Package: src:linux
Version: 5.10.12-1
Severity: important
Dear Maintainer,
With Debian kernel 5.10.12-1, WiFi does not work on my RPi 4B 8GB model.
Disabling vc4.ko by module_blacklist=vc4 in kernel command line
restores WiFi connection...
I have not yet verified if this is an upstream issue.
T
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Jan 2021 23:03:16 +0100
Source: linux-signed-i386
Architecture: source
Version: 4.19.171+1
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 10:35:46 +0100
Source: linux-signed-i386
Architecture: source
Version: 4.19.171+2
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 10:35:46 +0100
Source: linux-signed-arm64
Architecture: source
Version: 4.19.171+2
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 10:35:46 +0100
Source: linux-signed-amd64
Architecture: source
Version: 4.19.171+2
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 08:43:43 +0100
Source: linux-latest
Architecture: source
Version: 105+deb10u9
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
lin
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 10:35:46 +0100
Source: linux
Architecture: source
Version: 4.19.171-2
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
linux (4.19
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Jan 2021 23:03:16 +0100
Source: linux
Architecture: source
Version: 4.19.171-1
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Closes: 970736 972345
Your message dated Tue, 02 Feb 2021 06:47:08 +
with message-id
and subject line Bug#977615: fixed in linux 4.19.171-1
has caused the Debian Bug report #977615,
regarding arm64: memory corruption bug
to be marked as done.
This means that you claim that the problem has been dealt with.
If this
Your message dated Tue, 02 Feb 2021 06:47:08 +
with message-id
and subject line Bug#970736: fixed in linux 4.19.171-1
has caused the Debian Bug report #970736,
regarding cdc_ncm_fill_tx_frame calls memset with huge length when called from
cdc_mbim_tx_fixup
to be marked as done.
This means th
Mapping sid to unstable.
binary:acpi-modules-5.10.0-3-686-di is NEW.
binary:acpi-modules-5.10.0-3-686-pae-di is NEW.
binary:ata-modules-5.10.0-3-686-di is NEW.
binary:ata-modules-5.10.0-3-686-pae-di is NEW.
binary:btrfs-modules-5.10.0-3-686-di is NEW.
binary:btrfs-modules-5.10.0-3-686-pae-di is NEW
linux-signed-i386_5.10.12+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-i386_5.10.12+1.dsc
linux-signed-i386_5.10.12+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
binary:ata-modules-5.10.0-3-arm64-di is NEW.
binary:btrfs-modules-5.10.0-3-arm64-di is NEW.
binary:cdrom-core-modules-5.10.0-3-arm64-di is NEW.
binary:crc-modules-5.10.0-3-arm64-di is NEW.
binary:crypto-dm-modules-5.10.0-3-arm64-di is NEW.
binary:crypto-modules-5.10.0-3-arm
linux-signed-arm64_5.10.12+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-arm64_5.10.12+1.dsc
linux-signed-arm64_5.10.12+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
binary:acpi-modules-5.10.0-3-amd64-di is NEW.
binary:ata-modules-5.10.0-3-amd64-di is NEW.
binary:btrfs-modules-5.10.0-3-amd64-di is NEW.
binary:cdrom-core-modules-5.10.0-3-amd64-di is NEW.
binary:crc-modules-5.10.0-3-amd64-di is NEW.
binary:crypto-dm-modules-5.10.0-3-amd64
linux-signed-amd64_5.10.12+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-amd64_5.10.12+1.dsc
linux-signed-amd64_5.10.12+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Patches are incorporated into the 5.10-stable branch as
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/diff/queue-5.10/drm-vc4-correct-lbm-size-and-calculation.patch?id=138ad5c64ba368c5e077b8c178c47f12b29b8701
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-
Processing commands for cont...@bugs.debian.org:
> close 981588 5.10.12-1
Bug #981588 {Done: Salvatore Bonaccorso } [src:linux]
linux-image-5.10.0-2-amd64: Using pen crashes system
Marked as fixed in versions linux/5.10.12-1.
Bug #981588 {Done: Salvatore Bonaccorso } [src:linux]
linux-image-5.10
Processing commands for cont...@bugs.debian.org:
> reassign 981588 src:linux 5.10.9-1
Bug #981588 {Done: Salvatore Bonaccorso } [5.10.9-1]
linux-image-5.10.0-2-amd64: Using pen crashes system
Warning: Unknown package '5.10.9-1'
Bug reassigned from package '5.10.9-1' to 'src:linux'.
Ignoring reque
Processing commands for cont...@bugs.debian.org:
> reassign 981588 5.10.9-1
Bug #981588 [linux-image-5.10.0-2-amd64] linux-image-5.10.0-2-amd64: Using pen
crashes system
Bug reassigned from package 'linux-image-5.10.0-2-amd64' to '5.10.9-1'.
Warning: Unknown package '5.10.9-1'
Warning: Unknown pa
Hi Ard,
On Sat, Jan 30, 2021 at 04:41:16PM +0100, Ard Biesheuvel wrote:
> L.S.,
>
> This is a request to consider disabling obsolete crypto in 5.10 and
> later Debian builds of the Linux kernel on any architecture.
>
> We are all familiar with the rigid rules when it comes to not breaking
> user
Package: linux-image-5.10.0-2-amd64
Severity: important
X-Debbugs-Cc: e...@wolke7.net
Dear Maintainer,
after installation of linux-image-5.10.0-2-amd64 (5.10.9-1) on a Lenovo X1 Yoga
Gen5
touching the screen with the pen immediately crashes the system immediately and
completely.
It seems that
Package: linux-image-5.10.0-2-armmp
Version: 5.10.9-1: armhf
Package: linux-image-5.10.0-2-armmp-lpae
Version: 5.10.9-1: armhf
Analysis showed that it does reach init-top. But when usbcore and usbhid
are loaded, peripherals like mouse and keyboard are not at all detected.
When later usbhid, us
> "Simon" == Simon McVittie writes:
Simon> On Mon, 01 Feb 2021 at 11:49:25 -0500, Sam Hartman wrote:
>> > "Simon" == Simon McVittie writes: I'm
>> assuming that the proposal is to change this for bookworm.
Simon> I'm sorry, I don't have a concrete proposal, and I don't
On Mon, 01 Feb 2021 at 11:49:25 -0500, Sam Hartman wrote:
> > "Simon" == Simon McVittie writes:
> I'm assuming that the proposal is to change this for bookworm.
I'm sorry, I don't have a concrete proposal, and I don't understand which
package is meant to be responsible for this well enough to
> "Simon" == Simon McVittie writes:
I'm assuming that the proposal is to change this for bookworm.
It seems like it's too late in the process to change something like this
for bullseye without more explicit and significant harm documented than
you have given so far.
Simon> Rationale: on
Mapping stable-security to proposed-updates.
binary:acpi-modules-4.19.0-14-686-di is NEW.
binary:acpi-modules-4.19.0-14-686-pae-di is NEW.
binary:ata-modules-4.19.0-14-686-di is NEW.
binary:ata-modules-4.19.0-14-686-pae-di is NEW.
binary:btrfs-modules-4.19.0-14-686-di is NEW.
binary:btrfs-modules-4
Mapping stable-security to proposed-updates.
binary:acpi-modules-4.19.0-14-amd64-di is NEW.
binary:ata-modules-4.19.0-14-amd64-di is NEW.
binary:btrfs-modules-4.19.0-14-amd64-di is NEW.
binary:cdrom-core-modules-4.19.0-14-amd64-di is NEW.
binary:compress-modules-4.19.0-14-amd64-di is NEW.
binary:cr
Mapping stable-security to proposed-updates.
binary:acpi-modules-4.19.0-14-686-di is NEW.
binary:acpi-modules-4.19.0-14-686-pae-di is NEW.
binary:ata-modules-4.19.0-14-686-di is NEW.
binary:ata-modules-4.19.0-14-686-pae-di is NEW.
binary:btrfs-modules-4.19.0-14-686-di is NEW.
binary:btrfs-modules-4
Mapping stable-security to proposed-updates.
binary:ata-modules-4.19.0-14-arm64-di is NEW.
binary:btrfs-modules-4.19.0-14-arm64-di is NEW.
binary:cdrom-core-modules-4.19.0-14-arm64-di is NEW.
binary:compress-modules-4.19.0-14-arm64-di is NEW.
binary:crc-modules-4.19.0-14-arm64-di is NEW.
binary:cry
On Mon, 01 Feb 2021 at 13:58:57 +, Simon McVittie wrote:
> Rationale: on sysvinit or runit systems, pid 1 is very simple and is
> unlikely to need to elevate any limits, but sysadmins are expected
> to restart system services in an unpredictable execution environment
> (certainly true for syste
A recent regression in gnome-keyring (perhaps only on systems that
use dbus-x11, it isn't completely clear to me yet) has prompted me to
look at how rlimits work in Debian. It isn't clear to me which package
is or should be responsible for choosing what arbitrary limits we use
in practice.
The ker
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 30 Jan 2021 08:43:43 +0100
Source: linux-latest
Architecture: source
Version: 105+deb10u9
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team
Chan
Mapping stable-security to proposed-updates.
linux_4.19.171.orig.tar.xz is only available in NEW.
Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so p
Mapping stable-security to proposed-updates.
binary:affs-modules-4.19.0-14-4kc-malta-di is NEW.
binary:affs-modules-4.19.0-14-5kc-malta-di is NEW.
binary:affs-modules-4.19.0-14-loongson-3-di is NEW.
binary:affs-modules-4.19.0-14-octeon-di is NEW.
binary:ata-modules-4.19.0-14-4kc-malta-di is NEW.
bi
Your message dated Mon, 01 Feb 2021 12:37:27 +0100
with message-id <2361360.OdQxPOZfLQ@bagend>
and subject line Re: Bug#979975: more info
has caused the Debian Bug report #979975,
regarding linux-image-5.10.0-1-amd64: it does not boot
to be marked as done.
This means that you claim that the proble
Hello,
intrigeri, le lun. 01 févr. 2021 09:16:23 +0100, a ecrit:
> Samuel Thibault (2021-01-31):
> > As of Debian bullseye alpha3, apparmor is getting installed by default
> > even in the base system,
>
> To be clear, in this context "base system" is d-i terminology, right?
Yes. That's when one
dear maintainer,
linux-image-5.10.0-2-amd64 (5.10.9.1) boots fine.
Fulvio Ciriaco
38 matches
Mail list logo