Package: grub-common; Maintainer for grub-common is GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>; Source for grub-common is src:grub2 (PTS, buildd, popcon).
Reported by: "khimaros" <me@khimaros.com>
Date: Sat, 29 Jan 2022 18:45:02 UTC
Severity: minor
Tags: patch, upstream
Found in versions grub2/2.04-20, grub2/2.04-8, grub2/2.06-7
Reply or subscribe to this bug.
View this report as an mbox folder, status mbox, maintainer mbox
Report forwarded
to debian-bugs-dist@lists.debian.org, GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>:
Bug#1004514; Package grub-common.
(Sat, 29 Jan 2022 18:45:04 GMT) (full text, mbox, link).
Acknowledgement sent
to "khimaros" <me@khimaros.com>:
New Bug report received and forwarded. Copy sent to GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>.
(Sat, 29 Jan 2022 18:45:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: grub-common
Version: 2.04-20
Severity: important
Tags: upstream
the core issue is that grub-probe is not reporting cryptodisk abstraction when the block device below the lvm is luks encrypted.
/usr/share/grub/grub-mkconfig_lib relies on this output to decide whether to create the background cache on the /boot partition. because cryptodisk is not returned as an abstraction, the cache is never created and cannot be displayed at boot time.
this is the output of grub-probe:
# grub-probe -t abstraction /usr/share/images/desktop-base/desktop-grub.png
lvm
however, the file is definitely on an encrypted lvm volume:
# stat --printf="%m\n" /usr/share/images/desktop-base/desktop-grub.png
/
# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
nvme0n1 259:0 0 476.9G 0 disk
...
└─nvme0n1p3 259:3 0 476.7G 0 part
└─nvme0n1p3_crypt 253:0 0 476.7G 0 crypt
└─fnord--vg-root 253:1 0 476.7G 0 lvm /
# mount -vf /
mount: /dev/mapper/fnord--vg-root mounted on /.
# pvdisplay
PV Name /dev/mapper/nvme0n1p3_crypt
VG Name fnord-vg
...
# cryptsetup status nvme0n1p3_crypt
/dev/mapper/nvme0n1p3_crypt is active and in use.
type: LUKS2
device: /dev/nvme0n1p3
...
Information forwarded
to debian-bugs-dist@lists.debian.org, GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>:
Bug#1004514; Package grub-common.
(Mon, 11 Jul 2022 05:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Alexander Zhang <alex@alexyzhang.dev>:
Extra info received and forwarded to list. Copy sent to GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>.
Your message did not contain a Subject field. They are recommended and useful because the title of a Bug is determined using this field. Please remember to include a Subject field in your messages in future.
Message #10 received at 1004514@bugs.debian.org (full text, mbox, reply):
This also happens without LVM. My root filesystem is Btrfs on LUKS2 and grub-probe -t abstraction /usr/share/desktop-base/homeworld-theme/grub/grub-4x3.png outputs nothing.
Information forwarded
to debian-bugs-dist@lists.debian.org, GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>:
Bug#1004514; Package grub-common.
(Wed, 21 Sep 2022 11:09:06 GMT) (full text, mbox, link).
Acknowledgement sent
to 945404@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>.
(Wed, 21 Sep 2022 11:09:06 GMT) (full text, mbox, link).
Message #15 received at 1004514@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
reassign 945404 grub-common # package usefulness is not really affected severity 945404 minor severity 1004514 minor merge 945404 964859 1004514 thanks Hi, as I stumbled over this problem just now I thought I would at least help a bit by merging the reports about the issue (fingers crossed I got the control@ right, its a while), which I consider minor as it doesn't affect the usefulness of grub – it still boots without issue – it is just not as visually fitting as it could be. From my PoV I agree with the analyse and patch by Steve McIntyre in https://bugs.debian.org/945404#35 and have locally applied it at least until grub upstream understands luks2 and can detect this on its own. I suppose patching #803995 (Caching background image conceals original filename when updating) would make sense if we (always) cache. There is also #692244 which asks for having caching configurable. Best regards David Kalnischkies
[signature.asc (application/pgp-signature, inline)]
Severity set to 'minor' from 'important'
Request was from David Kalnischkies <david@kalnischkies.de>
to control@bugs.debian.org.
(Wed, 21 Sep 2022 11:09:11 GMT) (full text, mbox, link).
Marked as found in versions grub2/2.04-8.
Request was from David Kalnischkies <david@kalnischkies.de>
to control@bugs.debian.org.
(Wed, 21 Sep 2022 11:09:12 GMT) (full text, mbox, link).
Added tag(s) patch.
Request was from David Kalnischkies <david@kalnischkies.de>
to control@bugs.debian.org.
(Wed, 21 Sep 2022 11:09:13 GMT) (full text, mbox, link).
Merged 945404 964859 1004514
Request was from David Kalnischkies <david@kalnischkies.de>
to control@bugs.debian.org.
(Wed, 21 Sep 2022 11:09:16 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, debian@jesuislibre.net, GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>:
Bug#1004514; Package grub-common.
(Sun, 08 Jan 2023 22:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Tuxicoman <debian@jesuislibre.net>:
Extra info received and forwarded to list. Copy sent to debian@jesuislibre.net, GRUB Maintainers <pkg-grub-devel@alioth-lists.debian.net>.
(Sun, 08 Jan 2023 22:03:03 GMT) (full text, mbox, link).
Message #28 received at 1004514@bugs.debian.org (full text, mbox, reply):
Package: grub2-common
Version: 2.06-7
Followup-For: Bug #1004514
Dear Maintainer,
I just made a fresh Debian install using testing installer and confirm the bug
is still here : no background in GRUB after install.
My setup is LUKS2/LVM2/BTRFS.
The problem is the background picture file is not copied in /boot whereas it
obviously can't access it due to encryption of /.
$ grub-probe -t abstraction /usr/share/images/desktop-base/desktop-grub.png
lvm
I used the partitioning assistant in the Debian installer to encrypt my
filesystem. The only thing I changed from the proposed setup is EXT4 -> BTRFS.
I think this is an important issue to not let users consider Debian is easy to
use.
Encryption is supposed to be widely used for laptops as they are likely to be
stolen/lost.
And starting you nice looking laptop with GRUB without background is not very
selling the Debian OS.
-- Package-specific info:
*********************** BEGIN /proc/mounts
/dev/mapper/mib--vg-root / btrfs rw,relatime,ssd,space_cache=v2,subvolid=256,subvol=/@rootfs 0 0
/dev/sdc2 /boot ext2 rw,relatime 0 0
/dev/sdc1 /boot/efi vfat rw,relatime,fmask=0077,dmask=0077,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro 0 0
*********************** END /proc/mounts
*********************** BEGIN /boot/grub/grub.cfg
#
# DO NOT EDIT THIS FILE
#
# It is automatically generated by grub-mkconfig using templates
# from /etc/grub.d and settings from /etc/default/grub
#
### BEGIN /etc/grub.d/00_header ###
if [ -s $prefix/grubenv ]; then
set have_grubenv=true
load_env
fi
if [ "${next_entry}" ] ; then
set default="${next_entry}"
set next_entry=
save_env next_entry
set boot_once=true
else
set default="0"
fi
if [ x"${feature_menuentry_id}" = xy ]; then
menuentry_id_option="--id"
else
menuentry_id_option=""
fi
export menuentry_id_option
if [ "${prev_saved_entry}" ]; then
set saved_entry="${prev_saved_entry}"
save_env saved_entry
set prev_saved_entry=
save_env prev_saved_entry
set boot_once=true
fi
function savedefault {
if [ -z "${boot_once}" ]; then
saved_entry="${chosen}"
save_env saved_entry
fi
}
function load_video {
if [ x$feature_all_video_module = xy ]; then
insmod all_video
else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
fi
}
if [ x$feature_default_font_path = xy ] ; then
font=unicode
else
insmod lvm
insmod btrfs
set root='lvmid/7AKu5o-EyeN-N8St-I649-OQcl-Bri3-W8OFoK/RMwWFW-eDh3-qpQV-2eeH-6fq7-F5Ne-eTOidI'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint='lvmid/7AKu5o-EyeN-N8St-I649-OQcl-Bri3-W8OFoK/RMwWFW-eDh3-qpQV-2eeH-6fq7-F5Ne-eTOidI' 4b9d4135-8a81-4a81-b961-3b8954c9305f
else
search --no-floppy --fs-uuid --set=root 4b9d4135-8a81-4a81-b961-3b8954c9305f
fi
font="/@rootfs/usr/share/grub/unicode.pf2"
fi
if loadfont $font ; then
set gfxmode=auto
load_video
insmod gfxterm
set locale_dir=$prefix/locale
set lang=fr_BE
insmod gettext
fi
terminal_output gfxterm
if [ "${recordfail}" = 1 ] ; then
set timeout=30
else
if [ x$feature_timeout_style = xy ] ; then
set timeout_style=menu
set timeout=5
# Fallback normal timeout code in case the timeout_style feature is
# unavailable.
else
set timeout=5
fi
fi
### END /etc/grub.d/00_header ###
### BEGIN /etc/grub.d/05_debian_theme ###
insmod part_gpt
insmod ext2
set root='hd2,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd2,gpt2 --hint-efi=hd2,gpt2 --hint-baremetal=ahci2,gpt2 ced76384-4e5b-411c-a30c-c7f1f5344fb9
else
search --no-floppy --fs-uuid --set=root ced76384-4e5b-411c-a30c-c7f1f5344fb9
fi
insmod png
if background_image /grub/.background_cache.png; then
set color_normal=white/black
set color_highlight=black/white
else
set menu_color_normal=cyan/blue
set menu_color_highlight=white/blue
fi
### END /etc/grub.d/05_debian_theme ###
### BEGIN /etc/grub.d/10_linux ###
function gfxmode {
set gfxpayload="${1}"
}
set linux_gfx_mode=
export linux_gfx_mode
menuentry 'Debian GNU/Linux' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-simple-4b9d4135-8a81-4a81-b961-3b8954c9305f' {
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd2,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd2,gpt2 --hint-efi=hd2,gpt2 --hint-baremetal=ahci2,gpt2 ced76384-4e5b-411c-a30c-c7f1f5344fb9
else
search --no-floppy --fs-uuid --set=root ced76384-4e5b-411c-a30c-c7f1f5344fb9
fi
echo 'Loading Linux 6.0.0-6-amd64 ...'
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/mib--vg-root ro rootflags=subvol=@rootfs quiet splash
echo 'Loading initial ramdisk ...'
initrd /initrd.img-6.0.0-6-amd64
}
submenu 'Advanced options for Debian GNU/Linux' $menuentry_id_option 'gnulinux-advanced-4b9d4135-8a81-4a81-b961-3b8954c9305f' {
menuentry 'Debian GNU/Linux, with Linux 6.0.0-6-amd64' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.0.0-6-amd64-advanced-4b9d4135-8a81-4a81-b961-3b8954c9305f' {
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd2,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd2,gpt2 --hint-efi=hd2,gpt2 --hint-baremetal=ahci2,gpt2 ced76384-4e5b-411c-a30c-c7f1f5344fb9
else
search --no-floppy --fs-uuid --set=root ced76384-4e5b-411c-a30c-c7f1f5344fb9
fi
echo 'Loading Linux 6.0.0-6-amd64 ...'
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/mib--vg-root ro rootflags=subvol=@rootfs quiet splash
echo 'Loading initial ramdisk ...'
initrd /initrd.img-6.0.0-6-amd64
}
menuentry 'Debian GNU/Linux, with Linux 6.0.0-6-amd64 (recovery mode)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'gnulinux-6.0.0-6-amd64-recovery-4b9d4135-8a81-4a81-b961-3b8954c9305f' {
load_video
insmod gzio
if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
insmod part_gpt
insmod ext2
set root='hd2,gpt2'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd2,gpt2 --hint-efi=hd2,gpt2 --hint-baremetal=ahci2,gpt2 ced76384-4e5b-411c-a30c-c7f1f5344fb9
else
search --no-floppy --fs-uuid --set=root ced76384-4e5b-411c-a30c-c7f1f5344fb9
fi
echo 'Loading Linux 6.0.0-6-amd64 ...'
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/mib--vg-root ro single rootflags=subvol=@rootfs
echo 'Loading initial ramdisk ...'
initrd /initrd.img-6.0.0-6-amd64
}
}
### END /etc/grub.d/10_linux ###
### BEGIN /etc/grub.d/20_linux_xen ###
### END /etc/grub.d/20_linux_xen ###
### BEGIN /etc/grub.d/30_os-prober ###
menuentry 'Windows Boot Manager (on /dev/nvme0n1p1)' --class windows --class os $menuentry_id_option 'osprober-efi-D2B0-F8D4' {
insmod part_gpt
insmod fat
search --no-floppy --fs-uuid --set=root D2B0-F8D4
chainloader /efi/Microsoft/Boot/bootmgfw.efi
}
menuentry 'Debian GNU/Linux bookworm/sid (on /dev/mapper/station2--vg-root)' --class debian --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-simple-0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/station2--vg-root ro quiet splash
initrd /initrd.img-6.0.0-6-amd64
}
submenu 'Advanced options for Debian GNU/Linux bookworm/sid (on /dev/mapper/station2--vg-root)' $menuentry_id_option 'osprober-gnulinux-advanced-0eb034aa-55d6-4886-8d00-5bfec800b042' {
menuentry 'Debian GNU/Linux (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/vmlinuz-6.0.0-6-amd64--0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/station2--vg-root ro quiet splash
initrd /initrd.img-6.0.0-6-amd64
}
menuentry 'Debian GNU/Linux, with Linux 6.0.0-6-amd64 (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/vmlinuz-6.0.0-6-amd64--0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/station2--vg-root ro quiet splash
initrd /initrd.img-6.0.0-6-amd64
}
menuentry 'Debian GNU/Linux, with Linux 6.0.0-6-amd64 (recovery mode) (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/vmlinuz-6.0.0-6-amd64-root=/dev/mapper/station2--vg-root ro single-0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-6-amd64 root=/dev/mapper/station2--vg-root ro single
initrd /initrd.img-6.0.0-6-amd64
}
menuentry 'Debian GNU/Linux, with Linux 6.0.0-5-amd64 (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/vmlinuz-6.0.0-5-amd64--0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-5-amd64 root=/dev/mapper/station2--vg-root ro quiet splash
initrd /initrd.img-6.0.0-5-amd64
}
menuentry 'Debian GNU/Linux, with Linux 6.0.0-5-amd64 (recovery mode) (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/vmlinuz-6.0.0-5-amd64-root=/dev/mapper/station2--vg-root ro single-0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /vmlinuz-6.0.0-5-amd64 root=/dev/mapper/station2--vg-root ro single
initrd /initrd.img-6.0.0-5-amd64
}
menuentry 'Memory test (memtest86+x64.bin) (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/memtest86+x64.bin--0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /memtest86+x64.bin
}
menuentry 'Memory test (memtest86+x64.bin, serial console) (on /dev/mapper/station2--vg-root)' --class gnu-linux --class gnu --class os $menuentry_id_option 'osprober-gnulinux-/memtest86+x64.bin--0eb034aa-55d6-4886-8d00-5bfec800b042' {
insmod part_msdos
insmod ext2
set root='hd1,msdos1'
if [ x$feature_platform_search_hint = xy ]; then
search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 57323f9b-76fd-45b4-8bbf-2a428f207c6e
else
search --no-floppy --fs-uuid --set=root 57323f9b-76fd-45b4-8bbf-2a428f207c6e
fi
linux /memtest86+x64.bin console=ttyS0,115200
}
}
### END /etc/grub.d/30_os-prober ###
### BEGIN /etc/grub.d/30_uefi-firmware ###
menuentry 'UEFI Firmware Settings' $menuentry_id_option 'uefi-firmware' {
fwsetup
}
### END /etc/grub.d/30_uefi-firmware ###
### BEGIN /etc/grub.d/35_fwupd ###
### END /etc/grub.d/35_fwupd ###
### BEGIN /etc/grub.d/40_custom ###
# This file provides an easy way to add custom menu entries. Simply type the
# menu entries you want to add after this comment. Be careful not to change
# the 'exec tail' line above.
### END /etc/grub.d/40_custom ###
### BEGIN /etc/grub.d/41_custom ###
if [ -f ${config_directory}/custom.cfg ]; then
source ${config_directory}/custom.cfg
elif [ -z "${config_directory}" -a -f $prefix/custom.cfg ]; then
source $prefix/custom.cfg
fi
### END /etc/grub.d/41_custom ###
*********************** END /boot/grub/grub.cfg
*********************** BEGIN /proc/mdstat
cat: /proc/mdstat: No such file or directory
*********************** END /proc/mdstat
*********************** BEGIN /dev/disk/by-id
total 0
lrwxrwxrwx 1 root root 9 Jan 8 22:47 ata-Samsung_SSD_840_PRO_Series_S1ATNSAD788213Y -> ../../sdb
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_840_PRO_Series_S1ATNSAD788213Y-part1 -> ../../sdb1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_840_PRO_Series_S1ATNSAD788213Y-part2 -> ../../sdb2
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_840_PRO_Series_S1ATNSAD788213Y-part5 -> ../../sdb5
lrwxrwxrwx 1 root root 9 Jan 8 22:47 ata-Samsung_SSD_850_EVO_250GB_S21PNXAG638479Z -> ../../sda
lrwxrwxrwx 1 root root 9 Jan 8 22:47 ata-Samsung_SSD_860_EVO_1TB_S4X6NF0MB04023F -> ../../sdc
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_860_EVO_1TB_S4X6NF0MB04023F-part1 -> ../../sdc1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_860_EVO_1TB_S4X6NF0MB04023F-part2 -> ../../sdc2
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ata-Samsung_SSD_860_EVO_1TB_S4X6NF0MB04023F-part3 -> ../../sdc3
lrwxrwxrwx 1 root root 10 Jan 8 22:47 dm-name-mib--vg-root -> ../../dm-1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 dm-name-sdb3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Jan 8 22:47 dm-uuid-CRYPT-LUKS2-5e0aa37dcdd84b43a623e47cfa89be10-sdb3_crypt -> ../../dm-0
lrwxrwxrwx 1 root root 10 Jan 8 22:47 dm-uuid-LVM-7AKu5oEyeNN8StI649OQclBri3W8OFoKRMwWFWeDh3qpQV2eeH6fq7F5NeeTOidI -> ../../dm-1
lrwxrwxrwx 1 root root 9 Jan 8 22:47 lvm-pv-uuid-53J33r-fxTl-NjuS-Eifu-9Yh3-o0Z3-Qtj3mt -> ../../sda
lrwxrwxrwx 1 root root 10 Jan 8 22:47 lvm-pv-uuid-KuBoV3-mbcZ-in6d-LhNN-VSMt-14p8-Ubhecu -> ../../dm-0
lrwxrwxrwx 1 root root 13 Jan 8 22:47 nvme-GIGABYTE_GP-AG42TB_SN212508909473 -> ../../nvme0n1
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-GIGABYTE_GP-AG42TB_SN212508909473-part1 -> ../../nvme0n1p1
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-GIGABYTE_GP-AG42TB_SN212508909473-part2 -> ../../nvme0n1p2
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-GIGABYTE_GP-AG42TB_SN212508909473-part3 -> ../../nvme0n1p3
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-GIGABYTE_GP-AG42TB_SN212508909473-part4 -> ../../nvme0n1p4
lrwxrwxrwx 1 root root 13 Jan 8 22:47 nvme-nvme.1987-534e323132353038393039343733-47494741425954452047502d414734325442-00000001 -> ../../nvme0n1
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-nvme.1987-534e323132353038393039343733-47494741425954452047502d414734325442-00000001-part1 -> ../../nvme0n1p1
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-nvme.1987-534e323132353038393039343733-47494741425954452047502d414734325442-00000001-part2 -> ../../nvme0n1p2
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-nvme.1987-534e323132353038393039343733-47494741425954452047502d414734325442-00000001-part3 -> ../../nvme0n1p3
lrwxrwxrwx 1 root root 15 Jan 8 22:47 nvme-nvme.1987-534e323132353038393039343733-47494741425954452047502d414734325442-00000001-part4 -> ../../nvme0n1p4
lrwxrwxrwx 1 root root 9 Jan 8 22:47 usb-Generic_STORAGE_DEVICE-0:0 -> ../../sdd
lrwxrwxrwx 1 root root 9 Jan 8 22:47 wwn-0x50025385a00b38b4 -> ../../sdb
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x50025385a00b38b4-part1 -> ../../sdb1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x50025385a00b38b4-part2 -> ../../sdb2
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x50025385a00b38b4-part5 -> ../../sdb5
lrwxrwxrwx 1 root root 9 Jan 8 22:47 wwn-0x5002538d401dff8a -> ../../sda
lrwxrwxrwx 1 root root 9 Jan 8 22:47 wwn-0x5002538e49b2ea46 -> ../../sdc
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x5002538e49b2ea46-part1 -> ../../sdc1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x5002538e49b2ea46-part2 -> ../../sdc2
lrwxrwxrwx 1 root root 10 Jan 8 22:47 wwn-0x5002538e49b2ea46-part3 -> ../../sdc3
*********************** END /dev/disk/by-id
*********************** BEGIN /dev/disk/by-uuid
total 0
lrwxrwxrwx 1 root root 10 Jan 8 22:47 4b9d4135-8a81-4a81-b961-3b8954c9305f -> ../../dm-1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 57323f9b-76fd-45b4-8bbf-2a428f207c6e -> ../../sdb1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 5e0aa37d-cdd8-4b43-a623-e47cfa89be10 -> ../../sdc3
lrwxrwxrwx 1 root root 10 Jan 8 22:47 6680-621C -> ../../sdc1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 7a805bed-e309-44e0-8dfa-6994a13d29a1 -> ../../sdb5
lrwxrwxrwx 1 root root 15 Jan 8 22:47 80DAB158DAB14AE4 -> ../../nvme0n1p3
lrwxrwxrwx 1 root root 15 Jan 8 22:47 A00CA8AE0CA88140 -> ../../nvme0n1p4
lrwxrwxrwx 1 root root 15 Jan 8 22:47 D2B0-F8D4 -> ../../nvme0n1p1
lrwxrwxrwx 1 root root 10 Jan 8 22:47 ced76384-4e5b-411c-a30c-c7f1f5344fb9 -> ../../sdc2
*********************** END /dev/disk/by-uuid
-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.0.0-6-amd64 (SMP w/12 CPU threads; PREEMPT)
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), LANGUAGE=fr_BE:fr
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages grub2-common depends on:
ii dpkg 1.21.13
ii grub-common 2.06-7
ii libc6 2.36-7
ii libdevmapper1.02.1 2:1.02.185-2
ii libefiboot1 37-6
ii libefivar1 37-6
ii liblzma5 5.4.0-0.1
grub2-common recommends no packages.
grub2-common suggests no packages.
-- no debconf information
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.