[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#943682: marked as done (Resizing KeepassXC crashes KDE Plasma)



Your message dated Thu, 20 Feb 2025 12:31:39 +0100 (CET)
with message-id <20250220113139.C20B5BE2EE7@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #943681,
regarding Resizing KeepassXC crashes KDE Plasma
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
943681: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943681
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: keepassxc
Version: 2.3.4+dfsg.1-1
Severity: normal

Dear Maintainer,

   * What led up to the situation?
     Executing KeepassXC, opening the database.
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
     Open database and try to resize the window on KDE.
   * What was the outcome of this action?
     KDE Plasma completely frozen, only mouse moving. Need to restart SDDM to get it back.
   * What outcome did you expect instead?
     Resize window.

[27436.083291] [drm:intel_pipe_update_end [i915]] *ERROR* Atomic update failure on pipe B (start=51173 end=51174) time 175 us, min 1431, max 1439, scanline start 1430, end 1446
[28814.602509] [drm:intel_pipe_update_end [i915]] *ERROR* Atomic update failure on pipe B (start=133816 end=133817) time 148 us, min 1431, max 1439, scanline start 1428, end 1441
   8.188923] DMAR: DRHD: handling fault status reg 2
[    8.188932] DMAR: [DMA Write] Request device [02:00.0] fault addr 0 [fault reason 05] PTE Write access is not set




-- System Information:
Debian Release: 10.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-6-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8), LANGUAGE=pt_BR:en_US (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages keepassxc depends on:
ii  libargon2-1       0~20171227-0.2
ii  libc6             2.28-10
ii  libgcrypt20       1.8.4-5
ii  libqt5core5a      5.11.3+dfsg1-1
ii  libqt5dbus5       5.11.3+dfsg1-1
ii  libqt5gui5        5.11.3+dfsg1-1
ii  libqt5network5    5.11.3+dfsg1-1
ii  libqt5widgets5    5.11.3+dfsg1-1
ii  libqt5x11extras5  5.11.3-2
ii  libsodium23       1.0.17-1
ii  libstdc++6        8.3.0-6
ii  libx11-6          2:1.6.7-1
ii  libxi6            2:1.7.9-1
ii  libxtst6          2:1.2.3-1
ii  libykpers-1-1     1.19.3-3+deb10u1
ii  libzxcvbn0        2.4+dfsg-2
ii  zlib1g            1:1.2.11.dfsg-1

keepassxc recommends no packages.

keepassxc suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: