Your message dated Thu, 09 Nov 2023 13:19:20 +0000
with message-id <e1r14wk-008kgw...@fasolo.debian.org>
and subject line Bug#1051543: fixed in grub2 2.12~rc1-12
has caused the Debian Bug report #1051543,
regarding grub2: Fails to load normal.mod from a XFS v5 parition.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051543: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051543
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: grub2
Version: 2.12~rc1-9
Severity: Serious
control: forwarded -1 https://savannah.gnu.org/bugs/?64376

I have a single XFS partition which contains the root filesystem and the
boot partition. Since the recent upgrade to the 2.12 series I can't boot
anymore because grub complains that it can't find normal.mod and remains in
the rescue shell.
The ls command kind of works. A ls in /boot/grub/i386-pc/ (where the
normal.mod should be) shows a few files and then abort with the error
message: 'error: invalid XFS directory entry'.

I figured out that if I remove that directory and create a new one only
with normal.mod then it was able to find it and complained about onother file.
I then repeated the game until I had more files… The invocation of grub-install
copied all files and broke it again.

I then looked at various places and stumbled uppon
https://savannah.gnu.org/bugs/?64376 and this indeed matches what I see.
I rebuilt the grub2 package with commit ef7850c757fb3 ("fs/xfs: Fix
issues found while fuzzing the XFS filesystem") reverted, installed from
a rescue system and voila it boots again.

My xfs filesystem is a normal v5 as in:
| # xfs_info /dev/sdb1
| meta-data=/dev/sdb1              isize=512    agcount=4, agsize=655360 blks
|          =                       sectsz=512   attr=2, projid32bit=1
|          =                       crc=1        finobt=1, sparse=1, rmapbt=1
|          =                       reflink=1    bigtime=0 inobtcount=0 nrext64=0
| data     =                       bsize=4096   blocks=2621440, imaxpct=25
|          =                       sunit=0      swidth=0 blks
| naming   =version 2              bsize=4096   ascii-ci=0, ftype=1
| log      =internal log           bsize=4096   blocks=3693, version=2
|          =                       sectsz=512   sunit=0 blks, lazy-count=1
| realtime =none                   extsz=4096   blocks=0, rtextents=0

Sebastian

--- End Message ---
--- Begin Message ---
Source: grub2
Source-Version: 2.12~rc1-12
Done: Julian Andres Klode <j...@debian.org>

We believe that the bug you reported is fixed in the latest version of
grub2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julian Andres Klode <j...@debian.org> (supplier of updated grub2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Nov 2023 14:13:44 +0200
Source: grub2
Architecture: source
Version: 2.12~rc1-12
Distribution: unstable
Urgency: medium
Maintainer: GRUB Maintainers <pkg-grub-de...@alioth-lists.debian.net>
Changed-By: Julian Andres Klode <j...@debian.org>
Closes: 1051543
Changes:
 grub2 (2.12~rc1-12) unstable; urgency=medium
 .
   [ Mate Kukri ]
   * Port UEFI based network stack to 2.12 (LP: #2039081)
   * efi: Correct image unloading behavior
   * Prevent the incorrect use of `UnloadImage()` by binaries loaded by peimage
   * efinet: HTTP_MESSAGE fix field size (LP: #2043084)
 .
   [ Abe Wieland ]
   * Maintain administrator value for os-prober
 .
   [ Julian Andres Klode ]
   * Cherry-pick upstream XFS directory extent parsing fixes (Closes: #1051543)
     (LP: #2039172)
Checksums-Sha1:
 312ce277a37bce57439e0e7a9664ef3bc8a2db4d 7151 grub2_2.12~rc1-12.dsc
 85dcb0a0091d0ccd216dd6466efdebc28f57f5fd 1099048 
grub2_2.12~rc1-12.debian.tar.xz
 2513c431b1607ba19bceab96f7e0426f85840163 13770 
grub2_2.12~rc1-12_source.buildinfo
Checksums-Sha256:
 e4a288912b89c0a61db359b2d05f2d3765f3872703f3c7e061239e590d96eb2e 7151 
grub2_2.12~rc1-12.dsc
 3816361feeb509d09f4c71a38ea5000bbc4e80812e898387d09aa7ccb4320406 1099048 
grub2_2.12~rc1-12.debian.tar.xz
 db6acce9db781bafd28a609f284a80ba563c5b9aa70679dc684970e2f9ab15e7 13770 
grub2_2.12~rc1-12_source.buildinfo
Files:
 a9e20ad1e89a0bbc210cbba24d785d66 7151 admin optional grub2_2.12~rc1-12.dsc
 2d83245714778f9698d052650242041d 1099048 admin optional 
grub2_2.12~rc1-12.debian.tar.xz
 21172dddc15d76767388b9cc7666d1bc 13770 admin optional 
grub2_2.12~rc1-12_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=uboh
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to