Your message dated Sat, 10 Aug 2024 14:24:20 +0200 (CEST)
with message-id <20240810122420.46fd3be2...@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #1042068,
regarding linux-image-6.4.0-1-amd64 boot kernel panic
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1042068: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042068
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-6.4.0-1-amd64
Version: 6.4.4-1
system info:

```
$ lsb_release -a
No LSB modules are available.
Distributor ID: Debian
Description:    Debian GNU/Linux trixie/sid
Release:        n/a
Codename:       trixie
$ lscpu
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         39 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  20
  On-line CPU(s) list:   0-19
Vendor ID:               GenuineIntel
  Model name:            12th Gen Intel(R) Core(TM) i7-12700H
...
```

Root FS is **btrfs**


Boot log (photo OCR, unable to save log, might have some errors)

```

[0.625362] Key type .fscrypt registered

[0.625379] Key type fscrypt-provisioning registered

[9.626122] Key type encrypted registered

[0.626142] AppArmor: AppArmor shal policy hashing enabled

[0.626493] integrity: Loading X.509 certificate: UEFI:b

[0.626527] integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA
2011: 13adb43096d82709cBcd54f316ed522988a1bd4'

[0.626571] integrity: Loading X.509 certificate: UEF1: db

[0.626602] integrity: Loaded X.509 cert 'Microsoft Windows Production PCA
2011: a92902398e16c4977Bcd90 f99e4f9ae17c55af53'

[0.627200] ima: Allocated hash algorithm: sha256

[0.646056] ima: No architecture policies found[

[0.647855] evm: Initialising EVM extended attributes:

[0.649888] evm: security. selinux

[0.651351] evm: security. SMACK64 (disabled)

[0.652752] evm: security. SMACK64EXEC (disabled)

[0.653931] evm: security. SMACK64TRANSMUTE (disabled)

[0.655031] evm: security. SMACK64MMAP (disabled)

[0.656067] evm: security. apparmor

[0.657873] evm: security. ima

[0.658026] evm: security.capability

[0.658966] evm: HMAC attrs: Bx1

[0.703120] clk: Disabling unused clocks

[0.704503] List of all partitions:

[0.705638] No filesystem could mount root, tried:

[8.705639]

[0.707504] Kernel panic - not syncing: VFS: Unable to mount root fs on
unknown-block(0,0)

[0.708458] CPU: 6 PID: 1 Comm: swapper/0 Not tainted 6.4.0-1-amd64 #1
Debian 6.4.4-1

[8.709396] Harduare name: MECHREVO WUJIE16 Pro/WUJIE16 Pro. BIOS Q3ANWJ.16
12/09/2022

[0.710369] Call Trace:

[0.711305] <TASK>

[0.712215] dump_stack_1v1+0×47/0×60

[0.713148] panic+0x17f/0×330

[0.714067] mount_block_root+0×21f/0x2b@

[0.714981] prepare_namespace+Oxf0/0×170

[8.715888] kernel_init_freeable+Bx417/8×470

[0.716782] ?__pfx_kernel_init+B×10/B×10

[0.717637] kernel_init+Bxla/Bx1cl

[0.718583] ret_from_fork+Bx29/0×50

[0.719387] </TASK>

[0.720391] Kernel Offset: Bx37000000 from Oxffffffff81000000 (relocation
range: Bxffffffff80000000-0xffffffffbfffffff)

[0.721331]---[ end Kernel panic - not syncing: FS: Unable to mount root fs
on unknown-black(0,0) ]--

```

Thanks!

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply via email to