Your message dated Sat, 10 Aug 2024 14:24:20 +0200 (CEST) with message-id <20240810122420.46FD3BE2DE0@eldamar.lan> and subject line Closing this bug (BTS maintenance for src:linux bugs) has caused the Debian Bug report #1042068, regarding linux-image-6.4.0-1-amd64 boot kernel panic to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1042068: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042068 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: linux-image-6.4.0-1-amd64 boot kernel panic
- From: Terrance Hendrik <terrance.hendrik@gmail.com>
- Date: Wed, 26 Jul 2023 10:59:34 +0800
- Message-id: <CADoJnTQjSO0DGOzSRLzx9actJ6xJ8CNZG7Ni99_=QXOSjpH7rA@mail.gmail.com>
Package: linux-image-6.4.0-1-amd64 Version: 6.4.4-1
system info:
```
$ lsb_release -a
No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux trixie/sid
Release: n/a
Codename: trixie
$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 39 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 20
On-line CPU(s) list: 0-19
Vendor ID: GenuineIntel
Model name: 12th Gen Intel(R) Core(TM) i7-12700H
...
```Root FS is **btrfs**
Boot log (photo OCR, unable to save log, might have some errors)```[0.625362] Key type .fscrypt registered
[0.625379] Key type fscrypt-provisioning registered
[9.626122] Key type encrypted registered
[0.626142] AppArmor: AppArmor shal policy hashing enabled
[0.626493] integrity: Loading X.509 certificate: UEFI:b
[0.626527] integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adb43096d82709cBcd54f316ed522988a1bd4'
[0.626571] integrity: Loading X.509 certificate: UEF1: db
[0.626602] integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c4977Bcd90 f99e4f9ae17c55af53'
[0.627200] ima: Allocated hash algorithm: sha256
[0.646056] ima: No architecture policies found[
[0.647855] evm: Initialising EVM extended attributes:
[0.649888] evm: security. selinux
[0.651351] evm: security. SMACK64 (disabled)
[0.652752] evm: security. SMACK64EXEC (disabled)
[0.653931] evm: security. SMACK64TRANSMUTE (disabled)
[0.655031] evm: security. SMACK64MMAP (disabled)
[0.656067] evm: security. apparmor
[0.657873] evm: security. ima
[0.658026] evm: security.capability
[0.658966] evm: HMAC attrs: Bx1
[0.703120] clk: Disabling unused clocks
[0.704503] List of all partitions:
[0.705638] No filesystem could mount root, tried:
[8.705639]
[0.707504] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[0.708458] CPU: 6 PID: 1 Comm: swapper/0 Not tainted 6.4.0-1-amd64 #1 Debian 6.4.4-1
[8.709396] Harduare name: MECHREVO WUJIE16 Pro/WUJIE16 Pro. BIOS Q3ANWJ.16 12/09/2022
[0.710369] Call Trace:
[0.711305] <TASK>
[0.712215] dump_stack_1v1+0×47/0×60
[0.713148] panic+0x17f/0×330
[0.714067] mount_block_root+0×21f/0x2b@
[0.714981] prepare_namespace+Oxf0/0×170
[8.715888] kernel_init_freeable+Bx417/8×470
[0.716782] ?__pfx_kernel_init+B×10/B×10
[0.717637] kernel_init+Bxla/Bx1cl
[0.718583] ret_from_fork+Bx29/0×50
[0.719387] </TASK>
[0.720391] Kernel Offset: Bx37000000 from Oxffffffff81000000 (relocation range: Bxffffffff80000000-0xffffffffbfffffff)
[0.721331]---[ end Kernel panic - not syncing: FS: Unable to mount root fs on unknown-black(0,0) ]--
```Thanks!
--- End Message ---
--- Begin Message ---
- To: 1042068-done@bugs.debian.org
- Cc: 1042068-submitter@bugs.debian.org
- Subject: Closing this bug (BTS maintenance for src:linux bugs)
- From: carnil@debian.org
- Date: Sat, 10 Aug 2024 14:24:20 +0200 (CEST)
- Message-id: <20240810122420.46FD3BE2DE0@eldamar.lan>
Hi This bug was filed for a very old kernel or the bug is old itself without resolution. If you can reproduce it with - the current version in unstable/testing - the latest kernel from backports please reopen the bug, see https://www.debian.org/Bugs/server-control for details. Regards, Salvatore
--- End Message ---