: type=1334 audit(1653887197.033:882): prog-id=0 op=UNLOAD
[ 1237.791281] audit: type=1106 audit(1653887197.323:883): pid=6841 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:session_close grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1237.791332] audit: type=1104 audit(1653887197.323:884): pid=6841 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:setcred grantors=pam_unix acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1240.498432] audit: type=1334 audit(1653887200.030:885): prog-id=398 op=LOAD
[ 1240.498458] audit: type=1300 audit(1653887200.030:885): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1240.498469] audit: type=1327 audit(1653887200.030:885): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1240.537225] audit: type=1334 audit(1653887200.070:886): prog-id=0 op=UNLOAD
[ 1243.467482] audit: type=1334 audit(1653887202.996:887): prog-id=399 op=LOAD
[ 1243.467519] audit: type=1300 audit(1653887202.996:887): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1243.467537] audit: type=1327 audit(1653887202.996:887): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1243.534490] audit: type=1334 audit(1653887203.066:888): prog-id=0 op=UNLOAD
[ 1246.438070] audit: type=1334 audit(1653887205.966:889): prog-id=400 op=LOAD
[ 1246.438096] audit: type=1300 audit(1653887205.966:889): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1246.438106] audit: type=1327 audit(1653887205.966:889): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1246.527290] audit: type=1334 audit(1653887206.060:890): prog-id=0 op=UNLOAD
[ 1249.406581] audit: type=1334 audit(1653887208.936:891): prog-id=401 op=LOAD
[ 1249.406609] audit: type=1300 audit(1653887208.936:891): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1249.406622] audit: type=1327 audit(1653887208.936:891): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1249.463888] audit: type=1334 audit(1653887208.996:892): prog-id=0 op=UNLOAD
[ 1252.478698] audit: type=1334 audit(1653887212.010:893): prog-id=402 op=LOAD
[ 1252.478724] audit: type=1300 audit(1653887212.010:893): arch=c000003e syscall=321 success=yes exit=26 a0=5 a1=7ffc0dfaae50 a2=90 a3=45 items=0 ppid=1 pid=546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="NetworkManager" exe="/usr/bin/NetworkManager" subj==unconfined key=(null)
[ 1252.478734] audit: type=1327 audit(1653887212.010:893): proctitle=2F7573722F62696E2F4E6574776F726B4D616E61676572002D2D6E6F2D6461656D6F6E
[ 1252.520619] audit: type=1334 audit(1653887212.053:894): prog-id=0 op=UNLOAD
[ 1253.268804] audit: type=1100 audit(1653887212.800:895): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:authentication grantors=pam_faillock,pam_permit,pam_faillock acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1253.268986] audit: type=1101 audit(1653887212.800:896): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1253.270518] audit: type=1110 audit(1653887212.803:897): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:setcred grantors=pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1253.273651] audit: type=1105 audit(1653887212.803:898): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:session_open grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1253.275311] audit: type=1106 audit(1653887212.806:899): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:session_close grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1253.275317] audit: type=1104 audit(1653887212.806:900): pid=7119 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:setcred grantors=pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1264.531865] kauditd_printk_skb: 3 callbacks suppressed
[ 1264.531882] audit: type=1334 audit(1653887224.063:902): prog-id=0 op=UNLOAD
[ 1266.319076] audit: type=1101 audit(1653887225.850:903): pid=7160 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="anonimoinc" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1266.321582] audit: type=1110 audit(1653887225.853:904): pid=7160 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:setcred grantors=pam_faillock,pam_permit,pam_env,pam_faillock acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
[ 1266.328406] audit: type=1105 audit(1653887225.860:905): pid=7160 uid=1000 auid=1000 ses=1 subj==unconfined msg='op=PAM:session_open grantors=pam_systemd_home,pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'

The cat /etc/fstab result

# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system>             <mount point>  <type>  <options>  <dump>  <pass>
UUID=B03F-4029                            /boot/efi      vfat    umask=0077 0 2
UUID=3db29f5f-91bf-4be6-9ad2-dc40dcbc6d44 /              ext4    defaults,noatime 0 1
tmpfs                                     /tmp           tmpfs   defaults,noatime,mode=1777 0 0

The mount result

proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
sys on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
dev on /dev type devtmpfs (rw,nosuid,relatime,size=16271920k,nr_inodes=4067980,mode=755,inode64)
run on /run type tmpfs (rw,nosuid,nodev,relatime,mode=755,inode64)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
/dev/nvme0n1p2 on / type ext4 (rw,noatime)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=30,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=30405)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
none on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
tmpfs on /tmp type tmpfs (rw,noatime,inode64)
/dev/nvme0n1p1 on /boot/efi type vfat (rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=3256484k,nr_inodes=814121,mode=700,uid=1000,gid=1001,inode64)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1001)
jetbrains-toolbox on /tmp/.mount_jetbra5Acu0n type fuse.jetbrains-toolbox (ro,nosuid,nodev,relatime,user_id=1000,group_id=1001)
portal on /run/user/1000/doc type fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1001)

This isn’t making sense.

We can’t even see inside /dev/sda2, which is a FAT filesystem labeled as “EFI”, to see if this is where the Windows EFI boot loader is.


When starting up your computer, are you able to do a boot override and choose Windows?

About the boot override, if you mean boot using the windows hard drive, I can’t, something important I forgot to mention, I installed windows in a second drive and manjaro is installed in the main hard drive

it looks like you dont have any windows boot partition … check in bios boot settings, if windows is detected there

Well it more than clear that there is a EFI Partition missing on the Windows Drive.

Check if it has a EFI entry:

efibootmgr -v

That might be the reason. Your previous install of Manjaro must be in BIOS mode and now it was installed in EFI mode.

When I installed manjaro 1 week ago windows wasn’t installed in the second drive, also, the efibootmgr -v result

BootCurrent: 0000
Timeout: 1 seconds
BootOrder: 0000,0002,0003,0001,0004,0005
Boot0000* Manjaro       HD(1,GPT,53d4aca1-c1f4-914e-af42-0cbfb5e50642,0x1000,0x96000)/File(\EFI\MANJARO\GRUBX64.EFI)
Boot0001* UEFI:CD/DVD Drive     BBS(129,,0x0)
Boot0002* UEFI OS       HD(1,GPT,53d4aca1-c1f4-914e-af42-0cbfb5e50642,0x1000,0x96000)/File(\EFI\BOOT\BOOTX64.EFI)..BO
Boot0003* UEFI: KingstonDataTraveler 3.0, Partition 2   PciRoot(0x0)/Pci(0x14,0x0)/USB(14,0)/HD(2,MBR,0xb3423e25,0x39933f0,0x10000)..BO
Boot0004* UEFI:Removable Device BBS(130,,0x0)
Boot0005* UEFI:Network Device   BBS(131,,0x0)

Probably reinstall windows will fix the issue?

Without nuking your Manjaro system? As long as you know how to navigate safely around Windows’ installer not formatting your drive (accidental or otherwise) which contains Manjaro; and you’re keen on not making any mistakes during the process.

But you should get under your belt the differences between MBR and EFI boot loaders, as well as consistently use only GPT partition tables and only EFI boot. (No reason to “mix and match”.)

I have installed windows in a second hard drive, so, manjaro is safe, also, I didn’t make the “customized” installation, I just install windows and manjaro with their defaults, is that ok or there is something I should have to do by myself?

Manjaro is absolutely NOT safe when you install Windows, on a separate drive, next to Manjaro which is installed on its own drive. Last time I installed Windows I did what I never do, I let all disks plugged into the motherboard, I selected to install Windows on its own empty drive, and guess what, it destroyed my Manjaro EFI partition and boot option, on the OTHER disk. Yes, Windows, decided that as I had an EFI partition on my Manjaro disk, it would use it (pardon me, NUKE IT) to install its bootloader… Result, I had to reinstall GRUB in the Manjaro EFI from live USB, I unplugged everything but the Windows disk, installed Windows on its own disk so it created its own EFI partition on its own disk.

Ridiculous, you would think in such case it would warn you it would use an existing EFI partition on another disk, but no, it will simply wipe it…

So don’t be so sure how safe it is installing Windows…

My advice, remove all disk but the Windows one, format/install Windows on it, then boot see if it all works, then replug everything.

2 Likes

According to Microsoft, there is only Windows. All storage drives exist to serve the needs of Windows. :innocent:

1 Like

I ended up formatting my hard drives, with the disk utility in manjaro live cd, after that, I installed first Manjaro, and after that, Windows. When all was installed I run sudo update-grub in manjaro and windows was recognized, in my case, the most important was install Manjaro first, because in other way, Manjaro isn’t recognized

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.