[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#928891: marked as done (linux-image-amd64: Kernel crash when using any disk that uses reiserfs)



Your message dated Sun, 27 Nov 2022 09:58:49 +0100 (CET)
with message-id <20221127085849.B1945BE2DE0@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #928891,
regarding linux-image-amd64: Kernel crash when using any disk that uses reiserfs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
928891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928891
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-amd64
Version: 4.19+104
Severity: important

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Dear Maintainer,

When using any partition which uses reiserfs, the kernel crashes

This happens very easily by just using the reiser (v3) filesystem, some
of my external hard disks uses it (so I cannot make use of them), or
partition mountpoints with reiserfs becomes totally unusable and
dangerous

This bug is easily reproducible by creating a new reiserfs partition
(image file probably too) and start using it, so it looks like it
specially affects in RW operations

I suggest to mark this bug as a serious one since there's so many people
using this filesystem, in desktops or servers.

The package is the last one available on the buster branch


Thank you


- -- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-amd64 depends on:
ii  linux-image-4.19.0-4-amd64  4.19.28-2

linux-image-amd64 recommends no packages.

linux-image-amd64 suggests no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
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=kmLp
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: