• Bug#1100470: grub2-common: Segfault messages when running update-grub

    From eric@21:1/5 to All on Fri Mar 14 10:10:01 2025
    Package: grub2-common
    Version: 2.12-6
    Severity: normal

    Since this update, I have the following worrying messages:

    update-grub
    Generating grub configuration file ...
    Found background image: /usr/share/images/desktop-base/desktop-grub.png
    Found linux image: /boot/vmlinuz-6.6.83
    Found initrd image: /boot/initrd.img-6.6.83
    Found linux image: /boot/vmlinuz-6.6.82
    Found initrd image: /boot/initrd.img-6.6.82
    Found linux image: /boot/vmlinuz-6.6.80
    Found initrd image: /boot/initrd.img-6.6.80
    Found linux image: /boot/vmlinuz-6.6.79
    Found initrd image: /boot/initrd.img-6.6.79
    Found pcmemtest 64bit EFI image: /boot/pcmemtestx64.efi
    Warning: os-prober will be executed to detect other bootable partitions.
    Its output will be used to detect bootable binaries on them and create new boot entries.
    /usr/lib/os-probes/50mounted-tests: line 72: 6937 Segmentation fault (core dumped) grub-mount "$partition" "$tmpmnt" 2> /dev/null
    /usr/lib/os-probes/50mounted-tests: line 72: 6973 Segmentation fault (core dumped) grub-mount "$partition" "$tmpmnt" 2> /dev/null
    /usr/lib/os-probes/50mounted-tests: line 72: 6996 Segmentation fault (core dumped) grub-mount "$partition" "$tmpmnt" 2> /dev/null
    Found Windows Boot Manager on /dev/nvme0n1p1@/EFI/Microsoft/Boot/bootmgfw.efi Adding boot menu entry for UEFI Firmware Settings ...
    done



    -- Package-specific info:

    *********************** BEGIN /proc/mounts
    /dev/nvme0n1p5 / ext4 rw,noatime,nodiratime,discard,errors=remount-ro 0 0 /dev/nvme0n1p7 /usr/local ext4 rw,noatime,nodiratime,discard 0 0
    /dev/nvme0n1p9 /tmp ext4 rw,noatime,nodiratime,discard 0 0
    /dev/nvme0n1p10 /home ext4 rw,noatime,nodiratime,discard 0 0
    /dev/nvme0n1p6 /var ext4 rw,noatime,nodiratime,discard 0 0
    /dev/sda1 /multimedia ntfs3 rw,noatime,nodiratime,uid=1000,gid=1000,discard,iocharset=utf8 0 0
    /dev/nvme0n1p1 /boot/efi vfat rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro 0 0
    *********************** END /proc/mounts

    *********************** BEGIN /boot/grub/grub.cfg
    #
    # DO NOT EDIT THIS FILE
    #
    # It is automatically generated by grub-mkconfig using templates
    # from /etc/grub.d and settings from /etc/default/grub
    #

    ### BEGIN /etc/grub.d/00_header ###
    if [ -s $prefix/grubenv ]; then
    set have_grubenv=true
    load_env
    fi
    if [ "${next_entry}" ] ; then
    set default="${next_entry}"
    set next_entry=
    save_env next_entry
    set boot_once=true
    else
    set default="0"
    fi

    if [ x"${feature_menuentry_id}" = xy ]; then
    menuentry_id_option="--id"
    else
    menuentry_id_option=""
    fi

    export menuentry_id_option

    if [ "${prev_saved_entry}" ]; then
    set saved_entry="${prev_saved_entry}"
    save_env saved_entry
    set prev_saved_entry=
    save_env prev_saved_entry
    set boot_once=true
    fi

    function savedefault {
    if [ -z "${boot_once}" ]; then
    saved_entry="${chosen}"
    save_env saved_entry
    fi
    }
    function load_video {
    if [ x$feature_all_video_module = xy ]; then
    insmod all_video
    else
    insmod efi_gop
    insmod efi_uga
    insmod ieee1275_fb
    insmod vbe
    insmod vga
    insmod video_bochs
    insmod video_cirrus
    fi
    }

    if [ x$feature_default_font_path = xy ] ; then
    font=unicode
    else
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    font="/usr/share/grub/unicode.pf2"
    fi

    if loadfont $font ; then
    set gfxmode=auto
    load_video
    insmod gfxterm
    set locale_dir=$prefix/locale
    set lang=en_US
    insmod gettext
    fi
    terminal_output gfxterm
    if [ "${recordfail}" = 1 ] ; then
    set timeout=30
    else
    if [ x$feature_timeout_style = xy ] ; then
    set timeout_style=menu
    set timeout=5
    # Fallback normal timeout code in case the timeout_style feature is
    # unavailable.
    else
    set timeout=5
    fi
    fi
    ### END /etc/grub.d/00_header ###

    ### BEGIN /etc/grub.d/05_debian_theme ###
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990 insmod png
    if background_image /usr/share/desktop-base/emerald-theme/grub/grub-16x9.png; then
    set color_normal=white/black
    set color_highlight=black/white
    else
    set menu_color_normal=cyan/blue
    set menu_color_highlight=white/blue
    fi
    ### END /etc/grub.d/05_debian_theme ###

    ### BEGIN /etc/grub.d/10_linux ###
    function gfxmode {
    set gfxpayload="${1}"
    }
    set linux_gfx_mode=
    export linux_gfx_mode
    menuentry 'Debian GNU/Linux' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.83 ...'
    linux /boot/vmlinuz-6.6.83 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro quiet
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.83
    }
    submenu 'Advanced options for Debian GNU/Linux' $menuentry_id_option 'gnulinux-advanced-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    menuentry 'Debian GNU/Linux, with Linux 6.6.83' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.83-advanced-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.83 ...'
    linux /boot/vmlinuz-6.6.83 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro quiet
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.83
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.83 (recovery mode)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.83-recovery-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.83 ...'
    linux /boot/vmlinuz-6.6.83 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro single dis_ucode_ldr
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.83
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.82' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.82-advanced-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.82 ...'
    linux /boot/vmlinuz-6.6.82 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro quiet
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.82
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.82 (recovery mode)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.82-recovery-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.82 ...'
    linux /boot/vmlinuz-6.6.82 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro single dis_ucode_ldr
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.82
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.80' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.80-advanced-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.80 ...'
    linux /boot/vmlinuz-6.6.80 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro quiet
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.80
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.80 (recovery mode)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.80-recovery-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.80 ...'
    linux /boot/vmlinuz-6.6.80 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro single dis_ucode_ldr
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.80
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.79' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.79-advanced-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.79 ...'
    linux /boot/vmlinuz-6.6.79 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro quiet
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.79
    }
    menuentry 'Debian GNU/Linux, with Linux 6.6.79 (recovery mode)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.6.79-recovery-faddab1d-8b00-4ca7-b04c-e9e3bed67990' {
    load_video
    insmod gzio
    if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    echo 'Loading Linux 6.6.79 ...'
    linux /boot/vmlinuz-6.6.79 root=UUID=faddab1d-8b00-4ca7-b04c-e9e3bed67990 ro single dis_ucode_ldr
    echo 'Loading initial ramdisk ...'
    initrd /boot/initrd.img-6.6.79
    }
    }

    ### END /etc/grub.d/10_linux ###

    ### BEGIN /etc/grub.d/20_linux_xen ###

    ### END /etc/grub.d/20_linux_xen ###

    ### BEGIN /etc/grub.d/20_pcmemtest ###
    menuentry "Memory test (pcmemtest)" {
    insmod part_gpt
    insmod ext2
    search --no-floppy --fs-uuid --set=root faddab1d-8b00-4ca7-b04c-e9e3bed67990
    linuxefi /boot/pcmemtestx64.efi
    }
    ### END /etc/grub.d/20_pcmemtest ###

    ### BEGIN /etc/grub.d/25_bli ###
    if [ "$grub_platform" = "efi" ]; then
    insmod bli
    fi
    ### END /etc/grub.d/25_bli ###

    ### BEGIN /etc/grub.d/30_os-prober ###
    menuentry 'Windows Boot Manager (on /dev/nvme0n1p1)' --class windows --class os $menuentry_id_option 'osprober-efi-D01B-8814' {
    insmod part_gpt
    insmod fat
    search --no-floppy --fs-uuid --set=root D01B-8814
    chainloader /EFI/Microsoft/Boot/bootmgfw.efi
    }
    ### END /etc/grub.d/30_os-prober ###

    ### BEGIN /etc/grub.d/30_uefi-firmware ###
    if [ "$grub_platform" = "efi" ]; then
    fwsetup --is-supported
    if [ "$?" = 0 ]; then
    menuentry 'UEFI Firmware Settings' $menuentry_id_option 'uefi-firmware' {
    fwsetup
    }
    fi
    fi
    ### END /etc/grub.d/30_uefi-firmware ###

    ### BEGIN /etc/grub.d/35_fwupd ###
    ### END /etc/grub.d/35_fwupd ###

    ### BEGIN /etc/grub.d/40_custom ###
    # This file provides an easy way to add custom menu entries. Simply type the
    # menu entries you want to add after this comment. Be careful not to change
    # the 'exec tail' line above.
    ### END /etc/grub.d/40_custom ###

    ### BEGIN /etc/grub.d/41_custom ###
    if [ -f ${config_directory}/custom.cfg ]; then
    source ${config_directory}/custom.cfg
    elif [ -z "${config_directory}" -a -f $prefix/custom.cfg ]; then
    source $prefix/custom.cfg
    fi
    ### END /etc/grub.d/41_custom ###
    *********************** END /boot/grub/grub.cfg

    *********************** BEGIN /proc/mdstat
    cat: /proc/mdstat: No such file or directory
    *********************** END /proc/mdstat

    *********************** BEGIN /dev/disk/by-id
    total 0
    lrwxrwxrwx 1 root root 9 Mar 14 2025 ata-CT2000MX500SSD1_2327E6EA1165 -> ../../sda
    lrwxrwxrwx 1 root root 10 Mar 14 2025 ata-CT2000MX500SSD1_2327E6EA1165-part1 -> ../../sda1
    lrwxrwxrwx 1 root root 13 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4 -> ../../nvme0n1
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part1 -> ../../nvme0n1p1
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part10 -> ../../nvme0n1p10
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part11 -> ../../nvme0n1p11
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part2 -> ../../nvme0n1p2
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part3 -> ../../nvme0n1p3
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part4 -> ../../nvme0n1p4
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part5 -> ../../nvme0n1p5
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part6 -> ../../nvme0n1p6
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part7 -> ../../nvme0n1p7
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part8 -> ../../nvme0n1p8
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4-part9 -> ../../nvme0n1p9
    lrwxrwxrwx 1 root root 13 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1 -> ../../nvme0n1
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part1 -> ../../nvme0n1p1
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part10 -> ../../nvme0n1p10
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part11 -> ../../nvme0n1p11
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part2 -> ../../nvme0n1p2
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part3 -> ../../nvme0n1p3
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part4 -> ../../nvme0n1p4
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part5 -> ../../nvme0n1p5
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part6 -> ../../nvme0n1p6
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part7 -> ../../nvme0n1p7
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part8 -> ../../nvme0n1p8
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-LITEON_CL1-8D512_002012102GW4_1-part9 -> ../../nvme0n1p9
    lrwxrwxrwx 1 root root 13 Mar 14 2025 nvme-eui.00230356303b2496 -> ../../nvme0n1
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part1 -> ../../nvme0n1p1
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-eui.00230356303b2496-part10 -> ../../nvme0n1p10
    lrwxrwxrwx 1 root root 16 Mar 14 2025 nvme-eui.00230356303b2496-part11 -> ../../nvme0n1p11
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part2 -> ../../nvme0n1p2
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part3 -> ../../nvme0n1p3
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part4 -> ../../nvme0n1p4
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part5 -> ../../nvme0n1p5
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part6 -> ../../nvme0n1p6
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part7 -> ../../nvme0n1p7
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part8 -> ../../nvme0n1p8
    lrwxrwxrwx 1 root root 15 Mar 14 2025 nvme-eui.00230356303b2496-part9 -> ../../nvme0n1p9
    lrwxrwxrwx 1 root root 9 Mar 14 2025 wwn-0x500a0751e6ea1165 -> ../../sda lrwxrwxrwx 1 root root 10 Mar 14 2025 wwn-0x500a0751e6ea1165-part1 -> ../../sda1
    *********************** END /dev/disk/by-id

    *********************** BEGIN /dev/disk/by-uuid
    total 0
    lrwxrwxrwx 1 root root 15 Mar 14 2025 02cf13b2-0895-4dfd-9740-c006b753519a -> ../../nvme0n1p6
    lrwxrwxrwx 1 root root 16 Mar 14 2025 212A592158A408A4 -> ../../nvme0n1p11 lrwxrwxrwx 1 root root 15 Mar 14 2025 8e15b5d5-9b29-4e84-bb8a-eb233936f0b8 -> ../../nvme0n1p9
    lrwxrwxrwx 1 root root 15 Mar 14 2025 AABA1C2ABA1BF195 -> ../../nvme0n1p3 lrwxrwxrwx 1 root root 15 Mar 14 2025 BE7C26C07C267377 -> ../../nvme0n1p4 lrwxrwxrwx 1 root root 15 Mar 14 2025 D01B-8814 -> ../../nvme0n1p1
    lrwxrwxrwx 1 root root 10 Mar 14 2025 E8B0901AB08FECFE -> ../../sda1 lrwxrwxrwx 1 root root 15 Mar 14 2025 aafa37ff-33b1-4109-90cc-81b44d20c5bc -> ../../nvme0n1p8
    lrwxrwxrwx 1 root root 15 Mar 14 2025 baf142a8-42e8-4be9-8b6c-d605215d1ad3 -> ../../nvme0n1p7
    lrwxrwxrwx 1 root root 16 Mar 14 2025 e49a9cc6-8f60-4e2f-9cd4-259e940ccc9b -> ../../nvme0n1p10
    lrwxrwxrwx 1 root root 15 Mar 14 2025 faddab1d-8b00-4ca7-b04c-e9e3bed67990 -> ../../nvme0n1p5
    *********************** END /dev/disk/by-uuid

    -- System Information:
    Debian Release: trixie/sid
    APT prefers stable-updates
    APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
    Architecture: amd64 (x86_64)

    Kernel: Linux 6.6.83 (SMP w/16 CPU threads; PREEMPT)
    Kernel taint flags: TAINT_OOT_MODULE
    Locale: LANG=fr_FR.UTF8, LC_CTYPE=fr_FR.UTF8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/bash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    Versions of packages grub2-common depends on:
    ii dpkg 1.22.18
    ii grub-common 2.12-6
    ii libc6 2.41-4
    ii libdevmapper1.02.1 2:1.02.205-1
    ii libefiboot1t64 38-3.1+b1
    ii libefivar1t64 38-3.1+b1
    ii liblzma5 5.6.4-1

    grub2-common recommends no packages.

    grub2-common suggests no packages.

    -- no debconf information

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felix Zielcke@21:1/5 to All on Fri Mar 14 14:30:01 2025
    Am Freitag, dem 14.03.2025 um 10:00 +0100 schrieb eric:
    Package: grub2-common
    Version: 2.12-6
    Severity: normal

    Since this update, I have the following worrying messages:

    update-grub
    [...]
    Found pcmemtest 64bit EFI image: /boot/pcmemtestx64.efi

    Just a side note: pcmemtest is dead upstream and its code has been
    integrated into memtest86+ v6.

    Warning: os-prober will be executed to detect other bootable
    partitions.
    Its output will be used to detect bootable binaries on them and
    create new boot entries.
    /usr/lib/os-probes/50mounted-tests: line 72:  6937 Segmentation fault      (core dumped) grub-mount "$partition" "$tmpmnt" 2>
    /dev/null
    /usr/lib/os-probes/50mounted-tests: line 72:  6973 Segmentation fault      (core dumped) grub-mount "$partition" "$tmpmnt" 2>
    /dev/null
    /usr/lib/os-probes/50mounted-tests: line 72:  6996 Segmentation fault      (core dumped) grub-mount "$partition" "$tmpmnt" 2>
    /dev/null
    Found Windows Boot Manager on
    /dev/nvme0n1p1@/EFI/Microsoft/Boot/bootmgfw.efi
    Adding boot menu entry for UEFI Firmware Settings ...
    done


    Do you have systemd-coredump installed?
    Or differently asked: Do you know where it dumped the core on your fs?

    Otherwise do this:

    Please change the "set -e" at the top of /usr/lib/os-probes/50mounted-
    tests after/before to "set -ex", i.e. add x.
     
    And then run update-grub again.
    Then it should show the exact invocation of grub-mount which segfaults

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felix Zielcke@21:1/5 to All on Fri Mar 14 15:10:01 2025
    QW0gRnJlaXRhZywgZGVtIDE0LjAzLjIwMjUgdW0gMTQ6NDMgKzAxMDAgc2NocmllYiBFcmljIFZh bGV0dGU6Cj4gY29yZWR1bXBjdGwgaW5mbwo+IMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgUElEOiAx NjY2NyAoZ3J1Yi1tb3VudCkKPiDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgIFVJRDogMCAocm9vdCkK PiDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgIEdJRDogMCAocm9vdCkKPiDCoMKgwqDCoMKgwqDCoMKg IFNpZ25hbDogMTEgKFNFR1YpCj4gwqDCoMKgwqDCoCBUaW1lc3RhbXA6IEZyaSAyMDI1LTAzLTE0 IDE0OjM1OjEzIENFVCAoNm1pbiBhZ28pCj4gwqDCoCBDb21tYW5kIExpbmU6IGdydWItbW91bnQg L2Rldi9udm1lMG4xcDQgL3Zhci9saWIvb3MtcHJvYmVyL21vdW50CgpXaGF0IGZpbGVzeXN0ZW0g aXMgb24gL2Rldi9udm1lMG4xcDQ/IApJdCdzIG5vdCBpbiB5b3VyIC9wcm9jL21vdW50cyBmcm9t IHRoZSBpbml0aWFsIGJ1ZyByZXBvcnQuCgpbLi4uXQo+IMKgwqAgU2l6ZSBvbiBEaXNrOiA2NjVL Cj4gwqDCoMKgwqDCoMKgwqAgTWVzc2FnZTogUHJvY2VzcyAxNjY2NyAoZ3J1Yi1tb3VudCkgb2Yg dXNlciAwIGR1bXBlZCBjb3JlLgo+IAo+IMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg IE1vZHVsZSBsaWJ1ZGV2LnNvLjEgZnJvbSBkZWIgc3lzdGVtZC0yNTcuNC0zLmFtZDY0Cj4gwqDC oMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgU3RhY2sgdHJhY2Ugb2YgdGhyZWFkIDE2NjY3 Ogo+IMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgICMwwqAgMHgwMDAwNTU4MTdiYTAx ZTM0IG4vYSAoL3Vzci9iaW4vZ3J1Yi1tb3VudCArCj4gMHgyOWUzNCkKPiDCoMKgwqDCoMKgwqDC oMKgwqDCoMKgwqDCoMKgwqDCoCAjMcKgIDB4MDAwMDU1ODE3YmEwMjIzYiBuL2EgKC91c3IvYmlu L2dydWItbW91bnQgKwo+IDB4MmEyM2IpCj4gwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg wqAgIzLCoCAweDAwMDA1NTgxN2JhMDI2NTkgbi9hICgvdXNyL2Jpbi9ncnViLW1vdW50ICsKPiAw eDJhNjU5KQo+IMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgICMzwqAgMHgwMDAwNTU4 MTdiYTAzNjM1IG4vYSAoL3Vzci9iaW4vZ3J1Yi1tb3VudCArCj4gMHgyYjYzNSkKPiDCoMKgwqDC oMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoCAjNMKgIDB4MDAwMDU1ODE3YmE0OTRhMCBuL2EgKC91 c3IvYmluL2dydWItbW91bnQgKwo+IDB4NzE0YTApCj4gwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg wqDCoMKgwqAgIzXCoCAweDAwMDA1NTgxN2I5ZGVhNWYgbi9hICgvdXNyL2Jpbi9ncnViLW1vdW50 ICsKPiAweDZhNWYpCj4gwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqAgIzbCoCAweDAw MDA3ZjVmZGQ3ZTNjYTggX19saWJjX3N0YXJ0X2NhbGxfbWFpbiAKPiAobGliYy5zby42ICsgMHgy OWNhOCkKPiDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoCAjN8KgIDB4MDAwMDdmNWZk ZDdlM2Q2NSBfX2xpYmNfc3RhcnRfbWFpbl9pbXBsIAo+IChsaWJjLnNvLjYgKyAweDI5ZDY1KQo+ IMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgICM4wqAgMHgwMDAwNTU4MTdiOWRlY2Mx IG4vYSAoL3Vzci9iaW4vZ3J1Yi1tb3VudCArCj4gMHg2Y2MxKQo+IMKgwqDCoMKgwqDCoMKgwqDC oMKgwqDCoMKgwqDCoMKgIEVMRiBvYmplY3QgYmluYXJ5IGFyY2hpdGVjdHVyZTogQU1EIHg4Ni02 NAo+IGxpbmVzIDEtMzEvMzEgKEVORCkKPiAKClBsZWFzZSBlbmFibGUgdGhlIHVuc3RhYmxlLWRl YnVnIHJlcG8gYW5kIGluc3RhbGwgdGhlCmdydWItY29tbW9uLWRiZ3N5bSBwYWNrYWdlIGZyb20g aXQ6CgpJbiAvZXRjL2FwdC9zb3VyY2VzLmxpc3Q6CgogIGRlYiBodHRwOi8vZGViLmRlYmlhbi5v cmcvZGViaWFuLWRlYnVnLyB1bnN0YWJsZS1kZWJ1ZyBtYWluCgpUaGVuIHRoZSBiYWNrdHJhY2Ug aXMgaG9wZWZ1bGx5IHVzZWZ1bC4K

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felix Zielcke@21:1/5 to All on Fri Mar 14 15:40:02 2025
    Am Freitag, dem 14.03.2025 um 15:19 +0100 schrieb Eric Valette:

    /dev/nvme0n1p4  326475776 328153087   1677312   819M Windows recovery environment

    So it looks like it's one of the ntfs CVE fixes.
    But I'm just guessing.

    [...]


    Unfortunately not or I did not issue the right command.



    Please try:

    # export DEBUGINFOD_URLS="https://debuginfod.debian.net"
    # gdb /usr/bin/grub-mount
    (gdb) r /dev/nvme0n1p4 /var/lib/os-prober/mount

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pascal Hambourg@21:1/5 to Eric Valette on Fri Mar 14 16:30:02 2025
    On 14/03/2025 at 16:02, Eric Valette wrote:
    /usr/bin/grub-mount: error: cannot find `/var/lib/os-prober/mount': No
    such file or directory.

    This is temporary directory created and used by os-prober as a mount
    point. You can use any other existing directory instead.

    Does grub-mount segfault only with this partition ?
    AFAICS there are other NTFS partitions on your system.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felix Zielcke@21:1/5 to All on Sat Mar 15 09:00:01 2025
    Hi,

    on Debian we got a bug report with a segfault in grub-mount when we
    added the CVE fixes to it:

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100470

    It crashes on all 3 Windows NTFS Partitions with this:

    Program received signal SIGSEGV, Segmentation fault.
    Download failed: Invalid argument. Continuing without source file ./obj/grub-pc/../../grub-core/fs/ntfs.c.
    0x000055555557de34 in find_attr (at=at@entry=0x555555694ea0,
    attr=attr@entry=128 '\200') at ../../grub-core/fs/ntfs.c:390
    warning: 390 ../../grub-core/fs/ntfs.c: No such file or directory

    Line 390 is the same AFAICS on upstream grub.git and Debian packaging:

    while (at->attr_cur < mft_end && *at->attr_cur != 0xFF)

    I don't know what is special on their NTFS partitions. I can't
    reproduce this with my own dual-boot system.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Felix Zielcke@21:1/5 to All on Sat Mar 15 11:50:01 2025
    Am Samstag, dem 15.03.2025 um 08:54 +0100 schrieb Felix Zielcke:
    Hi,

    on Debian we got a bug report with a segfault in grub-mount when we
    added the CVE fixes to it:

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100470

    It crashes on all 3 Windows NTFS Partitions with this:

    Hi,

    it looks like we got another 2 people for which grub2 breaks now due to
    NTFS:

    https://bugs.debian.org/1100486

    Last line of set debug=all output is:

    kern/fs.c:79:fs: error: not a XFS filesystem.
    kern/fs.c:80:fs: xfs detection failed.
    kern/fs.c:56:fs: Detecting squash4...
    kern/fs.c:79:fs: error: not a squash4.
    kern/fs.c:80:fs: squash4 detection failed.
    kern/fs.c:56:fs: Detecting ntfs...
    disk/efi/efidisk.c:603:efidisk: reading 0x40 sectors at the sector
    0x3d0d9540
    from hd4

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marta Lewandowska@21:1/5 to eric.valette@gmail.com on Mon Mar 17 10:50:01 2025
    You're not the only ones who have bugs reported... we're got one and Arch
    as well. I sent this email to the list a week ago; I don't know where it
    got lost...

    ---
    Hi,

    This patch also fixes an issue introduced by the original patch involving
    dual booting: grub-mount seg faults when trying to mount an ntfs volume,
    e.g., when grub-mkconfig is run. There are bugs for this on fedora [1] and
    arch [2], so further review of this patch is really appreciated!

    thanks!
    marta

    [1] https://bugzilla.redhat.com/show_bug.cgi?id=2350327
    [2]
    https://gitlab.archlinux.org/archlinux/packaging/packages/grub/-/issues/11


    On Sat, Mar 15, 2025 at 3:14 PM Eric Valette <eric.valette@gmail.com> wrote:

    On 15/03/2025 08:54, Felix Zielcke wrote:
    Hi,

    on Debian we got a bug report with a segfault in grub-mount when we
    added the CVE fixes to it:

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100470

    It crashes on all 3 Windows NTFS Partitions with this:

    Program received signal SIGSEGV, Segmentation fault.
    Download failed: Invalid argument. Continuing without source file ./obj/grub-pc/../../grub-core/fs/ntfs.c.