Hi,
On Tue, Feb 08, 2022 at 11:03:11PM +, Wayne Warren wrote:
> > Do you have the possiblity to test the most current 4.19.y version?
>
> I'm currently attempting to do this following instructions on
> https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html#s-common-building
- Original Message -
> From: "Salvatore Bonaccorso"
> To: "Timothy Pearson" , "990279"
> <990...@bugs.debian.org>
> Cc: "Christian König" , "Xi Ruoyao"
> , "Alex Deucher"
>
> Sent: Tuesday, February 8, 2022 3:16:32 PM
> Subject: Re: Bug#990279: Status?
> Hi Timothy,
>
> On Tue, Feb
Hi Timothy,
On Tue, Feb 08, 2022 at 01:23:10PM -0600, Timothy Pearson wrote:
> I can confirm Bullseye is still affected by this bug.
>
> Is there any chance of this fix being applied to the Bullseye stable
> kernels? We're having to maintain kernel builds in our own
> repositories to fix this re
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 1005141 + pending
Bug #1005141 [linux-perf] linux-perf: Removes diversions on upgrade breaking it
Added tag(
I can confirm Bullseye is still affected by this bug.
Is there any chance of this fix being applied to the Bullseye stable kernels?
We're having to maintain kernel builds in our own repositories to fix this
regression, and that introduces some lag when e.g. security updates are pushed
to Debia
On Tue, Feb 08, 2022 at 01:10:34PM +, Matthew Wilcox wrote:
> On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote:
> > It's worth pointing out that in Ubuntu, the generated MOK key
> > is for module signing only (extended key usage 1.3.6.1.4.1.2312.16.1.2),
> > kernels signed wi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Feb 2022 09:13:18 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.16.7+1
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
linux-signe
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Feb 2022 09:13:18 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.16.7+1
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
linux-sign
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Feb 2022 09:13:18 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.16.7+1
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
linux-sign
Mapping sid to unstable.
binary:acpi-modules-5.16.0-1-686-di is NEW.
binary:acpi-modules-5.16.0-1-686-pae-di is NEW.
binary:ata-modules-5.16.0-1-686-di is NEW.
binary:ata-modules-5.16.0-1-686-pae-di is NEW.
binary:btrfs-modules-5.16.0-1-686-di is NEW.
binary:btrfs-modules-5.16.0-1-686-pae-di is NEW
On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote:
> It's worth pointing out that in Ubuntu, the generated MOK key
> is for module signing only (extended key usage 1.3.6.1.4.1.2312.16.1.2),
> kernels signed with it will NOT be bootable.
Why should these be separate keys? There's
linux-signed-i386_5.16.7+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-i386_5.16.7+1.dsc
linux-signed-i386_5.16.7+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Control: tags -1 + confirmed patch
On Mon, Feb 07, 2022 at 08:57:22PM +0100, Guillem Jover wrote:
> Package: linux-perf
> Version: 5.16.3-1~exp1
> Severity: serious
>
> Hi!
>
> This package has code in its postrm maintscript, which unconditionally
> removes the diversion, which breaks as the ren
Processing control commands:
> tags -1 + confirmed patch
Bug #1005141 [linux-perf] linux-perf: Removes diversions on upgrade breaking it
Added tag(s) confirmed and patch.
--
1005141: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005141
Debian Bug Tracking System
Contact ow...@bugs.debian.or
On Mon, Feb 07, 2022 at 09:33:46PM +0900, Masahiro Yamada wrote:
> Added "Ben Hutchings "
>
> On Wed, Jan 5, 2022 at 3:13 AM Matthew Wilcox wrote:
> >
> > On Wed, Jan 05, 2022 at 12:39:57AM +0900, Masahiro Yamada wrote:
> > > > +vmlinux=$($MAKE -s -f $srctree/Makefile image_name)
> > > > +key=
>
Mapping sid to unstable.
binary:ata-modules-5.16.0-1-arm64-di is NEW.
binary:btrfs-modules-5.16.0-1-arm64-di is NEW.
binary:cdrom-core-modules-5.16.0-1-arm64-di is NEW.
binary:crc-modules-5.16.0-1-arm64-di is NEW.
binary:crypto-dm-modules-5.16.0-1-arm64-di is NEW.
binary:crypto-modules-5.16.0-1-arm
linux-signed-arm64_5.16.7+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-arm64_5.16.7+1.dsc
linux-signed-arm64_5.16.7+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
binary:acpi-modules-5.16.0-1-amd64-di is NEW.
binary:ata-modules-5.16.0-1-amd64-di is NEW.
binary:btrfs-modules-5.16.0-1-amd64-di is NEW.
binary:cdrom-core-modules-5.16.0-1-amd64-di is NEW.
binary:crc-modules-5.16.0-1-amd64-di is NEW.
binary:crypto-dm-modules-5.16.0-1-amd64
linux-signed-amd64_5.16.7+1_source.changes uploaded successfully to localhost
along with the files:
linux-signed-amd64_5.16.7+1.dsc
linux-signed-amd64_5.16.7+1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
19 matches
Mail list logo