Bug#989229: Fw: Re: Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.

2024-07-17 Thread Tj
The reporter "retired" the PC but directly replied to me; copying in for 
completeness.
 
--- Forwarded Message ---
From: Joseph Maher 
Date: On Wednesday, 17 July 2024 at 07:22
Subject: Re: Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.
To: Tj 

> Thanks! You can close this bug - I have retired that laptop...
> 
> Joseph



Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.

2024-07-16 Thread Tj
Source: linux
Followup-For: Bug #989229
X-Debbugs-Cc: tj.iam...@proton.me
Control: tag -1 moreinfo

This is in all probability a system (manufacturer's) firmware bug. The
kernel is doing what it is designed to do; that is, try to recover from
the system's UEFI Runtime Services causing a Page Fault.

There are new firmware releases available for that model - upgrading may
fix the bug:

https://www.acer.com/gb-en/support/product-support/SP111-31N/

Latest listed is v1.11 2018-12-25. Bug report shows:

[Sun Jul 11 20:36:36 2021] Hardware name: Acer Spin SP111-31N/Ironhide_AP, 
BIOS V1.02 01/04/2017

There was a similar report back in 2019 via Ubuntu and Upstream and the
response upstream is informative:

"Note that this is *not* a kernel panic. The kernel does exactly what we 
intended,
 which is to contain the page fault caused by the buggy firmware, and proceed
 without EFI runtime services. Unfortunately, this means that the installer 
cannot
 update the boot path so that grub gets invoked at boot by default. The only 
way to
 achieve this is probably to use 'bcfg' from the UEFI shell.

 Since this is closed source firmware provided by the hardware vendor,
 there is really very little we can do about this except complaining to
 them that their firmware is buggy.
"

https://bugzilla.kernel.org/show_bug.cgi?id=204289#c7



Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.

2021-07-11 Thread Joseph Maher



On Sat, 10 Jul 2021, Colin Watson wrote:


Control: reassign -1 linux
Control: affects -1 grub2-common

On Sat, May 29, 2021 at 12:00:17PM -0400, Joseph Maher wrote:

grub seems unhappy on my laptop (testing=bullseye, acer spin 1), currently
grub-install doesn't work, and so the various grub packages aren't
installable / upgradable

Not sure what the severity should be, or which package I should file a bug
against, but I've appended some typical output below that may or may not be
useful:

Yours

Joseph


# grub-install --target=x86_64-efi
Installing for x86_64-efi platform.
grub-install: warning: Cannot read EFI Boot* variables.
grub-install: warning: efivarfs_get_variable: read failed: Interrupted system 
call.
grub-install: warning: efi_get_variable: ops->get_variable failed: Interrupted 
system call.
grub-install: error: failed to register the EFI boot entry: Interrupted system 
call.


# grub-install --target=x86_64-efi --debug

This output is very verbose, but I've left a copy here:

https://www.maher.org.uk/~joseph/20210529-grub-install.log



# efibootmgr Skipping unreadable variable "Boot": Interrupted system
call
Skipping unreadable variable "Boot0001": Interrupted system call
Skipping unreadable variable "Boot0002": Interrupted system call
Skipping unreadable variable "Boot0003": Interrupted system call
Skipping unreadable variable "Boot0005": Interrupted system call
Skipping unreadable variable "Boot0008": Interrupted system call
Skipping unreadable variable "Boot000B": Interrupted system call
Skipping unreadable variable "Boot000E": Interrupted system call
Skipping unreadable variable "Boot0011": Interrupted system call
Skipping unreadable variable "Boot0014": Interrupted system call
Skipping unreadable variable "Boot0017": Interrupted system call
Skipping unreadable variable "Boot2001": Interrupted system call
Skipping unreadable variable "Boot2002": Interrupted system call
Skipping unreadable variable "Boot2003": Interrupted system call
show_order(): Interrupted system call


The fact that both grub-install and efibootmgr are getting EINTR here
(albeit with different subsequent effects) suggests to me that the
problem is at a lower level.  This looks like it's probably a kernel
bug, or maybe (though less likely IMO) a bug in the efivar userspace
library.  Reassigning to the kernel for now.

I suspect "strace -f -s 1024 grub-install --target=x86_64-efi" and
"strace -f -s 1024 efibootmgr" might be helpful, along with checking
dmesg to see if the kernel is logging any errors there.

--
Colin Watson (he/him)  [cjwat...@debian.org]



Thanks for the advice to check dmesg - the kernel seems to think 
there is a firmware bug, which somehow I didn't notice earlier:


[Sun Jul 11 20:36:36 2021] [Firmware Bug]: Page fault caused by firmware 
at PA: 0x66cd61d0
[Sun Jul 11 20:36:36 2021] WARNING: CPU: 0 PID: 66728 at 
arch/x86/platform/efi/quirks.c:712 efi_recover_from_page_fault+0x2a/0

xc0
[Sun Jul 11 20:36:36 2021] Modules linked in: tun ufs qnx4 hfsplus hfs 
cdrom minix msdos jfs xfs rfcomm ctr ccm cmac algif_has
h algif_skcipher af_alg bnep binfmt_misc nls_ascii nls_cp437 vfat fat ext4 
btusb ath10k_pci mbcache btrtl btbcm btintel jbd2 s
nd_hda_codec_hdmi ath10k_core snd_sof_pci snd_sof_intel_byt 
snd_sof_intel_ipc snd_sof_intel_hda_common snd_sof_xtensa_dsp snd_
sof bluetooth snd_sof_intel_hda snd_soc_skl snd_hda_codec_realtek 
snd_soc_hdac_hda ath snd_hda_ext_core snd_soc_sst_ipc mac802
11 snd_hda_codec_generic snd_soc_sst_dsp ledtrig_audio intel_rapl_msr 
snd_soc_acpi_intel_match snd_soc_acpi jitterentropy_rng
snd_hda_intel x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel 
snd_intel_dspcfg kvm soundwire_intel soundwire_generic_
allocation snd_soc_core joydev snd_compress soundwire_cadence uvcvideo 
videobuf2_vmalloc irqbypass rapl videobuf2_memops wdat_
wdt intel_cstate videobuf2_v4l2 videobuf2_common watchdog drbg rtsx_usb_ms 
serio_raw pcspkr cfg80211 ansi_cprng videodev
[Sun Jul 11 20:36:36 2021]  hid_sensor_accel_3d hid_sensor_trigger 
efi_pstore memstick snd_hda_codec hid_sensor_iio_common ind
ustrialio_triggered_buffer ecdh_generic kfifo_buf ecc acer_wmi at24 crc16 
industrialio wmi_bmof mc hid_multitouch rfkill snd_h
da_core snd_hwdep soundwire_bus intel_xhci_usb_role_switch tpm_crb libarc4 
roles tpm_tis tpm_tis_core snd_pcm snd_timer intel_
vbtn soc_button_array sparse_keymap ac evdev snd tpm mei_me soundcore 
rng_core mei int3403_thermal processor_thermal_device in
tel_rapl_common int3400_thermal int340x_thermal_zone acpi_thermal_rel 
intel_soc_dts_iosf intel_pmc_core msr parport_pc ppdev l
p parport fuse configfs efivarfs ip_tables x_tables autofs4 btrfs 
blake2b_generic xor raid6_pq libcrc32c crc32c_generic rtsx_usb_sdmmc 
rtsx_usb usbhid dm_crypt dm_mod hid_sensor_custom hid_sensor_hub i915 
hid_generic mmc_block crct10dif_pclmul crct10dif_common crc32_pclmul 
crc32c_intel ghash_clmulni_intel i2c_algo_bit drm_kms_helper cec drm ahci 
xhci_p

Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.

2021-07-10 Thread Colin Watson
Control: reassign -1 linux
Control: affects -1 grub2-common

On Sat, May 29, 2021 at 12:00:17PM -0400, Joseph Maher wrote:
> grub seems unhappy on my laptop (testing=bullseye, acer spin 1), currently
> grub-install doesn't work, and so the various grub packages aren't
> installable / upgradable
> 
> Not sure what the severity should be, or which package I should file a bug
> against, but I've appended some typical output below that may or may not be
> useful:
> 
> Yours
> 
> Joseph
> 
> 
> # grub-install --target=x86_64-efi
> Installing for x86_64-efi platform.
> grub-install: warning: Cannot read EFI Boot* variables.
> grub-install: warning: efivarfs_get_variable: read failed: Interrupted system 
> call.
> grub-install: warning: efi_get_variable: ops->get_variable failed: 
> Interrupted system call.
> grub-install: error: failed to register the EFI boot entry: Interrupted 
> system call.
> 
> 
> # grub-install --target=x86_64-efi --debug
> 
> This output is very verbose, but I've left a copy here:
> 
> https://www.maher.org.uk/~joseph/20210529-grub-install.log
> 
> 
> 
> # efibootmgr Skipping unreadable variable "Boot": Interrupted system
> call
> Skipping unreadable variable "Boot0001": Interrupted system call
> Skipping unreadable variable "Boot0002": Interrupted system call
> Skipping unreadable variable "Boot0003": Interrupted system call
> Skipping unreadable variable "Boot0005": Interrupted system call
> Skipping unreadable variable "Boot0008": Interrupted system call
> Skipping unreadable variable "Boot000B": Interrupted system call
> Skipping unreadable variable "Boot000E": Interrupted system call
> Skipping unreadable variable "Boot0011": Interrupted system call
> Skipping unreadable variable "Boot0014": Interrupted system call
> Skipping unreadable variable "Boot0017": Interrupted system call
> Skipping unreadable variable "Boot2001": Interrupted system call
> Skipping unreadable variable "Boot2002": Interrupted system call
> Skipping unreadable variable "Boot2003": Interrupted system call
> show_order(): Interrupted system call

The fact that both grub-install and efibootmgr are getting EINTR here
(albeit with different subsequent effects) suggests to me that the
problem is at a lower level.  This looks like it's probably a kernel
bug, or maybe (though less likely IMO) a bug in the efivar userspace
library.  Reassigning to the kernel for now.

I suspect "strace -f -s 1024 grub-install --target=x86_64-efi" and
"strace -f -s 1024 efibootmgr" might be helpful, along with checking
dmesg to see if the kernel is logging any errors there.

-- 
Colin Watson (he/him)  [cjwat...@debian.org]



Bug#989229: grub-install: warning: Cannot read EFI Boot* variables.

2021-05-29 Thread Joseph Maher



Package: grub2-common
Version: 2.04-17
Severity: grave
Justification: renders package unusable


grub seems unhappy on my laptop (testing=bullseye, acer spin 1), currently 
grub-install doesn't work, and so the various grub packages aren't 
installable / upgradable


Not sure what the severity should be, or which package I should file a bug 
against, but I've appended some typical output below that may or may not 
be useful:


Yours

Joseph


# grub-install --target=x86_64-efi
Installing for x86_64-efi platform.
grub-install: warning: Cannot read EFI Boot* variables.
grub-install: warning: efivarfs_get_variable: read failed: Interrupted system 
call.
grub-install: warning: efi_get_variable: ops->get_variable failed: Interrupted 
system call.
grub-install: error: failed to register the EFI boot entry: Interrupted system 
call.


# grub-install --target=x86_64-efi --debug

This output is very verbose, but I've left a copy here:

https://www.maher.org.uk/~joseph/20210529-grub-install.log



# efibootmgr 
Skipping unreadable variable "Boot": Interrupted system call

Skipping unreadable variable "Boot0001": Interrupted system call
Skipping unreadable variable "Boot0002": Interrupted system call
Skipping unreadable variable "Boot0003": Interrupted system call
Skipping unreadable variable "Boot0005": Interrupted system call
Skipping unreadable variable "Boot0008": Interrupted system call
Skipping unreadable variable "Boot000B": Interrupted system call
Skipping unreadable variable "Boot000E": Interrupted system call
Skipping unreadable variable "Boot0011": Interrupted system call
Skipping unreadable variable "Boot0014": Interrupted system call
Skipping unreadable variable "Boot0017": Interrupted system call
Skipping unreadable variable "Boot2001": Interrupted system call
Skipping unreadable variable "Boot2002": Interrupted system call
Skipping unreadable variable "Boot2003": Interrupted system call
show_order(): Interrupted system call


# efivar -l
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0003
8be4df61-93ca-11d2-aa0d-00e098032b8c-dbxDefault
8be4df61-93ca-11d2-aa0d-00e098032b8c-dbDefault
8be4df61-93ca-11d2-aa0d-00e098032b8c-KEKDefault
8be4df61-93ca-11d2-aa0d-00e098032b8c-PKDefault
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0017
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0014
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0011
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot000E
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot000B
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0008
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0005
89cb0e8d-393c-4830-bfff-65d9147e8c3b-AUPS
89cb0e8d-393c-4830-bfff-65d9147e8c3b-ACUB
8be4df61-93ca-11d2-aa0d-00e098032b8c-OsIndications
a9b5f8d2-cb6d-42c2-bc01-b5ffaae4335e-PBRDevicePath
d719b2cb-3d3a-4596-a3bc-dad00e67656f-db
8be4df61-93ca-11d2-aa0d-00e098032b8c-KEK
8be4df61-93ca-11d2-aa0d-00e098032b8c-PK
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0002
eaec226f-c9a3-477a-a826-ddc716cdc0e3-OfflineUniqueIDEKPubCRC
eaec226f-c9a3-477a-a826-ddc716cdc0e3-OfflineUniqueIDEKPub
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot0001
89cb0e8d-393c-4830-bfff-65d9147e8c3b-WBSN
89cb0e8d-393c-4830-bfff-65d9147e8c3b-WBMN
59d1c24f-50f1-401a-b101-f33e0daed443-TargetHddDevPath
a04a27f4-df00-4d42-b552-39511302113d-BootType
8be4df61-93ca-11d2-aa0d-00e098032b8c-BootOrder
bf661981-1bce-42fc-abc4-716d8531aac5-WIFICTL
89cb0e8d-393c-4830-bfff-65d9147e8c3b-ASSN
0d9a1427-e02a-437d-926b-aa521fd722ba-PciLanInfo
04b37fe8-f6ae-480b-bdd5-37d98c5e89aa-VarErrorFlag
89cb0e8d-393c-4830-bfff-65d9147e8c3b-AEBT
0a4cd120-ea2d-4aef-a4b0-b0c08cbbdbbe-BootDevice
59d1c24f-50f1-401a-b101-f33e0daed443-PhysicalBootOrder
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot2003
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot2002
8be4df61-93ca-11d2-aa0d-00e098032b8c-Boot2001
59d1c24f-50f1-401a-b101-f33e0daed443-EMMC_DTR
89cb0e8d-393c-4830-bfff-65d9147e8c3b-SMAC
89cb0e8d-393c-4830-bfff-65d9147e8c3b-SMAB
89cb0e8d-393c-4830-bfff-65d9147e8c3b-SMAA
8be4df61-93ca-11d2-aa0d-00e098032b8c-ConOut
8be4df61-93ca-11d2-aa0d-00e098032b8c-ConIn
8be4df61-93ca-11d2-aa0d-00e098032b8c-Timeout
89cb0e8d-393c-4830-bfff-65d9147e8c3b-A01LastSataPortPresent
89cb0e8d-393c-4830-bfff-65d9147e8c3b-ABRV
a04a27f4-df00-4d42-b552-39511302113d-Custom
59d1c24f-50f1-401a-b101-f33e0daed443-CustomPlatformLang
89cb0e8d-393c-4830-bfff-65d9147e8c3b-ACFB
59d1c24f-50f1-401a-b101-f33e0daed443-AdministerSecureBoot
89cb0e8d-393c-4830-bfff-65d9147e8c3b-ASTM
aeb9c5c1-94f1-4d02-bfd9-4602db2d3c54-Tcg2PhysicalPresence
aeb9c5c1-94f1-4d02-bfd9-4602db2d3c54-Tcg2PhysicalPresenceFlags
e20939be-32d4-41be-a150-897f85d49829-MemoryOverwriteRequestControl
89cb0e8d-393c-4830-bfff-65d9147e8c3b-AFBD
89cb0e8d-393c-4830-bfff-65d9147e8c3b-AACV
382af2bb--abcd-aaee-cce099338877-SecureFlashInfo
8be4df61-93ca-11d2-aa0d-00e098032b8c-PlatformLang
8be4df61-93ca-11d2-aa0d-00e098032b8c-Lang
fd21bf2b-f5d1-46c5-aee3-c60158339239-MsdmAddress
eb704011-1402-11d3-8e77-00a0c969723b-MTC
89cb0e8d-393c-4830-bfff-65d9147e8c3b-AT2