On Sat, 2023-09-09 at 11:42 +0200, Bastian Blank wrote:
> The first one is the one with included size limitations, because those
> load the kernel from a pre-defined flash partition, whose size can't be
> easily changed by the user. This one is now overflowing for the second
> to last documented
Mapping stable-security to proposed-updates.
binary:acpi-modules-6.1.0-12-686-di is NEW.
binary:acpi-modules-6.1.0-12-686-pae-di is NEW.
binary:ata-modules-6.1.0-12-686-di is NEW.
binary:ata-modules-6.1.0-12-686-pae-di is NEW.
binary:btrfs-modules-6.1.0-12-686-di is NEW.
binary:btrfs-modules-6.1.0-
Mapping stable-security to proposed-updates.
binary:ata-modules-6.1.0-12-arm64-di is NEW.
binary:btrfs-modules-6.1.0-12-arm64-di is NEW.
binary:cdrom-core-modules-6.1.0-12-arm64-di is NEW.
binary:crc-modules-6.1.0-12-arm64-di is NEW.
binary:crypto-dm-modules-6.1.0-12-arm64-di is NEW.
binary:crypto-
Mapping stable-security to proposed-updates.
binary:acpi-modules-6.1.0-12-amd64-di is NEW.
binary:ata-modules-6.1.0-12-amd64-di is NEW.
binary:btrfs-modules-6.1.0-12-amd64-di is NEW.
binary:cdrom-core-modules-6.1.0-12-amd64-di is NEW.
binary:crc-modules-6.1.0-12-amd64-di is NEW.
binary:crypto-dm-mo
Package: iproute2
Version: 6.5.0-1
Severity: normal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
After upgrading to 6.5.0-1 adequate shows:
adequate found packaging bugs
- -
iproute2: obsolete-conffile /etc/iproute2/rt_tables.d/README
iproute2: obsolete-conffile /
Mapping stable-security to proposed-updates.
binary:affs-modules-6.1.0-12-4kc-malta-di is NEW.
binary:affs-modules-6.1.0-12-5kc-malta-di is NEW.
binary:affs-modules-6.1.0-12-loongson-3-di is NEW.
binary:affs-modules-6.1.0-12-mips32r2el-di is NEW.
binary:affs-modules-6.1.0-12-mips64r2el-di is NEW.
b
Processing commands for cont...@bugs.debian.org:
> close 1022159
Bug #1022159 [src:linux] bugs.debian.org: I upgraded to kernel 5.10.0-19 and
Debian no longer works
Marked Bug as done
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1022159: https://bugs.debian.or
Processing commands for cont...@bugs.debian.org:
> reassign 1016874 src:linux
Bug #1016874 [bugs.debian.org] bugs.debian.org: PC unable to boot after package
update
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #1016874 to the same v
Processing commands for cont...@bugs.debian.org:
> reassign 1022159 src:linux
Bug #1022159 [bugs.debian.org] bugs.debian.org: I upgraded to kernel 5.10.0-19
and Debian no longer works
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #10
Processing commands for cont...@bugs.debian.org:
> reassign 1024006 src:linux
Bug #1024006 [bugs.debian.org] bugs.debian.org: Waking up from sleep causes
laptop to irrecoverably freeze
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #1
Processing commands for cont...@bugs.debian.org:
> reassign 1041960 src:linux
Bug #1041960 [linux] bugs.debian.org: Missing 'boot messages' between grub
screen and desktop showing up.
Bug reassigned from package 'linux' to 'src:linux'.
Ignoring request to alter found versions of bug #1041960 to t
Processing commands for cont...@bugs.debian.org:
> reassign 1041960 linux
Bug #1041960 [bugs.debian.org] bugs.debian.org: Missing 'boot messages' between
grub screen and desktop showing up.
Bug reassigned from package 'bugs.debian.org' to 'linux'.
Ignoring request to alter found versions of bug #
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 09 Sep 2023 16:32:54 +0100
Source: iproute2
Architecture: source
Version: 6.5.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Luca
iproute2_6.5.0-1_source.changes uploaded successfully to localhost
along with the files:
iproute2_6.5.0-1.dsc
iproute2_6.5.0.orig.tar.xz
iproute2_6.5.0-1.debian.tar.xz
iproute2_6.5.0-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Sat, 09 Sep 2023 16:04:29 +
with message-id
and subject line Bug#1050442: fixed in iproute2 6.5.0-1
has caused the Debian Bug report #1050442,
regarding iproute2: [INTL:sv] Swedish translation of debconf messages
to be marked as done.
This means that you claim that the prob
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 1041007 + pending
Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM
hardware RN
On Sat, Sep 09, 2023 at 11:42:45AM +0200, Bastian Blank wrote:
> Hi
>
> On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote:
> > If we're now reaching the final limit and if it was foreseeable that we
> > would reach that limit, then yes it would have made sense to drop armel
> > *before*
Hi,
Thanks for the report.
On Sat, Sep 09, 2023 at 12:38:21PM +0100, Tj wrote:
> Source: linux
> Severity: normal
>
> Working with a Debian user in Matrix channel #Debian where they report
> that the TPM hardware random number generator that was available in
> v5.10* series is missing from v6.1*
Processing commands for cont...@bugs.debian.org:
> forcemerge 1041007 1051535
Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM
hardware RNG support (CONFIG_HW_RANDOM_TPM)
Bug #1051535 [src:linux] linux: HW_RANDOM_TPM disabled due to IMA=y
Marked as found in versions l
Source: linux
Severity: normal
Working with a Debian user in Matrix channel #Debian where they report
that the TPM hardware random number generator that was available in
v5.10* series is missing from v6.1* series for the amd64 kernel.
After examining the Kconfig options and the Debian configs I f
Hi,
On Sat, Sep 09, 2023 at 11:49:11AM +0300, Adrian Bunk wrote:
> On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote:
> >...
> > - Relese the DSA without armel builds. This is not optimal and for the
> > point release
> > we need to have to have all builds, but this gives peo
Hi
On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote:
> If we're now reaching the final limit and if it was foreseeable that we
> would reach that limit, then yes it would have made sense to drop armel
> *before* the bookworm release, but alas. If the kernel team can't support
> the kern
Hi Salvatore,
On 09-09-2023 10:15, Salvatore Bonaccorso wrote:
but should have been support for armel been
dropped earlier and should we do it for trixie
The kernel for armel went over some hardware limits before (I was
affected with my NAS, where I couldn't upgrade the kernel to bullseye as
On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote:
>...
> - Relese the DSA without armel builds. This is not optimal and for the point
> release
> we need to have to have all builds, but this gives people who still are
> interested
> in this architecture to step up and prop
Hi all,
We have problem with the image size of armel builds in bookworm. There
is a pending bookworm-security linux update pending which is currently
blocked due to armel FTBFS due to the image size increase:
https://people.debian.org/~carnil/buildd-logs/linux/linux_6.1.52-1_armel-2023-09-07T08:5
25 matches
Mail list logo