linux-signed-arm64_6.7.9+2_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 13 Mar 2024 12:13:41 +0100 Source: linux-signed-arm64 Architecture: source Version: 6.7.9+2 Distribution: sid Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-arm64 (6.7.9+2) unstable; urgency=high . * Sign kernel from linux 6.7.9-2 . * [x86] Mitigate Register File Data Sampling (RFDS) vulnerability (CVE-2023-28746): - x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set - Documentation/hw-vuln: Add documentation for RFDS - x86/rfds: Mitigate Register File Data Sampling (RFDS) - KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests Checksums-Sha1: a7bdbae9af5f0a8706258bdf6665c7539b8461d4 9926 linux-signed-arm64_6.7.9+2.dsc e3e36c5e1cec9ca323a7307296713dad4c8da1d8 599700 linux-signed-arm64_6.7.9+2.tar.xz Checksums-Sha256: a4f5d972918adbe7f44f70865a59fd5c0e743998a00da4d29ca029fabbea665a 9926 linux-signed-arm64_6.7.9+2.dsc 4c85c73bf57bee5902799d9bcb47daf9858fee31f3c553c4b5669a6e2fde1207 599700 linux-signed-arm64_6.7.9+2.tar.xz Files: c0cbd87265462b45da6c8b7e06f18736 9926 kernel optional linux-signed-arm64_6.7.9+2.dsc 0a5f814ef22d030ec624a28dd68a9626 599700 kernel optional linux-signed-arm64_6.7.9+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmXyGUsACgkQi0FRiLdO NzZAUhAArt6yaGXalt8mMf9xW1lMMxw5Sv+H0A4jdK84+dJ8KwsrfthipvINwX4C XzLsEe9Kjj8GTnKwtBYRnk6Otc8H+Fu4jFJoZ+CPc6NSl4Dq9asrGNFuKrn4vGX1 p/D++uJV89Q8EurmA0fp6Kasjlbuw93eqCauIodSATuuvtyt7eTg0uAaAUlx/nmX whpV2baM7lTODEHlvPx19IFJba9MhS66pW4l/tK2i8HqbhA5fW4nk/elatBj/Amo MWPqUoyMkrYIzqdDypKhD6hgbMADwPtB0I2M9d9nSc+QbeyC3Fs5MxZnCcDbIvS9 DCssfF454vGRNN/Mlr+HT4il5aZGTQZ2g4rkOWTd/1oJ+Mdq79qxAcMAEAGThyiv /KcINxKspV0H+0gj61A6FxzuQvkP9V5p3fndxcK3qU5sdiKF3VVa8LRhsspE/ICU YOLqEx9TqxB0Z23Shw7hnIWdhwNFf3c0kF9KB+6Po7MYBBpIJK8rs4p4lm1H+GF6 4HG8EvmebQaMdNVxwA7YI2ZiZgvlj3QNL5nmZvjIkZAxkmTzqryf8rDz5xGOTCjz FTMOuvqk7sG4TxyRiIscW1ts1cpxeh9HIkRZaISue/qcy7JLZvSN3oSbF9bWNIqd RK+EAp5fAc82LPTn/QyVOOakA0u7IrPY7ci1RpR6Ak0rN2YkTCw= =sf/q -END PGP SIGNATURE- pgpeIkIlcSwfu.pgp Description: PGP signature
linux-signed-arm64_6.1.76+1~bpo11+1_source.changes is NEW
binary:ata-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:btrfs-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:cdrom-core-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:crc-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:crypto-dm-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:crypto-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:efi-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:event-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:ext4-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:f2fs-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:fat-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:fb-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:fuse-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:i2c-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:input-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:isofs-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:jfs-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:kernel-image-6.1.0-0.deb11.18-arm64-di is NEW. binary:leds-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:linux-image-6.1.0-0.deb11.18-arm64 is NEW. binary:linux-image-6.1.0-0.deb11.18-cloud-arm64 is NEW. binary:linux-image-6.1.0-0.deb11.18-rt-arm64 is NEW. binary:loop-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:md-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:mmc-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:mtd-core-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:multipath-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:nbd-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:nic-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:nic-shared-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:nic-usb-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:nic-wireless-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:ppp-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:sata-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:scsi-core-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:scsi-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:scsi-nic-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:sound-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:speakup-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:squashfs-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:udf-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:uinput-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:usb-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:usb-serial-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:usb-storage-modules-6.1.0-0.deb11.18-arm64-di is NEW. binary:xfs-modules-6.1.0-0.deb11.18-arm64-di is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports pgpzyJY2UyNqR.pgp Description: PGP signature
Processing of linux-signed-arm64_6.7.9+2_source.changes
linux-signed-arm64_6.7.9+2_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_6.7.9+2.dsc linux-signed-arm64_6.7.9+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processing of linux-signed-arm64_6.1.76+1~bpo11+1_source.changes
linux-signed-arm64_6.1.76+1~bpo11+1_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_6.1.76+1~bpo11+1.dsc linux-signed-arm64_6.1.76+1~bpo11+1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1066803: linux-image-6.1.0-18-amd64: keyboard is not detected after most recent security patch
Package: src:linux Version: 6.1.76-1 Severity: critical Justification: breaks the whole system X-Debbugs-Cc: blasc...@hep.itp.tuwien.ac.at Dear Maintainer, after the latest security patch in debian stable (kernel version 6.1.0-18) the keyboard on my dell xps 13 (2015 model) no longer works (therefore I'm writing this bug report after booting into previous kernel 6.1.0-17 which works fine). Right after installing and rebooting the newer kernel, the keyboard did work briefly but then stopped after a standby cycle (together with the touchpad but the latter came back after another standby cycle allowing me to gracefully reboot); I've been using the older kernel since. When I tried to write this bug report from the newer kernel just now, I could not get the keyboard to work at all (only in the previous kernel). Thanks, Daniel -- Package-specific info: ** Kernel log: boot messages should be attached ** Model information sys_vendor: Dell Inc. product_name: XPS 13 9343 product_version: chassis_vendor: Dell Inc. chassis_version: bios_vendor: Dell Inc. bios_version: A18 board_vendor: Dell Inc. board_name: 0TM99H board_version: A00 ** PCI devices: 00:00.0 Host bridge [0600]: Intel Corporation Broadwell-U Host Bridge -OPI [8086:1604] (rev 09) Subsystem: Dell Broadwell-U Host Bridge -OPI [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: bdw_uncore 00:02.0 VGA compatible controller [0300]: Intel Corporation HD Graphics 5500 [8086:1616] (rev 09) (prog-if 00 [VGA controller]) DeviceName: Onboard IGD Subsystem: Dell HD Graphics 5500 [1028:0665] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: i915 Kernel modules: i915 00:03.0 Audio device [0403]: Intel Corporation Broadwell-U Audio Controller [8086:160c] (rev 09) Subsystem: Dell Broadwell-U Audio Controller [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: snd_hda_intel Kernel modules: snd_hda_intel 00:04.0 Signal processing controller [1180]: Intel Corporation Broadwell-U Processor Thermal Subsystem [8086:1603] (rev 09) Subsystem: Dell Broadwell-U Processor Thermal Subsystem [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: proc_thermal Kernel modules: processor_thermal_device_pci_legacy 00:14.0 USB controller [0c03]: Intel Corporation Wildcat Point-LP USB xHCI Controller [8086:9cb1] (rev 03) (prog-if 30 [XHCI]) Subsystem: Dell Wildcat Point-LP USB xHCI Controller [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- SERR- Kernel driver in use: xhci_hcd Kernel modules: xhci_pci 00:16.0 Communication controller [0780]: Intel Corporation Wildcat Point-LP MEI Controller #1 [8086:9cba] (rev 03) Subsystem: Dell Wildcat Point-LP MEI Controller [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: mei_me Kernel modules: mei_me 00:1b.0 Audio device [0403]: Intel Corporation Wildcat Point-LP High Definition Audio Controller [8086:9ca0] (rev 03) Subsystem: Dell Wildcat Point-LP High Definition Audio Controller [1028:0665] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: snd_hda_intel Kernel modules: snd_hda_intel 00:1c.0 PCI bridge [0604]: Intel Corporation Wildcat Point-LP PCI Express Root Port #1 [8086:9c90] (rev e3) (prog-if 00 [Normal decode]) Subsystem: Dell Wildcat Point-LP PCI Express Root Port [1028:0665] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B- PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn- Capabilities: Kernel driver in use: pcieport 00:1c.3 PCI bridge [0604]: Intel Corporation Wildcat Point-LP PCI Express Root Port #4 [8086:9c96]
Re: Offer help on initramfs-tools
On Wed, 2024-03-13 at 12:34 +0100, Michael Prokop wrote: > Hi! > > * Benjamin Drung [Wed Mar 06, 2024 at 11:45:38AM +0100]: > > > initramfs-tools hasn't seen an upload since 2022-07-12 and has several > > open merge requests without response. Since I am maintaining initramfs- > > tools in Ubuntu, I offer my help on initramfs-tools in Debian. In case I > > became uploader, I would merge the fixes and uncontroversial changes and > > cut a release. > > For various reasons I am personally no longer really active in > initramfs-tools (i-t) development, but since nobody else responded > to you yet: thanks for your work and efforts and reaching out, *I* > think any contributions and work around i-t are more than welcome. > Thanks. Then I request to get access to the initramfs-tools git repository on Salsa to start contributing. > > One change that we did in Ubuntu recently is using dracut-install which > > speeds up the initramfs generation a lot: > > https://launchpad.net/bugs/2031185 > > Do you want to have that in Debian as well? > > Sounds great to me! :) Okay. Then I will work on merging this change. -- Benjamin Drung Debian & Ubuntu Developer
linux_6.7.9-2_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 13 Mar 2024 12:13:41 +0100 Source: linux Architecture: source Version: 6.7.9-2 Distribution: unstable Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux (6.7.9-2) unstable; urgency=high . * [x86] Mitigate Register File Data Sampling (RFDS) vulnerability (CVE-2023-28746): - x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set - Documentation/hw-vuln: Add documentation for RFDS - x86/rfds: Mitigate Register File Data Sampling (RFDS) - KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests Checksums-Sha1: 7eebb8bec38e74ef0f734aa42825c320b83c1d70 229550 linux_6.7.9-2.dsc 023662b88d5bc9a0c285cbb1697d7e5ad40cf52e 1521672 linux_6.7.9-2.debian.tar.xz fceaad939d040e53ece8e5e5b03f402d7bab55f4 7360 linux_6.7.9-2_source.buildinfo Checksums-Sha256: f6f69c5ea00e9f42d1f8f40a8fa79c4cf3d29716a7e7d971d35c7ee61d1ae0b6 229550 linux_6.7.9-2.dsc 7e269595dfb38557dac7d8a8e27ad567f5ab53f2facb51cd839d42fd5674 1521672 linux_6.7.9-2.debian.tar.xz bd6da7ceb32cbc89ea062bed77bed4a7c2590e2a97f219cc13a9c3d592b4692b 7360 linux_6.7.9-2_source.buildinfo Files: e4cc560291c447d6d9d996c071c49bee 229550 kernel optional linux_6.7.9-2.dsc a44d008491b43e95587bc66346cee18b 1521672 kernel optional linux_6.7.9-2.debian.tar.xz f19c0ad17a903d6a48eec006fce91fbe 7360 kernel optional linux_6.7.9-2_source.buildinfo -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmXxi7RfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89Ec2EP/jWklhwgyh49MoEP5NBGAGaOu7VZrmJm 6xoHT+WWuqfoGwU1x50sIiUZ5FH/rLERBN/2r1cSkOMkZiwtOat10AWppeUoGB9n P7fzG1SsusMUU56A+CV3J6u6E9VzZAHF8/JTTlukIdqMkg75gvNW3Ca7JevjgNLJ VkWy6zD/A3379SS0Feuc1llbH6oG0XFzmDz+ZahI5BOAQjkxtXLV6O7Z004zG0rG bgG2BjWJFn4n5FzKfjr9+LlHnL92OxtRItKpcazShK0iOvOdzJC+lAcDQc6AO6vD tKQcdOx/eE9RevXtIJ8zORsksUsqcxYw4Uve9sQ9IJB5AZIDUhN9nV4Rzn0dhv+M Wl/BIQuhL+Qhy8+0DSm3LIIa4eSCw1RpK3uIhNd/O+yUbfKz5P1Vyys3y5Pm/t4x KipJjgJbooyjUMsqWPtZCBJM+iK2IqsFVYHsBqNGGD9YUmOMQrvEUf9yuY4QLQgZ KPHUWYNngfUV24XVh2x+kByK843sDW01UxcPKPVKxGG7dPACw8NsiFJk5ySYp7an UZgKrbdtnLGNZXFYb/7cLHh7f3qu01mnmcy43SIywHmNMQGx7z/W7ugkZgfRprGT 8NhhWhUiS7r8ZfesBiDhATrkYWnFDxcY6KlcL2YdJqwtbMea7nfNRHIzgu0PNamx fZSwNe6Cr4RI =iCMA -END PGP SIGNATURE- pgpjN0lvsb3Bf.pgp Description: PGP signature
Processing of linux_6.7.9-2_source.changes
linux_6.7.9-2_source.changes uploaded successfully to localhost along with the files: linux_6.7.9-2.dsc linux_6.7.9-2.debian.tar.xz linux_6.7.9-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Re: Offer help on initramfs-tools
Hi! * Benjamin Drung [Wed Mar 06, 2024 at 11:45:38AM +0100]: > initramfs-tools hasn't seen an upload since 2022-07-12 and has several > open merge requests without response. Since I am maintaining initramfs- > tools in Ubuntu, I offer my help on initramfs-tools in Debian. In case I > became uploader, I would merge the fixes and uncontroversial changes and > cut a release. For various reasons I am personally no longer really active in initramfs-tools (i-t) development, but since nobody else responded to you yet: thanks for your work and efforts and reaching out, *I* think any contributions and work around i-t are more than welcome. > One change that we did in Ubuntu recently is using dracut-install which > speeds up the initramfs generation a lot: > https://launchpad.net/bugs/2031185 > Do you want to have that in Debian as well? Sounds great to me! :) regards -mika- signature.asc Description: PGP signature
Bug#1062968: initramfs-tools-core: Use zstdmt instead of zstd by default
On Sun, 04 Feb 2024 09:15:42 +0100 Tollef Fog Heen wrote: > Package: initramfs-tools-core > Version: 0.142 > Severity: wishlist > > It would be nice if initramfs-tools-core used zstdmt (multi-threaded) > instead of plain zstd when creating the initramfs. On my system, that > saves about 15% of the time spent building the initramfs. > > The following change seems sufficient: > > --- /usr/sbin/mkinitramfs~2022-07-12 23:51:34.0 +0200 > +++ /usr/sbin/mkinitramfs 2024-02-04 09:09:07.614462279 +0100 > @@ -227,7 +227,7 @@ > fi > ;; > lz4) compress="lz4 ${compresslevel} -l" ;; > -zstd)compress="zstd -q ${compresslevel}" > +zstd)compress="zstdmt -q ${compresslevel}" > # If we're not doing a reproducible build, enable multithreading > test -z "${SOURCE_DATE_EPOCH}" && compress="$compress -T0" > ;; The man page of zstdmt says that is equivalent to "zstd -T0". As you can see from the code, -T0 is added in case not doing a reproducible build. So this change should have no performance impact. A test on a Raspberry Pi Zero 2 did not reveal any performance difference. -- Benjamin Drung Debian & Ubuntu Developer
Bug#1033663:
A correction for a mistake in my previous message: > Because Debian builds packages from a fixed build path, neither the > 'reprotest' > utility in Salsa-CI, nor the Reproducible Builds team's package test > infrastructure for Debian[1] currently check for equivalent binary package > output from differing source package build paths. > > This means that your package will pass current reproducibility tests; ... > [ snip ] Currently the 'reprotest' job in Salsa-CI does in fact continue to exercise variations of the build-path, and will fail if it builds binary packages that contain different contents as a result.
Uploading linux (6.7.9-2)
Hi While I realize there are much of changes going on unstable, I still would like to upload linux version (6.7.9-2) (yes no new upstream version) mitigating the Register File Data Sampling (RFDS) vulnerability (CVE-2023-28746). This goes along with a intel-microcode update which already was uploaded to unstable: https://tracker.debian.org/news/1511674/accepted-intel-microcode-3202403121-source-into-unstable/ * [x86] Mitigate Register File Data Sampling (RFDS) vulnerability (CVE-2023-28746): - x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set - Documentation/hw-vuln: Add documentation for RFDS - x86/rfds: Mitigate Register File Data Sampling (RFDS) - KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests Regards, Salvatore signature.asc Description: PGP signature
linux-signed-amd64_6.6.13+1~bpo12+1_source.changes ACCEPTED into stable-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 16 Feb 2024 00:12:17 +0100 Source: linux-signed-amd64 Architecture: source Version: 6.6.13+1~bpo12+1 Distribution: bookworm-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-amd64 (6.6.13+1~bpo12+1) bookworm-backports; urgency=medium . * Sign kernel from linux 6.6.13-1~bpo12+1 . * Rebuild for bookworm-backports Checksums-Sha1: 5dfd2dea6b1f40298876110a7d40ef9a97925ce7 11994 linux-signed-amd64_6.6.13+1~bpo12+1.dsc 996b68c0f7b1512bf7eac5a5b140905d73e6adc4 581688 linux-signed-amd64_6.6.13+1~bpo12+1.tar.xz Checksums-Sha256: 0ab88edf730c2e5da0e304510c51a125f256a9c7e03f71f86ef8443e71ae1d9e 11994 linux-signed-amd64_6.6.13+1~bpo12+1.dsc ccdafa0c2d3ff01bb4bad673d9834c568fbb4581052e7fd41cf3dfb881bc8cc1 581688 linux-signed-amd64_6.6.13+1~bpo12+1.tar.xz Files: e9a16e2d103976cc315384620073a986 11994 kernel optional linux-signed-amd64_6.6.13+1~bpo12+1.dsc 53e511416024ae4d7d51f595f8288959 581688 kernel optional linux-signed-amd64_6.6.13+1~bpo12+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmXkLokACgkQi0FRiLdO NzZCgQ/+LemIKjk5e7MboazAreBU0yt7M+C2D2FgAaVvJk43V3TfJ1KXGjx+McE6 uvhI5LTukaw2u+bX9RTq6hYTrs9AoII2FqEKN6IAtH/edSEThfTkhjUPTS53BCPn lEiytg1F6iJewyY9ERtngm0OSZtl3HIr4bZ8H4nfEuhAh/AtiGhZiLVz4CyeZ/7g X0RFEqe/WN99wx42lKFfKT4ytWL8+VmsySTIPyfmbpo3A+ww6uqY6JfxftCWd2EJ HhTCYvh7OIz2s7RL+8jbnc8n5AXxblnLdUg4ZDljrzEEFM/yuyV4yL3W16WY+xq4 bf1t2rvyDoJcPLsHqGLYyDMJNuVtu0oBQhp5PSciK6ZgI+DTY0Kfnvff77ot0YL7 yWjdZkVkY4mcEeLxSn7WKh5hN1zE/t+GgFOfF03oWgNEazcmB7bM12VWrE8Ar4vR MrFu/wiq+a558BVUqVz5Hpf89zoJ50VOziaO14usXwagzC48GZiqvVGGM632l7k9 aoDVlJzjqIcdDT9IKQ8SnkocvSOnnIV7OCcm9Od8p0ukz5Y6/gfp2A85Ow2WTttu cCCJcLKr+g5+Aijn5Ccw9IIQLXo9fB23gxYgVkNqGKF6Nipz5am664XPRxlQHG0+ xkIOvWeo0SXIKqD9dcZedTiQip/exBsYFeH/KtSDk/io4yXDWpg= =RBbH -END PGP SIGNATURE- pgpDGmN1VyWhx.pgp Description: PGP signature
linux_6.1.76-1~bpo11+1_source.changes ACCEPTED into bullseye-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 15 Feb 2024 22:27:12 + Source: linux Architecture: source Version: 6.1.76-1~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 1058887 1060005 Changes: linux (6.1.76-1~bpo11+1) bullseye-backports; urgency=medium . * Rebuild for bullseye-backports: - Set ABI to 0.deb11.18 . linux (6.1.76-1) bookworm; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.70 - bpf: Fix prog_array_map_poke_run map poke update - HID: i2c-hid: acpi: Unify ACPI ID tables format - HID: i2c-hid: Add IDEA5002 to i2c_hid_acpi_blacklist[] - drm/amd/display: fix hw rotated modes when PSR-SU is enabled - [armhf] OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init - reset: Fix crash when freeing non-existent optional resets - [s390x] vx: fix save/restore of fpu kernel context - wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock - wifi: mac80211: check if the existing link config remains unchanged - wifi: mac80211: mesh: check element parsing succeeded - wifi: mac80211: mesh_plink: fix matches_local logic - Revert "net/mlx5e: fix double free of encap_header in update funcs" - Revert "net/mlx5e: fix double free of encap_header" - net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() - net/mlx5: Introduce and use opcode getter in command interface - net/mlx5: Prevent high-rate FW commands from populating all slots - net/mlx5: Re-organize mlx5_cmd struct - net/mlx5e: Fix a race in command alloc flow - net/mlx5e: fix a potential double-free in fs_udp_create_groups - net/mlx5: Fix fw tracer first block check - net/mlx5e: Correct snprintf truncation handling for fw_version buffer - net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors - [arm64] net: mscc: ocelot: fix eMAC TX RMON stats for bucket 256-511 and above - net: Return error from sk_stream_wait_connect() if sk_wait_event() fails - net: sched: ife: fix potential use-after-free - ethernet: atheros: fix a memleak in atl1e_setup_ring_resources - net/rose: fix races in rose_kill_by_device() - Bluetooth: Fix deadlock in vhci_send_frame - Bluetooth: hci_event: shut up a false-positive warning - net: mana: select PAGE_POOL - net: check vlan filter feature in vlan_vids_add_by_dev() and vlan_vids_del_by_dev() - afs: Fix the dynamic root's d_delete to always delete unused dentries - afs: Fix dynamic root lookup DNS check - net: check dev->gso_max_size in gso_features_check() - keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry - afs: Fix overwriting of result of DNS query - afs: Fix use-after-free due to get/remove race in volume tree - [arm64,armhf] ASoC: hdmi-codec: fix missing report for jack initial status - [arm64] ASoC: fsl_sai: Fix channel swap issue on i.MX8MP - [armhf] i2c: aspeed: Handle the coalesced stop conditions with the start conditions. - gpiolib: cdev: add gpio_device locking wrapper around gpio_ioctl() - nvme-pci: fix sleeping function called from interrupt context - [x86] drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 - [x86] drm/i915: Relocate intel_atomic_setup_scalers() - [x86] drm/i915: Fix intel_atomic_setup_scalers() plane_state handling - [x86] drm/i915/dpt: Only do the POT stride remap when using DPT - [x86] drm/i915/mtl: Add MTL for remapping CCS FBs - [x86] drm/i915: Fix ADL+ tiled plane stride when the POT stride is smaller than the original - iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw - interconnect: qcom: sm8250: Enable sync_state - scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() - iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table - [armhf] iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() - iio: triggered-buffer: prevent possible freeing of wrong buffer - ALSA: usb-audio: Increase delay in MOTU M quirk - usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 - wifi: cfg80211: Add my certificate - wifi: cfg80211: fix certs build to not depend on file order - USB: serial: ftdi_sio: update Actisense PIDs constant names - USB: serial: option: add Quectel EG912Y module support - USB: serial: option: add Foxconn T99W265 with new baseline - USB: serial: option: add Quectel RM500Q R13 firmware support - ALSA: hda/realtek: Add quirk for ASUS ROG GV302XA - Bluetooth: hci_event: Fix not checking if
linux-signed-i386_6.1.69+1~bpo11+1_source.changes ACCEPTED into bullseye-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 05 Jan 2024 01:33:38 + Source: linux-signed-i386 Architecture: source Version: 6.1.69+1~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-i386 (6.1.69+1~bpo11+1) bullseye-backports; urgency=medium . * Sign kernel from linux 6.1.69-1~bpo11+1 . * Rebuild for bullseye-backports: - Set ABI to 0.deb11.17 Checksums-Sha1: 7b357822ed39e785cf38bcb05187ec341255626a 15843 linux-signed-i386_6.1.69+1~bpo11+1.dsc f36bc4d490d73f01065b5c0154280750e6227b3a 4007000 linux-signed-i386_6.1.69+1~bpo11+1.tar.xz Checksums-Sha256: b3b3b9cb4d1474cc4bac86bebdf0068e3c323876290c1d51930e95b00096afac 15843 linux-signed-i386_6.1.69+1~bpo11+1.dsc 2dd4d91bab55309260542ae3a22730cf72350bd5beb0dd8d0e266a11767aeb49 4007000 linux-signed-i386_6.1.69+1~bpo11+1.tar.xz Files: c64ad137f8041a9d7fdae7e25fd5b52f 15843 kernel optional linux-signed-i386_6.1.69+1~bpo11+1.dsc 493ba6f37b7ca93d89c27d05c9b5effe 4007000 kernel optional linux-signed-i386_6.1.69+1~bpo11+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmXHA+IACgkQi0FRiLdO Nza6Xw/+LlvND1ulQS8dJIh32+Nr1KxT60bFE2/sUD1ylG9Jc2tNZHQEn1n9rYoA eTl/jBt2iDSEPOG5zE6doJ+oFObHlCO48gnctR9Gb+WBQTA9+z+tZAqnfAsTElog +tA6EfKS9zioFJMtZ76GNxw3i+aPPnnkgfJm8eBJ2rfHEQrJen2Ya21XJlLq9qHV y9YXklvTjJPVFDYnUThrQoQLxjaq+EELPW9RgN0TtFtbKkoVq2aGyatcvZytO6u8 yjpdRXi7tmki04rZlL5fEj9Il6w3jyWc5/25+aN4Q0KxDAMzJZGvzgikC7ZPmUP7 XSq9qxMtRQUtJ/GC5Am+l2dYhC5hg2clezLcpXYQyOP/w1Dl0bCURFDcbYZCWo/9 AZPRtSsNox4SnXJPjq5r6EMPfmg6YbHXOsRAp0ByQoJESTe+au1J/CyUek+MRIF1 67rSMRnAlOXlK0OrQAFB76Q+HdU/+/2MK2cFKk+7/4tqN9RAWO6zahyMqKyzrjFc Kne+3W9yr4EJrpNaKOufe4Jjdkl1mxxwV3HGFfvJn+OUqHi7uqCW7az57ovS3M0i nLxn90lQjLxzCowACY91QhjhkJCYYUrjgbSM4X9Et8RISHWA+pv0K8vD/ROJP9+i lL9ZBqljffy38oz6+zfFGXZYIOESYVsgb7La2LebPs21YOK2J3k= =I3kx -END PGP SIGNATURE- pgpBrKzLlxJ8v.pgp Description: PGP signature
linux-signed-arm64_6.1.69+1~bpo11+1_source.changes ACCEPTED into bullseye-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 05 Jan 2024 01:33:38 + Source: linux-signed-arm64 Architecture: source Version: 6.1.69+1~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-arm64 (6.1.69+1~bpo11+1) bullseye-backports; urgency=medium . * Sign kernel from linux 6.1.69-1~bpo11+1 . * Rebuild for bullseye-backports: - Set ABI to 0.deb11.17 Checksums-Sha1: c868f66c183d6541393a01cdc33b693bb4facbbc 8288 linux-signed-arm64_6.1.69+1~bpo11+1.dsc 50366d83c18ac5ace08c1562140ba163e2741b26 2880440 linux-signed-arm64_6.1.69+1~bpo11+1.tar.xz Checksums-Sha256: eee1d086909e9bf2af791dad0cc66fde8566aab5a1c4f982b0777fafc303564e 8288 linux-signed-arm64_6.1.69+1~bpo11+1.dsc aeb03c20e52133b4a12ea1afe01185a9bf028994bff574351790c2bdd5fbd2f3 2880440 linux-signed-arm64_6.1.69+1~bpo11+1.tar.xz Files: 4e13d5120e31ca5fc94c97f6d7abd743 8288 kernel optional linux-signed-arm64_6.1.69+1~bpo11+1.dsc ed4d58b5bc16eefb65583c5c3e2a75e7 2880440 kernel optional linux-signed-arm64_6.1.69+1~bpo11+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmXG0CoACgkQi0FRiLdO NzbQrhAArN3GDbPX9KDQLp/2WVEwKVS3+xez0w6Nompi0hHRuVKJUL+T1okLI5Kx /TzRJsrsZlf9yfZHP0ldsgbNg7Bejrn44PpSvppIUNfyJvN+XOD8sX+fed99nlEl eutGQy56mwhsO8Lwi7FA5SpFnLezflx2e1djDKGWqcLjSqXFkDEhSfffyCquLAH2 xfxOVDEgf+mKth3f8TxQNfRtLpy3YkeNEp/pjMANDshqdvTOFRdeUMIwJfuhO7ON XyeMEVu2vhh5x/jS2s81Ne/blEcpcifLiV1fbut4gFk9DNItbuaCMIlD70wIOFgq +46mqmJ3X3TG5+FLx2ISeliBIyS6Qy1wwP7+IuXA2s5o3DMDjYpjhqesrWDG7tb+ ViMESBLKIVUCEX9GJBQ8iBrWwLh4Y5cJGoyOJgIREp9Mk3K7dK6wz1q5MJwwW95r NSwCBU1Zs75sYPx+4+G8f4DjjIDQkEHRvbIt5hwg42M15Z0yg+8Z3EXUVAsIIT2V 6YeFETTJ0+/OHnMZxVHkBMWJBbM2Gr/MnZuMWs1KRnbc5cZnuLEShuy0Yw0RVSQf CMq+fJB7S1A2R0uivx8rNZt4Ie0cZNRh0s1KePKwGPyCg5HXdtkPmZsHS8Ek/jaQ 6PP0BqzrBJJMz15ABRe+Q/1LkAVhqmhEyzRd8IFQmsT58SExmis= =E64D -END PGP SIGNATURE- pgpHnaZo4ksKD.pgp Description: PGP signature
linux-signed-amd64_6.1.69+1~bpo11+1_source.changes ACCEPTED into bullseye-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 05 Jan 2024 01:33:38 + Source: linux-signed-amd64 Architecture: source Version: 6.1.69+1~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-amd64 (6.1.69+1~bpo11+1) bullseye-backports; urgency=medium . * Sign kernel from linux 6.1.69-1~bpo11+1 . * Rebuild for bullseye-backports: - Set ABI to 0.deb11.17 Checksums-Sha1: 80b12c330b75a72a847ca0476f2b803b9264fcdf 9458 linux-signed-amd64_6.1.69+1~bpo11+1.dsc 7dc4d78eac8489f8ca67fbb01506d92e29553753 3102568 linux-signed-amd64_6.1.69+1~bpo11+1.tar.xz Checksums-Sha256: 2b4d70314815f9ff948c4227dfaa0778e738e5c7f54f0aea4b9c2a038d5bd4a5 9458 linux-signed-amd64_6.1.69+1~bpo11+1.dsc af4659d82f58ecfd30d0f0aec5a88931741845c142ca89da4e204a4c564e56d2 3102568 linux-signed-amd64_6.1.69+1~bpo11+1.tar.xz Files: b5d386a0caa8dd3dee1a2c28149c2fbb 9458 kernel optional linux-signed-amd64_6.1.69+1~bpo11+1.dsc 5da72cfd3d89dc202c6c6592148d62f5 3102568 kernel optional linux-signed-amd64_6.1.69+1~bpo11+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmXGrU8ACgkQi0FRiLdO Nzaq4RAAhA/tc2amPRKnie1eoFlAMdABRMkhOPfpQEbJxALY1D6kELPHf3KtO21W oI4DvjXosQguOA8ZcLeI//kG/oRzxCtg6LVcmK1IOhflRv8NS5Wq84/546fxytik ojAGUBaKVuaFstkSMdHZ78bLhBSlJMd2IEYeqN0zRMwHOjKw+gs0zZO/eDHdIcdE 2ob/MTn+r18B+pxl8lYco/8SVf/sK+ZC9PoRD7z0U2NIPDpzjJQByd3pmlGulITz 2FfkWfCnjF8m1J7WqmRNaaJacOoSnv7MR1vAn3odR4hIYaoqZMQrP5dCocB20TKy X7upXmWtJ4njrTvM3XP3Yj3I/QBtgpsniDCQX3IKAxLYczc5eqHF4emFDw/5AP7g 6WHlVtS96w0iulzY72rXrSLuTf2SHQYulD5Nwm+U7q1GArvuVC1mMg1OwWCBJQdY BPELKhOLdl+28P5F4olDxa2ASH+Kus1X9NckJXb8nbvfpE4yVmvuSJ6YtFxI8XGQ +sYBNStLJk21WqQfoaVWER+JQgp1aR/1714hz2uHK/6LDpF6ewtVrqRBGhJmh5DI 6lyEnQmUuZr2kdu/FESoPz4OBPUdNDYtwFNmeUsNTT5owjznMgBrjT9iBsMXK6Rv nxJltVQoN+WbmmcioOgQul6Apv4y8SGgCvNyt/1G6BhavDny2vs= =MXbT -END PGP SIGNATURE- pgpMD5tvie95p.pgp Description: PGP signature