Solved

Intermittent hang in grub phase 2

Posted on 2006-06-10
5
441 Views
Last Modified: 2008-03-04
I didn't change a thing for 2 years but suddenly my SuSE 9.0 system
hung while booting in GRUB phase 2.
I rebooted several times, then left it alone for some time.
When I returned it was booting and after that every thing seemed normal.
From that time there were no problems, until recently.
Again it spent some hour in GRUB 2.
And again it's over.
Is something defgrading? IDE Controller? IDE disk? Memory?

;JOOP!
0
Comment
Question by:sciuriware
  • 2
  • 2
5 Comments
 
LVL 24

Author Comment

by:sciuriware
ID: 16879876
Typo: Is something degrading? IDE Controller? IDE disk? Memory?

;JOOP!
0
 
LVL 22

Assisted Solution

by:pjedmond
pjedmond earned 150 total points
ID: 16880050
Quite probably! As the problem is phase 2 of the grub boot loading process, I'd say that the fault is most likely to be with the IDE drive or controller. If it was with the memory, then I'd expect a crash/core dump/kernel panic.

Back up everything and run hard drive manufacturers diagnostics to confirm state of the hard drive.
0
 
LVL 87

Accepted Solution

by:
rindi earned 350 total points
ID: 16884146
What HD make are you using? Download a copy of the UBCD and it has everything you need to test your hardware. There is memtest86+ to test your RAM, and there are the HD manufacturer's utilities for testing the Disk, which is probably your problem. download the full cd which comes including a linux version with gui (insert), which is similar to damn small linux...

http://ultimatebootcd.com
0
 
LVL 24

Author Comment

by:sciuriware
ID: 16892362
Not tried yet, but surely the answer!
I expect I can burn the ISO using NERO.

;JOOP!
0
 
LVL 87

Expert Comment

by:rindi
ID: 16892723
Yes, nero works well. Thanks
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now