Package: grub-install Severity: normal X-Debbugs-Cc: pub...@gaess.ch Dear Maintainer,
When updating our headless server, we've got the following warning: grub-install: Warnung: Cannot set EFI variable Boot0000. grub-install: Warnung: efivarfs_set_variable: writing to fd 8 failed: Auf dem Gerät ist kein Speicherplatz mehr verfügbar. grub-install: Warnung: _efi_set_variable_mode: ops->set_variable() failed: Auf dem Gerät ist kein Speicherplatz mehr verfügbar. grub-install: Fehler: failed to register the EFI boot entry: Auf dem Gerät ist kein Speicherplatz mehr verfügbar. The german part means: out of memory (or disk space) The /sys/firmware/efi/efivars was full of "dump-*" files. The problem seems related to this one: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989384 But our system is not an old Thinkpad :-) And acpi-call-dkms isn't even installed. It is an Asrock Deskmini A300 AMD Ryzen system. It was running Buster until this week, when updated to debian 11 bullseye. Please ignore the system information below as I'm reporting this from my laptop (which actually is a thinkpad) and not the affected system. Our system couldn't reboot for more than a year (maybe even more) when issuing "sudo reboot now". Now, after "rm /sys/firmware/efi/efivars/dump-*", grub- install updates the efivars and our server reboots properly for the first time after years! I'm writing to you because I think the problem may be more widespread than known. I had no idea how to fix the reboot problem and I tried to find the cause several times. So I'd suggest to automatically look for such dump-* files when this error arises and delete them with the install-grub script. If you think this is too dangerous, you could add a comment to the warning, that users should check if the have any /sys/firmware/efi/efivars/dump-* files and delete them manually. I also would like to thank you for all the work you put into Debian, I appreciate it very much! Kind regards, Daniel -- System Information: Debian Release: bookworm/sid APT prefers testing-security APT policy: (500, 'testing-security'), (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-5-amd64 (SMP w/4 CPU threads; PREEMPT) Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8 (charmap=UTF-8), LANGUAGE=de_CH:de Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled