Your message dated Sun, 20 Oct 2019 22:05:41 +0000 with message-id <[email protected]> and subject line Bug#935945: fixed in linux 5.3.7-1 has caused the Debian Bug report #935945, regarding linux-image-5.2.0-2-amd64: does not load signed kernel modules when UEFI Secure Boot is enabled to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 935945: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935945 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: src:linux Version: 5.2.9-2 Severity: important Dear Maintainer, * What led up to the situation? I regularly update Debian Testing (bullseye) on multiple computers. Two days ago something broke when kernel update from 4.19 to 5.2 arrived. Could you please help me to troubleshoot it? * What exactly did you do (or not do) that was effective (or ineffective)? On computer with UEFI but without enabled Secure Boot everything works just fine and I can load DKMS ZFS module with kernel 5.2.0-2-amd64. On a computer with secure boot enabled I can’t load ZFS kernel module that is signed using my own key that was enrolled into UEFI using "mokutil". * What was the outcome of this action? as root: # modprobe zfs modprobe: ERROR: could not insert 'zfs': Operation not permitted * What outcome did you expect instead? Load it as usually. I was able to reproduce the same issue on a different computer with Secure Boot and signed modules. A few notes: * It works (modules are loaded) after I boot back to linux-image-4.19.0-5-amd64 (but this is not a solution) * It works (modules are loaded) after I disable Secure Boot (but this is not a solution) * I'm sure that the modules are signed. I tested using: find /lib/modules -name '*.ko' -exec grep -FL '~Module signature appended~' {} \+ * I can check that the key was loaded from UEFI during boot Boot log with `4.19.0-5-amd64` ------------------------------- Aug 26 20:34:54 bedik002 kernel: efi: EFI v2.50 by INSYDE Corp. Aug 26 20:34:54 bedik002 kernel: efi: ACPI 2.0=0x7fffd014 SMBIOS=0x7f0d9000 SMBIOS 3.0=0x7f0d7000 ESRT=0x7f0d4158 MEMATTR=0x6f699018 TPMEventLog=0x66e32018 Aug 26 20:34:54 bedik002 kernel: Kernel is locked down from EFI secure boot; see https://wiki.debian.org/SecureBoot Aug 26 20:34:54 bedik002 kernel: ACPI: UEFI 0x000000007FFFC000 000236 (v01 HPQOEM 8362 00000001 HP 00040000) Aug 26 20:34:54 bedik002 kernel: ACPI: UEFI 0x000000007FFFB000 000042 (v01 HPQOEM 8362 00000002 HP 00040000) Aug 26 20:34:54 bedik002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Aug 26 20:34:54 bedik002 kernel: pci 0000:00:02.0: BAR 2: assigned to efifb Aug 26 20:34:54 bedik002 kernel: Registered efivars operations Aug 26 20:34:54 bedik002 kernel: Asymmetric key parser 'x509' registered Aug 26 20:34:54 bedik002 kernel: efifb: probing for efifb Aug 26 20:34:54 bedik002 kernel: efifb: framebuffer at 0x90000000, using 8100k, total 8100k Aug 26 20:34:54 bedik002 kernel: efifb: mode is 1920x1080x32, linelength=7680, pages=1 Aug 26 20:34:54 bedik002 kernel: efifb: scrolling: redraw Aug 26 20:34:54 bedik002 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Aug 26 20:34:54 bedik002 kernel: fb0: EFI VGA frame buffer device Aug 26 20:34:54 bedik002 kernel: Loading compiled-in X.509 certificates Aug 26 20:34:54 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' Aug 26 20:34:54 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def' Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' linked to secondary sys keyring Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' linked to secondary sys keyring Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Hewlett-Packard Company: HP UEFI Secure Boot 2013 DB key: 1d7cf2c2b92673f69c8ee1ec7063967ab9b62bec' linked to secondary sys keyring my key: Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:MokListRT cert 'bedik002 module signing key: b1025ea690c4c8f9593b0a158045e72586a3c12f' linked to secondary sys keyring Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:MokListRT cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' linked to secondary sys keyring Aug 26 20:34:54 bedik002 kernel: fb: switching to inteldrmfb from EFI VGA Aug 26 20:34:54 bedik002 kernel: EFI Variables Facility v0.08 2004-May-17 Aug 26 20:34:54 bedik002 kernel: pstore: Registered efi as persistent store backend Aug 26 20:34:56 bedik002 systemd[1]: Mounting /boot/efi... Aug 26 20:34:56 bedik002 systemd[1]: Mounted /boot/efi. Aug 26 20:35:03 bedik002 systemd[1841]: Listening on GnuPG network certificate management daemon. Aug 26 20:35:08 bedik002 systemd[2187]: Listening on GnuPG network certificate management daemon. ------------------------------- Boot log with `5.2.0-2-amd64` (looks different but it does load the key) ------------------------------- Aug 26 20:39:37 bedik002 kernel: efi: EFI v2.50 by INSYDE Corp. Aug 26 20:39:37 bedik002 kernel: efi: ACPI 2.0=0x7fffd014 SMBIOS=0x7f0d9000 SMBIOS 3.0=0x7f0d7000 ESRT=0x7f0d4158 MEMATTR=0x6f699018 TPMEventLog=0x66e32018 Aug 26 20:39:37 bedik002 kernel: Kernel is locked down from EFI secure boot; see https://wiki.debian.org/SecureBoot Aug 26 20:39:37 bedik002 kernel: ACPI: UEFI 0x000000007FFFC000 000236 (v01 HPQOEM 8362 00000001 HP 00040000) Aug 26 20:39:37 bedik002 kernel: ACPI: UEFI 0x000000007FFFB000 000042 (v01 HPQOEM 8362 00000002 HP 00040000) Aug 26 20:39:37 bedik002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns Aug 26 20:39:37 bedik002 kernel: ACPI: Core revision 20190509 Aug 26 20:39:37 bedik002 kernel: pci 0000:00:02.0: BAR 2: assigned to efifb Aug 26 20:39:37 bedik002 kernel: Registered efivars operations Aug 26 20:39:37 bedik002 kernel: Asymmetric key parser 'x509' registered Aug 26 20:39:37 bedik002 kernel: efifb: probing for efifb Aug 26 20:39:37 bedik002 kernel: efifb: framebuffer at 0x90000000, using 8100k, total 8100k Aug 26 20:39:37 bedik002 kernel: efifb: mode is 1920x1080x32, linelength=7680, pages=1 Aug 26 20:39:37 bedik002 kernel: efifb: scrolling: redraw Aug 26 20:39:37 bedik002 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Aug 26 20:39:37 bedik002 kernel: fb0: EFI VGA frame buffer device Aug 26 20:39:37 bedik002 kernel: Loading compiled-in X.509 certificates Aug 26 20:39:37 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' Aug 26 20:39:37 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def' Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Hewlett-Packard Company: HP UEFI Secure Boot 2013 DB key: 1d7cf2c2b92673f69c8ee1ec7063967ab9b62bec' Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:MokListRT my key: Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'bedik002 module signing key: b1025ea690c4c8f9593b0a158045e72586a3c12f' Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:MokListRT Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' Aug 26 20:39:37 bedik002 kernel: fb0: switching to inteldrmfb from EFI VGA Aug 26 20:39:37 bedik002 kernel: EFI Variables Facility v0.08 2004-May-17 Aug 26 20:39:37 bedik002 kernel: pstore: Registered efi as persistent store backend Aug 26 20:39:38 bedik002 systemd[1]: Mounting /boot/efi... Aug 26 20:39:38 bedik002 systemd[1]: Mounted /boot/efi. Aug 26 20:39:42 bedik002 systemd[1201]: Listening on GnuPG network certificate management daemon. Aug 26 20:39:55 bedik002 systemd[1546]: Listening on GnuPG network certificate management daemon. ------------------------------- -- Package-specific info: ** Version: Linux version 5.2.0-2-amd64 ([email protected]) (gcc version 8.3.0 (Debian 8.3.0-21)) #1 SMP Debian 5.2.9-2 (2019-08-21) ** Command line: BOOT_IMAGE=/vmlinuz-5.2.0-2-amd64 root=/dev/mapper/sda_crypted ro rootflags=subvol=btroot systemd.show_status=1 quiet quiet ** Not tainted ** Kernel log: Unable to read kernel log; any relevant messages should be attached ** Model information sys_vendor: HP product_name: HP Pavilion Laptop 14-bk0xx product_version: Type1ProductConfigId chassis_vendor: HP chassis_version: Chassis Version bios_vendor: Insyde bios_version: F.18 board_vendor: HP board_name: 8362 board_version: 46.24 ** Loaded modules: nft_limit bnep nft_reject_ipv6 nf_reject_ipv6 nft_reject fuse nft_ct nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables_set nft_counter nf_tables nfnetlink nls_ascii nls_cp437 vfat fat ext4 mbcache jbd2 crc32c_generic snd_soc_skl snd_soc_skl_ipc snd_hda_codec_hdmi snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_realtek intel_rapl snd_hda_codec_generic ledtrig_audio snd_soc_core snd_compress x86_pkg_temp_thermal intel_powerclamp coretemp snd_hda_intel btusb btrtl btbcm btintel kvm_intel bluetooth snd_hda_codec snd_hda_core uvcvideo iwlwifi snd_hwdep kvm snd_pcm videobuf2_vmalloc joydev videobuf2_memops irqbypass videobuf2_v4l2 snd_timer videobuf2_common efi_pstore intel_cstate cfg80211 videodev intel_uncore drbg media serio_raw wmi_bmof pcspkr intel_rapl_perf hp_wmi ansi_cprng sparse_keymap efivars snd ecdh_generic iTCO_wdt iTCO_vendor_support elan_i2c ecc mei_me watchdog rfkill soundcore crc16 sg mei processor_thermal_device intel_pch_thermal intel_soc_dts_iosf battery tpm_crb hp_accel int3403_thermal tpm_tis int340x_thermal_zone pcc_cpufreq tpm_tis_core lis3lv02d tpm input_polldev hp_wireless rng_core evdev ac int3400_thermal acpi_thermal_rel acpi_pad sha512_ssse3 sunrpc sha512_generic efivarfs ip_tables x_tables autofs4 btrfs xor zstd_decompress zstd_compress raid6_pq libcrc32c dm_crypt dm_mod sd_mod crct10dif_pclmul crc32_pclmul i915 crc32c_intel ghash_clmulni_intel i2c_algo_bit aesni_intel drm_kms_helper xhci_pci xhci_hcd ahci libahci aes_x86_64 crypto_simd cryptd r8169 libata psmouse glue_helper usbcore drm i2c_i801 scsi_mod realtek libphy usb_common wmi video button -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.2.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-5.2.0-2-amd64 depends on: ii initramfs-tools [linux-initramfs-tool] 0.135 ii kmod 26-1 ii linux-base 4.6 Versions of packages linux-image-5.2.0-2-amd64 recommends: ii apparmor 2.13.3-4 ii firmware-linux-free 3.4 Versions of packages linux-image-5.2.0-2-amd64 suggests: pn debian-kernel-handbook <none> ii grub-efi-amd64 2.04-2 pn linux-doc-5.2 <none> Versions of packages linux-image-5.2.0-2-amd64 is related to: pn firmware-amd-graphics <none> pn firmware-atheros <none> pn firmware-bnx2 <none> pn firmware-bnx2x <none> pn firmware-brcm80211 <none> pn firmware-cavium <none> pn firmware-intel-sound <none> pn firmware-intelwimax <none> pn firmware-ipw2x00 <none> pn firmware-ivtv <none> pn firmware-iwlwifi <none> pn firmware-libertas <none> pn firmware-linux-nonfree <none> pn firmware-misc-nonfree <none> pn firmware-myricom <none> pn firmware-netxen <none> pn firmware-qlogic <none> pn firmware-realtek <none> pn firmware-samsung <none> pn firmware-siano <none> pn firmware-ti-connectivity <none> pn xen-hypervisor <none> -- no debconf information
--- End Message ---
--- Begin Message ---Source: linux Source-Version: 5.3.7-1 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <[email protected]> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 20 Oct 2019 00:56:32 +0200 Binary: linux-doc linux-doc-5.3 linux-headers-5.3.0-1-common linux-source linux-source-5.3 linux-support-5.3.0-1 Source: linux Architecture: all source Version: 5.3.7-1 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team <[email protected]> Changed-By: Salvatore Bonaccorso <[email protected]> Closes: 935945 940530 940726 Description: linux-doc - Linux kernel specific documentation (meta-package) linux-doc-5.3 - Linux kernel specific documentation for version 5.3 linux-headers-5.3.0-1-common - Common header files for Linux 5.3.0-1 linux-source - Linux kernel source (meta-package) linux-source-5.3 - Linux kernel source for version 5.3 with Debian patches linux-support-5.3.0-1 - Support files for Linux 5.3 Changes: linux (5.3.7-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.3 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 - mISDN: enforce CAP_NET_RAW for raw sockets (CVE-2019-17055) - appletalk: enforce CAP_NET_RAW for raw sockets (CVE-2019-17054) - ax25: enforce CAP_NET_RAW for raw sockets (CVE-2019-17052) - ieee802154: enforce CAP_NET_RAW for raw sockets (CVE-2019-17053) - nfc: enforce CAP_NET_RAW for raw sockets (CVE-2019-17056) https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6 - nl80211: validate beacon head (CVE-2019-16746) https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 . [ Aurelien Jarno ] * [riscv64] Enable SOC_SIFIVE. Do not select CLK_SIFIVE, CLK_SIFIVE_FU540_PRCI, SIFIVE_PLIC, SERIAL_SIFIVE and SERIAL_SIFIVE_CONSOLE as they are selected by SOC_SIFIVE. * [riscv64] Install DTBS using dtbs_install target. * [riscv64] Enable SPI_SIFIVE. * [riscv64] Enable SERIAL_EARLYCON_RISCV_SBI. * [riscv64] Enable MMC, MMC_SPI. * [riscv64] udeb: Add mmc-core-modules and mmc-modules. * [riscv64] Fix memblock reservation for device tree blob. * [riscv64] Clear load reservations while restoring hart contexts. . [ Ben Hutchings ] * [mips*] Revert "Only define MAX_PHYSMEM_BITS on Loongson-3" * KEYS: Re-enable SECONDARY_TRUSTED_KEYRING, dropped in 5.2.6-1 by mis-merge (Closes: #935945) . [ John Paul Adrian Glaubitz ] * [m68k] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS * [hppa] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS * [sh4] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS . [ Salvatore Bonaccorso ] * RDMA/cxgb4: Do not dma memory off of the stack (CVE-2019-17075) * ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe() (CVE-2019-15098) . [ Romain Perier ] * [armel/rpi] Enable CONFIG_BRCMFMAC_SDIO (Closes: #940530) . [ Héctor Orón Martínez ] * [x86] Enable ASoC: SOF sound driver (Closes: #940726) Checksums-Sha1: dd39fa2e65c62ec7c17add4d1578bbbff0429bd3 197683 linux_5.3.7-1.dsc 45d9f10d69dceefafb5e9d1e29ad3e6e58bb96ff 112780220 linux_5.3.7.orig.tar.xz ca48db4fb3ff8e40daf4b8dbdfaa598e92f673b5 1161944 linux_5.3.7-1.debian.tar.xz 71a522cf99e7872587c484cb2722bc2a08c4c5ad 48127 linux_5.3.7-1_source.buildinfo 45a3592576cd34f2c145fec7cf078ee303eb0314 23082928 linux-doc-5.3_5.3.7-1_all.deb 5b297e8a819ae1e44c9c3ab779b492c25d76b642 916 linux-doc_5.3.7-1_all.deb 86212659324eaf57c5a595e3b5efda1705ced0f4 8241652 linux-headers-5.3.0-1-common_5.3.7-1_all.deb 5d01961c534b93f080166348857e291c466eeca8 111565576 linux-source-5.3_5.3.7-1_all.deb b1f295b76ee1f3036bef1e2e250ba22142fa0a09 912 linux-source_5.3.7-1_all.deb f8d8f14538bfcb93dbc2ddda3b4595d5c3c1a90d 83344 linux-support-5.3.0-1_5.3.7-1_all.deb ad6e953567931073c23451652ceb12cec45789cc 53027 linux_5.3.7-1_all.buildinfo Checksums-Sha256: f725294a5feb858139b883e06173869822e13f3946416d0c2c59c40b05e34348 197683 linux_5.3.7-1.dsc 8a020a6770a87aa332be1f2cbf419b99b6c33bb578a27a91bea1011ec7ea860a 112780220 linux_5.3.7.orig.tar.xz ce04f29431a3a8fb6cb17f6c2cdce6201130c99c24cd7e1ba0198f4334352de6 1161944 linux_5.3.7-1.debian.tar.xz b48149c4befeda3f341dbe046efdb49e83434779a4109a7646d5984aa9fe8fcf 48127 linux_5.3.7-1_source.buildinfo b10f9939021844b5556f84fba3713aa830020892d857c452e407b76aa7f7334d 23082928 linux-doc-5.3_5.3.7-1_all.deb 9d05cb498d530c8aab18d70784fdda212a16a90c5be5bed87d4dca2abd7a3c20 916 linux-doc_5.3.7-1_all.deb 8308c4de8557bfc5f5aacd4103b5c0a40e57c3f9e5f22a11d9e6681d813e6cae 8241652 linux-headers-5.3.0-1-common_5.3.7-1_all.deb 6ad099c99fe4b90dd65f0e75270fbca1e80ac4964a3a41afd58ab5f436d95f3e 111565576 linux-source-5.3_5.3.7-1_all.deb fbf230a975ff9578713066afc2a2ae1382ae47ad1b3045a042d7ff9ab33b30a1 912 linux-source_5.3.7-1_all.deb e38b36003e5de24817cf02b59cd7a125cfebbb0f09629087f25df1416fca8e3f 83344 linux-support-5.3.0-1_5.3.7-1_all.deb 8b7276033768df6531c0394b758319a9784261121b4382be1ca16bd47f77fbe8 53027 linux_5.3.7-1_all.buildinfo Files: 224ae06dcf067d07244098801e5e6e50 197683 kernel optional linux_5.3.7-1.dsc 0c287d56961660bf8c8e22a552ce3f24 112780220 kernel optional linux_5.3.7.orig.tar.xz d0372e61ee173e29920e571ca37298e3 1161944 kernel optional linux_5.3.7-1.debian.tar.xz 20071d3bfe471705adc486dced8e64a5 48127 kernel optional linux_5.3.7-1_source.buildinfo 8bbb3c27f0b062f027cf82197f25b165 23082928 doc optional linux-doc-5.3_5.3.7-1_all.deb f09b6031409c84585c75241f9c429aa4 916 doc optional linux-doc_5.3.7-1_all.deb b6cbc2cee8cbe6fa16d6cbecc6c8d909 8241652 kernel optional linux-headers-5.3.0-1-common_5.3.7-1_all.deb 1f29f7ab89f6eac21cc948101b2a105d 111565576 kernel optional linux-source-5.3_5.3.7-1_all.deb 190dbee7f69bd31fe636929d1debb758 912 kernel optional linux-source_5.3.7-1_all.deb 8c4918bc0b4c324acc9a4c5cff3c06f9 83344 devel optional linux-support-5.3.0-1_5.3.7-1_all.deb de597c307bb08c7012faab98c841aa31 53027 kernel optional linux_5.3.7-1_all.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl2sqVNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89ETysP/0JnTG3SxUF0Es5xIzyVPWUlD233kVFe O9kP29f7nZW0ltFptAcdX6vTUmnPCjhVMbIwL2Y97EAxgK5mkttG/6AVPsy2cL50 3inrvppu1UiBJ1wgdZ6+XXlOIfbithTkjqtZxt1rx72xJfnPeGFSek/3729yMewP +sG+VLVDIymx338KEYueq85XckxWtbYZ5z+eJfSaHum/cjSj1Xai6yCVK2+2Adlt 6H849i1E4Pqz/ua8BWMlBChIKxlp2mt5eQgglgI5h6seQOs01gdSIqo5SnWH1UBS XpGV8OLyjAVAyMopNqhZXcO6H+Oj2PdW35MQH37Yn0tqgWA3M+U+ceRJmwr4i12r pL444KJgTsrMJaNecEoNjLzd9GwZFc6MYQEczT7mRmswghKsd1ItEFCjYLCfOU+F 2HhzNixrXUa5ZaqkN1U51Lvm9rXRS+PL5zCUopg2mC3/KdgvmM/C8tbiUSrDBQSv g/MzzlrMOjUujbwQGnv+h4jEiBT2fd9mdM2gU9DN1+U3pc/t9RA0eP/cC6++WrKx yTr0DAgaz/TIrs8aVsP7XIJhCrsIf8RUBiT1M8n4Sz2i3p1bQymz67Ww/7zRnzDb +svbF+DmZZ8VaqddSY0uP3spyMiM/5PgWtVqx/c+neUVbPKuYx31OkaYwFziJ5gp UoFliekSmX2C =jbPc -----END PGP SIGNATURE-----
--- End Message ---

