Your message dated Sat, 16 Aug 2025 07:29:38 +0000 with message-id <E1unBMA-004EiB-2h@fasolo.debian.org> and subject line Bug#1110679: fixed in linux 6.16.1-1~exp1 has caused the Debian Bug report #1110679, regarding linux: btrfs data corruption bug since 6.15.3 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1110679: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110679 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: btrfs data corruption bug since 6.15.3
- From: Christoph Anton Mitterer <calestyo@scientia.org>
- Date: Sat, 09 Aug 2025 23:16:21 +0200
- Message-id: <[🔎] 175477418132.284966.12698390323926077944.reportbug@heisenberg.scientia.org>
Source: linux Version: 6.15.3-1~exp1 Severity: critical Justification: causes serious data loss Hey. Since trixie is out now I figured you might sooner or later push a newer kernel to unstable... Thus a heads up that a data corruption bug has been found in btrfs, introduced around 6.15.3, and fixed in commit 0a32e4f0025a74c70dcab4478e9b29c22f5ecf2f "btrfs: fix log tree replay failure due to file with 0 links and extents" So just be sure to have that included, before you upgrad in unstable :-) Thanks, Chris. -- System Information: Debian Release: 13.0 APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 6.12.38+deb13-amd64 (SMP w/16 CPU threads; PREEMPT) Locale: LANG=en_DE.UTF-8, LC_CTYPE=en_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
- To: 1110679-close@bugs.debian.org
- Subject: Bug#1110679: fixed in linux 6.16.1-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 16 Aug 2025 07:29:38 +0000
- Message-id: <E1unBMA-004EiB-2h@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: linux Source-Version: 6.16.1-1~exp1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1110679@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 16 Aug 2025 09:09:54 +0200 Source: linux Architecture: source Version: 6.16.1-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1088522 1110511 1110679 1111017 Changes: linux (6.16.1-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.16.1 . [ Salvatore Bonaccorso ] * net: Enable OVPN (OpenVPN data channel offload) as module (Closes: #1110511) * d/c/defines.toml: Bump abi_suffix to +deb14 for unstable releases * d/c/defines.toml: Define the Debian forky release * d/c/defines.toml: Define the Debian trixie-backports release * btrfs: fix log tree replay failure due to file with 0 links and extents (Closes: #1110679) * netlink: avoid infinite retry looping in netlink_unicast() (Closes: #1111017) * [amd64] udeb: kernel-image: Include SPI drivers . [ Tj ] * drivers/gpu/drm/nouveau: Enable DRM_NOUVEAU_GSP_DEFAULT (Closes: #1088522) . [ Uwe Kleine-König ] * [armhf] Add phy-gmii-sel module to nic-shared-modules udeb for ti/omap/am335x based machines (e.g. BeagleBone black). . [ Ben Hutchings ] * linux-misc-tools: Fix FTBFS on sparc64: - tools/bootconfig: Cleanup bootconfig footer size calculations - bootconfig: Fix unaligned access when building footer . [ Bastian Blank ] * [amd64, arm64] Enable MANA_INFINIBAND. Checksums-Sha1: 3fe755e9a0724ff80d9834b6f62429a7e88882d0 192581 linux_6.16.1-1~exp1.dsc 6c3b7dee664b18f90058ebf957d4a9a7b718767b 155630760 linux_6.16.1.orig.tar.xz 733d9cfbc4e66afabe22b9dbb700c43213335d8a 1534552 linux_6.16.1-1~exp1.debian.tar.xz 6d6732311b5d08ff6abd6491b88bb9bc2f371d16 6714 linux_6.16.1-1~exp1_source.buildinfo Checksums-Sha256: fef311d6f33eb642bf6a5a55d77cf8118b611e9e6a26bd4555fecccaf8e9130e 192581 linux_6.16.1-1~exp1.dsc 309034f1f996252052e9d5dba51f930fb80c4449f50004c85aed925a38ed6dc7 155630760 linux_6.16.1.orig.tar.xz 779776d60e2163a64de9bd4c89500caf42be1ed2b65b5ad3004bfcda084cecc5 1534552 linux_6.16.1-1~exp1.debian.tar.xz 1ae28353728ad8c23772a9b4c12c6a75165afb0448bc519b3e75f8e9a775096f 6714 linux_6.16.1-1~exp1_source.buildinfo Files: b5610596c534bf9b3134df62a32489bc 192581 kernel optional linux_6.16.1-1~exp1.dsc f6f3df7dbf804b4473133ea6335eb80b 155630760 kernel optional linux_6.16.1.orig.tar.xz 6b654b5cfa777300caec3a71842bfbc2 1534552 kernel optional linux_6.16.1-1~exp1.debian.tar.xz 2a5883101ee6beebde2834b22e0f24ea 6714 kernel optional linux_6.16.1-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmigL2VfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EG7gP/0+7BlQPb7/FkTQn4ud7BuwML/SYkxf/ g7Nr6oBpb8YVcMIBgtRTpPVMG9Wrq0trj3sNbVa4s7OFsTnSR85g5BjbO4cOlWlM RwSYxGK1gpqVc18WWTlaOlnk+MLsA+NlLyL0y1bKtXtvJYxFZYnx6Vct56YjLcul /bnQsewh4EWb7w+v2cmI9I53ldCKkx2sNH7Q5UGt58WqKCQOWtjPEKG997w99PO9 w2v6SBltgLFHGlFAFtitXSnXrT2TNo7sxe1dket8toax5sdfkBVK6S0Tvao8GJVj crOozcTaYLI6hUlKaa1sPKJyH3dPiFOCZO1lKJETWDls8Z67pcFOi5VCaWBdVF/U 3o7X7cHvjtkrN9kvc6zOwN238DDeO5aJ+uQwnEW4kjXqGBJ997uOIc7LjahlaZUY A+joB4cUlRoG6B3WPCmhZIfw69VVPLbSMG0ZP347JP6HaaHnrE+SmNeyyudkCy7t Zzj0VoTe0uEKnvGoFpXHD6jY57LpUdVZHf9C/bOjnP3+RI3/vb5qPR4mR6Uhs0Gq Yt03QFZY7P59gKV9FgxQx8DvtyRJxnwvxgx+tstfXHs7FMkwcysQu80v4NMQkeiO oibB2A8JaKcdeAHob73eik9FN8H4d4XSCngi5OYiYxfSJ3sQYPOR6D6OFuNYAVsW F18Id+anZyS0 =yH23 -----END PGP SIGNATURE-----Attachment: pgpoUXRwy21_g.pgp
Description: PGP signature
--- End Message ---