Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Paul Wise
On Sat, 2023-09-09 at 11:42 +0200, Bastian Blank wrote:

> The first one is the one with included size limitations, because those
> load the kernel from a pre-defined flash partition, whose size can't be
> easily changed by the user.  This one is now overflowing for the second
> to last documented one in the kernel package config.

Seems like this would be solvable by writing a bootloader to the flash
partition that would be able to load Linux from a normal filesystem?

-- 
bye,
pabs

https://wiki.debian.org/PaulWise


signature.asc
Description: This is a digitally signed message part


linux-signed-i386_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.
binary:acpi-modules-6.1.0-12-686-di is NEW.
binary:acpi-modules-6.1.0-12-686-pae-di is NEW.
binary:ata-modules-6.1.0-12-686-di is NEW.
binary:ata-modules-6.1.0-12-686-pae-di is NEW.
binary:btrfs-modules-6.1.0-12-686-di is NEW.
binary:btrfs-modules-6.1.0-12-686-pae-di is NEW.
binary:cdrom-core-modules-6.1.0-12-686-di is NEW.
binary:cdrom-core-modules-6.1.0-12-686-pae-di is NEW.
binary:crc-modules-6.1.0-12-686-di is NEW.
binary:crc-modules-6.1.0-12-686-pae-di is NEW.
binary:crypto-dm-modules-6.1.0-12-686-di is NEW.
binary:crypto-dm-modules-6.1.0-12-686-pae-di is NEW.
binary:crypto-modules-6.1.0-12-686-di is NEW.
binary:crypto-modules-6.1.0-12-686-pae-di is NEW.
binary:efi-modules-6.1.0-12-686-di is NEW.
binary:efi-modules-6.1.0-12-686-pae-di is NEW.
binary:event-modules-6.1.0-12-686-di is NEW.
binary:event-modules-6.1.0-12-686-pae-di is NEW.
binary:ext4-modules-6.1.0-12-686-di is NEW.
binary:ext4-modules-6.1.0-12-686-pae-di is NEW.
binary:f2fs-modules-6.1.0-12-686-di is NEW.
binary:f2fs-modules-6.1.0-12-686-pae-di is NEW.
binary:fat-modules-6.1.0-12-686-di is NEW.
binary:fat-modules-6.1.0-12-686-pae-di is NEW.
binary:fb-modules-6.1.0-12-686-di is NEW.
binary:fb-modules-6.1.0-12-686-pae-di is NEW.
binary:firewire-core-modules-6.1.0-12-686-di is NEW.
binary:firewire-core-modules-6.1.0-12-686-pae-di is NEW.
binary:fuse-modules-6.1.0-12-686-di is NEW.
binary:fuse-modules-6.1.0-12-686-pae-di is NEW.
binary:i2c-modules-6.1.0-12-686-di is NEW.
binary:i2c-modules-6.1.0-12-686-pae-di is NEW.
binary:input-modules-6.1.0-12-686-di is NEW.
binary:input-modules-6.1.0-12-686-pae-di is NEW.
binary:isofs-modules-6.1.0-12-686-di is NEW.
binary:isofs-modules-6.1.0-12-686-pae-di is NEW.
binary:jfs-modules-6.1.0-12-686-di is NEW.
binary:jfs-modules-6.1.0-12-686-pae-di is NEW.
binary:kernel-image-6.1.0-12-686-di is NEW.
binary:kernel-image-6.1.0-12-686-pae-di is NEW.
binary:linux-image-6.1.0-12-686 is NEW.
binary:linux-image-6.1.0-12-686-pae is NEW.
binary:linux-image-6.1.0-12-rt-686-pae is NEW.
binary:loop-modules-6.1.0-12-686-di is NEW.
binary:loop-modules-6.1.0-12-686-pae-di is NEW.
binary:md-modules-6.1.0-12-686-di is NEW.
binary:md-modules-6.1.0-12-686-pae-di is NEW.
binary:mmc-core-modules-6.1.0-12-686-di is NEW.
binary:mmc-core-modules-6.1.0-12-686-pae-di is NEW.
binary:mmc-modules-6.1.0-12-686-di is NEW.
binary:mmc-modules-6.1.0-12-686-pae-di is NEW.
binary:mouse-modules-6.1.0-12-686-di is NEW.
binary:mouse-modules-6.1.0-12-686-pae-di is NEW.
binary:mtd-core-modules-6.1.0-12-686-di is NEW.
binary:mtd-core-modules-6.1.0-12-686-pae-di is NEW.
binary:multipath-modules-6.1.0-12-686-di is NEW.
binary:multipath-modules-6.1.0-12-686-pae-di is NEW.
binary:nbd-modules-6.1.0-12-686-di is NEW.
binary:nbd-modules-6.1.0-12-686-pae-di is NEW.
binary:nic-modules-6.1.0-12-686-di is NEW.
binary:nic-modules-6.1.0-12-686-pae-di is NEW.
binary:nic-pcmcia-modules-6.1.0-12-686-di is NEW.
binary:nic-pcmcia-modules-6.1.0-12-686-pae-di is NEW.
binary:nic-shared-modules-6.1.0-12-686-di is NEW.
binary:nic-shared-modules-6.1.0-12-686-pae-di is NEW.
binary:nic-usb-modules-6.1.0-12-686-di is NEW.
binary:nic-usb-modules-6.1.0-12-686-pae-di is NEW.
binary:nic-wireless-modules-6.1.0-12-686-di is NEW.
binary:nic-wireless-modules-6.1.0-12-686-pae-di is NEW.
binary:pata-modules-6.1.0-12-686-di is NEW.
binary:pata-modules-6.1.0-12-686-pae-di is NEW.
binary:pcmcia-modules-6.1.0-12-686-di is NEW.
binary:pcmcia-modules-6.1.0-12-686-pae-di is NEW.
binary:pcmcia-storage-modules-6.1.0-12-686-di is NEW.
binary:pcmcia-storage-modules-6.1.0-12-686-pae-di is NEW.
binary:ppp-modules-6.1.0-12-686-di is NEW.
binary:ppp-modules-6.1.0-12-686-pae-di is NEW.
binary:rfkill-modules-6.1.0-12-686-di is NEW.
binary:rfkill-modules-6.1.0-12-686-pae-di is NEW.
binary:sata-modules-6.1.0-12-686-di is NEW.
binary:sata-modules-6.1.0-12-686-pae-di is NEW.
binary:scsi-core-modules-6.1.0-12-686-di is NEW.
binary:scsi-core-modules-6.1.0-12-686-pae-di is NEW.
binary:scsi-modules-6.1.0-12-686-di is NEW.
binary:scsi-modules-6.1.0-12-686-pae-di is NEW.
binary:scsi-nic-modules-6.1.0-12-686-di is NEW.
binary:scsi-nic-modules-6.1.0-12-686-pae-di is NEW.
binary:serial-modules-6.1.0-12-686-di is NEW.
binary:serial-modules-6.1.0-12-686-pae-di is NEW.
binary:sound-modules-6.1.0-12-686-di is NEW.
binary:sound-modules-6.1.0-12-686-pae-di is NEW.
binary:speakup-modules-6.1.0-12-686-di is NEW.
binary:speakup-modules-6.1.0-12-686-pae-di is NEW.
binary:squashfs-modules-6.1.0-12-686-di is NEW.
binary:squashfs-modules-6.1.0-12-686-pae-di is NEW.
binary:udf-modules-6.1.0-12-686-di is NEW.
binary:udf-modules-6.1.0-12-686-pae-di is NEW.
binary:uinput-modules-6.1.0-12-686-di is NEW.
binary:uinput-modules-6.1.0-12-686-pae-di is NEW.
binary:usb-modules-6.1.0-12-686-di is NEW.
binary:usb-modules-6.1.0-12-686-pae-di is NEW.
binary:usb-serial-modules-6.1.0-12-686-di is NEW.
binary:usb-serial-modules-6.1.0-12-686-pae-di is NEW.
binary:usb-storage-modules-6.1.0-12-686-di is 

linux-signed-arm64_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.
binary:ata-modules-6.1.0-12-arm64-di is NEW.
binary:btrfs-modules-6.1.0-12-arm64-di is NEW.
binary:cdrom-core-modules-6.1.0-12-arm64-di is NEW.
binary:crc-modules-6.1.0-12-arm64-di is NEW.
binary:crypto-dm-modules-6.1.0-12-arm64-di is NEW.
binary:crypto-modules-6.1.0-12-arm64-di is NEW.
binary:efi-modules-6.1.0-12-arm64-di is NEW.
binary:event-modules-6.1.0-12-arm64-di is NEW.
binary:ext4-modules-6.1.0-12-arm64-di is NEW.
binary:f2fs-modules-6.1.0-12-arm64-di is NEW.
binary:fat-modules-6.1.0-12-arm64-di is NEW.
binary:fb-modules-6.1.0-12-arm64-di is NEW.
binary:fuse-modules-6.1.0-12-arm64-di is NEW.
binary:i2c-modules-6.1.0-12-arm64-di is NEW.
binary:input-modules-6.1.0-12-arm64-di is NEW.
binary:isofs-modules-6.1.0-12-arm64-di is NEW.
binary:jfs-modules-6.1.0-12-arm64-di is NEW.
binary:kernel-image-6.1.0-12-arm64-di is NEW.
binary:leds-modules-6.1.0-12-arm64-di is NEW.
binary:linux-image-6.1.0-12-arm64 is NEW.
binary:linux-image-6.1.0-12-cloud-arm64 is NEW.
binary:linux-image-6.1.0-12-rt-arm64 is NEW.
binary:loop-modules-6.1.0-12-arm64-di is NEW.
binary:md-modules-6.1.0-12-arm64-di is NEW.
binary:mmc-modules-6.1.0-12-arm64-di is NEW.
binary:mtd-core-modules-6.1.0-12-arm64-di is NEW.
binary:multipath-modules-6.1.0-12-arm64-di is NEW.
binary:nbd-modules-6.1.0-12-arm64-di is NEW.
binary:nic-modules-6.1.0-12-arm64-di is NEW.
binary:nic-shared-modules-6.1.0-12-arm64-di is NEW.
binary:nic-usb-modules-6.1.0-12-arm64-di is NEW.
binary:nic-wireless-modules-6.1.0-12-arm64-di is NEW.
binary:ppp-modules-6.1.0-12-arm64-di is NEW.
binary:sata-modules-6.1.0-12-arm64-di is NEW.
binary:scsi-core-modules-6.1.0-12-arm64-di is NEW.
binary:scsi-modules-6.1.0-12-arm64-di is NEW.
binary:scsi-nic-modules-6.1.0-12-arm64-di is NEW.
binary:sound-modules-6.1.0-12-arm64-di is NEW.
binary:speakup-modules-6.1.0-12-arm64-di is NEW.
binary:squashfs-modules-6.1.0-12-arm64-di is NEW.
binary:udf-modules-6.1.0-12-arm64-di is NEW.
binary:uinput-modules-6.1.0-12-arm64-di is NEW.
binary:usb-modules-6.1.0-12-arm64-di is NEW.
binary:usb-serial-modules-6.1.0-12-arm64-di is NEW.
binary:usb-storage-modules-6.1.0-12-arm64-di is NEW.
binary:xfs-modules-6.1.0-12-arm64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



linux-signed-amd64_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.
binary:acpi-modules-6.1.0-12-amd64-di is NEW.
binary:ata-modules-6.1.0-12-amd64-di is NEW.
binary:btrfs-modules-6.1.0-12-amd64-di is NEW.
binary:cdrom-core-modules-6.1.0-12-amd64-di is NEW.
binary:crc-modules-6.1.0-12-amd64-di is NEW.
binary:crypto-dm-modules-6.1.0-12-amd64-di is NEW.
binary:crypto-modules-6.1.0-12-amd64-di is NEW.
binary:efi-modules-6.1.0-12-amd64-di is NEW.
binary:event-modules-6.1.0-12-amd64-di is NEW.
binary:ext4-modules-6.1.0-12-amd64-di is NEW.
binary:f2fs-modules-6.1.0-12-amd64-di is NEW.
binary:fat-modules-6.1.0-12-amd64-di is NEW.
binary:fb-modules-6.1.0-12-amd64-di is NEW.
binary:firewire-core-modules-6.1.0-12-amd64-di is NEW.
binary:fuse-modules-6.1.0-12-amd64-di is NEW.
binary:i2c-modules-6.1.0-12-amd64-di is NEW.
binary:input-modules-6.1.0-12-amd64-di is NEW.
binary:isofs-modules-6.1.0-12-amd64-di is NEW.
binary:jfs-modules-6.1.0-12-amd64-di is NEW.
binary:kernel-image-6.1.0-12-amd64-di is NEW.
binary:linux-image-6.1.0-12-amd64 is NEW.
binary:linux-image-6.1.0-12-cloud-amd64 is NEW.
binary:linux-image-6.1.0-12-rt-amd64 is NEW.
binary:loop-modules-6.1.0-12-amd64-di is NEW.
binary:md-modules-6.1.0-12-amd64-di is NEW.
binary:mmc-core-modules-6.1.0-12-amd64-di is NEW.
binary:mmc-modules-6.1.0-12-amd64-di is NEW.
binary:mouse-modules-6.1.0-12-amd64-di is NEW.
binary:mtd-core-modules-6.1.0-12-amd64-di is NEW.
binary:multipath-modules-6.1.0-12-amd64-di is NEW.
binary:nbd-modules-6.1.0-12-amd64-di is NEW.
binary:nic-modules-6.1.0-12-amd64-di is NEW.
binary:nic-pcmcia-modules-6.1.0-12-amd64-di is NEW.
binary:nic-shared-modules-6.1.0-12-amd64-di is NEW.
binary:nic-usb-modules-6.1.0-12-amd64-di is NEW.
binary:nic-wireless-modules-6.1.0-12-amd64-di is NEW.
binary:pata-modules-6.1.0-12-amd64-di is NEW.
binary:pcmcia-modules-6.1.0-12-amd64-di is NEW.
binary:pcmcia-storage-modules-6.1.0-12-amd64-di is NEW.
binary:ppp-modules-6.1.0-12-amd64-di is NEW.
binary:rfkill-modules-6.1.0-12-amd64-di is NEW.
binary:sata-modules-6.1.0-12-amd64-di is NEW.
binary:scsi-core-modules-6.1.0-12-amd64-di is NEW.
binary:scsi-modules-6.1.0-12-amd64-di is NEW.
binary:scsi-nic-modules-6.1.0-12-amd64-di is NEW.
binary:serial-modules-6.1.0-12-amd64-di is NEW.
binary:sound-modules-6.1.0-12-amd64-di is NEW.
binary:speakup-modules-6.1.0-12-amd64-di is NEW.
binary:squashfs-modules-6.1.0-12-amd64-di is NEW.
binary:udf-modules-6.1.0-12-amd64-di is NEW.
binary:uinput-modules-6.1.0-12-amd64-di is NEW.
binary:usb-modules-6.1.0-12-amd64-di is NEW.
binary:usb-serial-modules-6.1.0-12-amd64-di is NEW.
binary:usb-storage-modules-6.1.0-12-amd64-di is NEW.
binary:xfs-modules-6.1.0-12-amd64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Bug#1051577: iproute2: obsolete conffiles

2023-09-09 Thread gregor herrmann
Package: iproute2
Version: 6.5.0-1
Severity: normal

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

After upgrading to 6.5.0-1 adequate shows:

adequate found packaging bugs
- -

iproute2: obsolete-conffile /etc/iproute2/rt_tables.d/README
iproute2: obsolete-conffile /etc/iproute2/rt_protos.d/README
iproute2: obsolete-conffile /etc/iproute2/rt_protos
iproute2: obsolete-conffile /etc/iproute2/rt_dsfield
iproute2: obsolete-conffile /etc/iproute2/nl_protos
iproute2: obsolete-conffile /etc/iproute2/ematch_map
iproute2: obsolete-conffile /etc/iproute2/bpf_pinning

Cf. dpkg-maintscript-helper(1) and dh_installdeb(1) / package.maintscript
/ rm_conffile.

Cheers,
gregor

-BEGIN PGP SIGNATURE-
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=dToJ
-END PGP SIGNATURE-



linux_6.1.52-1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.
binary:affs-modules-6.1.0-12-4kc-malta-di is NEW.
binary:affs-modules-6.1.0-12-5kc-malta-di is NEW.
binary:affs-modules-6.1.0-12-loongson-3-di is NEW.
binary:affs-modules-6.1.0-12-mips32r2el-di is NEW.
binary:affs-modules-6.1.0-12-mips64r2el-di is NEW.
binary:affs-modules-6.1.0-12-octeon-di is NEW.
binary:ata-modules-6.1.0-12-4kc-malta-di is NEW.
binary:ata-modules-6.1.0-12-5kc-malta-di is NEW.
binary:ata-modules-6.1.0-12-armmp-di is NEW.
binary:ata-modules-6.1.0-12-loongson-3-di is NEW.
binary:ata-modules-6.1.0-12-mips32r2el-di is NEW.
binary:ata-modules-6.1.0-12-mips64r2el-di is NEW.
binary:ata-modules-6.1.0-12-octeon-di is NEW.
binary:ata-modules-6.1.0-12-powerpc64le-di is NEW.
binary:btrfs-modules-6.1.0-12-4kc-malta-di is NEW.
binary:btrfs-modules-6.1.0-12-5kc-malta-di is NEW.
binary:btrfs-modules-6.1.0-12-armmp-di is NEW.
binary:btrfs-modules-6.1.0-12-loongson-3-di is NEW.
binary:btrfs-modules-6.1.0-12-marvell-di is NEW.
binary:btrfs-modules-6.1.0-12-mips32r2el-di is NEW.
binary:btrfs-modules-6.1.0-12-mips64r2el-di is NEW.
binary:btrfs-modules-6.1.0-12-octeon-di is NEW.
binary:btrfs-modules-6.1.0-12-powerpc64le-di is NEW.
binary:btrfs-modules-6.1.0-12-s390x-di is NEW.
binary:cdrom-core-modules-6.1.0-12-4kc-malta-di is NEW.
binary:cdrom-core-modules-6.1.0-12-5kc-malta-di is NEW.
binary:cdrom-core-modules-6.1.0-12-armmp-di is NEW.
binary:cdrom-core-modules-6.1.0-12-loongson-3-di is NEW.
binary:cdrom-core-modules-6.1.0-12-marvell-di is NEW.
binary:cdrom-core-modules-6.1.0-12-mips32r2el-di is NEW.
binary:cdrom-core-modules-6.1.0-12-mips64r2el-di is NEW.
binary:cdrom-core-modules-6.1.0-12-octeon-di is NEW.
binary:cdrom-core-modules-6.1.0-12-powerpc64le-di is NEW.
binary:cdrom-core-modules-6.1.0-12-s390x-di is NEW.
binary:crc-modules-6.1.0-12-4kc-malta-di is NEW.
binary:crc-modules-6.1.0-12-5kc-malta-di is NEW.
binary:crc-modules-6.1.0-12-armmp-di is NEW.
binary:crc-modules-6.1.0-12-loongson-3-di is NEW.
binary:crc-modules-6.1.0-12-marvell-di is NEW.
binary:crc-modules-6.1.0-12-mips32r2el-di is NEW.
binary:crc-modules-6.1.0-12-mips64r2el-di is NEW.
binary:crc-modules-6.1.0-12-octeon-di is NEW.
binary:crc-modules-6.1.0-12-powerpc64le-di is NEW.
binary:crc-modules-6.1.0-12-s390x-di is NEW.
binary:crypto-dm-modules-6.1.0-12-4kc-malta-di is NEW.
binary:crypto-dm-modules-6.1.0-12-5kc-malta-di is NEW.
binary:crypto-dm-modules-6.1.0-12-armmp-di is NEW.
binary:crypto-dm-modules-6.1.0-12-loongson-3-di is NEW.
binary:crypto-dm-modules-6.1.0-12-marvell-di is NEW.
binary:crypto-dm-modules-6.1.0-12-mips32r2el-di is NEW.
binary:crypto-dm-modules-6.1.0-12-mips64r2el-di is NEW.
binary:crypto-dm-modules-6.1.0-12-octeon-di is NEW.
binary:crypto-dm-modules-6.1.0-12-powerpc64le-di is NEW.
binary:crypto-dm-modules-6.1.0-12-s390x-di is NEW.
binary:crypto-modules-6.1.0-12-4kc-malta-di is NEW.
binary:crypto-modules-6.1.0-12-5kc-malta-di is NEW.
binary:crypto-modules-6.1.0-12-armmp-di is NEW.
binary:crypto-modules-6.1.0-12-loongson-3-di is NEW.
binary:crypto-modules-6.1.0-12-marvell-di is NEW.
binary:crypto-modules-6.1.0-12-mips32r2el-di is NEW.
binary:crypto-modules-6.1.0-12-mips64r2el-di is NEW.
binary:crypto-modules-6.1.0-12-octeon-di is NEW.
binary:crypto-modules-6.1.0-12-powerpc64le-di is NEW.
binary:crypto-modules-6.1.0-12-s390x-di is NEW.
binary:dasd-extra-modules-6.1.0-12-s390x-di is NEW.
binary:dasd-modules-6.1.0-12-s390x-di is NEW.
binary:efi-modules-6.1.0-12-armmp-di is NEW.
binary:event-modules-6.1.0-12-4kc-malta-di is NEW.
binary:event-modules-6.1.0-12-5kc-malta-di is NEW.
binary:event-modules-6.1.0-12-armmp-di is NEW.
binary:event-modules-6.1.0-12-loongson-3-di is NEW.
binary:event-modules-6.1.0-12-marvell-di is NEW.
binary:event-modules-6.1.0-12-mips32r2el-di is NEW.
binary:event-modules-6.1.0-12-mips64r2el-di is NEW.
binary:event-modules-6.1.0-12-octeon-di is NEW.
binary:event-modules-6.1.0-12-powerpc64le-di is NEW.
binary:ext4-modules-6.1.0-12-4kc-malta-di is NEW.
binary:ext4-modules-6.1.0-12-5kc-malta-di is NEW.
binary:ext4-modules-6.1.0-12-armmp-di is NEW.
binary:ext4-modules-6.1.0-12-loongson-3-di is NEW.
binary:ext4-modules-6.1.0-12-marvell-di is NEW.
binary:ext4-modules-6.1.0-12-mips32r2el-di is NEW.
binary:ext4-modules-6.1.0-12-mips64r2el-di is NEW.
binary:ext4-modules-6.1.0-12-octeon-di is NEW.
binary:ext4-modules-6.1.0-12-powerpc64le-di is NEW.
binary:ext4-modules-6.1.0-12-s390x-di is NEW.
binary:f2fs-modules-6.1.0-12-4kc-malta-di is NEW.
binary:f2fs-modules-6.1.0-12-5kc-malta-di is NEW.
binary:f2fs-modules-6.1.0-12-armmp-di is NEW.
binary:f2fs-modules-6.1.0-12-loongson-3-di is NEW.
binary:f2fs-modules-6.1.0-12-marvell-di is NEW.
binary:f2fs-modules-6.1.0-12-mips32r2el-di is NEW.
binary:f2fs-modules-6.1.0-12-mips64r2el-di is NEW.
binary:f2fs-modules-6.1.0-12-octeon-di is NEW.
binary:f2fs-modules-6.1.0-12-powerpc64le-di is NEW.
binary:f2fs-modules-6.1.0-12-s390x-di is NEW.
binary:fancontrol-modules-6.1.0-12-powerpc64le-di is NEW.

Processed: closing 1022159

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 1022159
Bug #1022159 [src:linux] bugs.debian.org: I upgraded to kernel 5.10.0-19 and 
Debian no longer works
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1022159: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022159
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1016874 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1016874 src:linux
Bug #1016874 [bugs.debian.org] bugs.debian.org: PC unable to boot after package 
update
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #1016874 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1016874 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1016874: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016874
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1022159 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1022159 src:linux
Bug #1022159 [bugs.debian.org] bugs.debian.org: I upgraded to kernel 5.10.0-19 
and Debian no longer works
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #1022159 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1022159 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1022159: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022159
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1024006 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1024006 src:linux
Bug #1024006 [bugs.debian.org] bugs.debian.org: Waking up from sleep causes 
laptop to irrecoverably freeze
Bug reassigned from package 'bugs.debian.org' to 'src:linux'.
Ignoring request to alter found versions of bug #1024006 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1024006 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1024006: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024006
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1041960 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1041960 src:linux
Bug #1041960 [linux] bugs.debian.org: Missing 'boot messages' between grub 
screen and desktop showing up.
Bug reassigned from package 'linux' to 'src:linux'.
Ignoring request to alter found versions of bug #1041960 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1041960 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1041960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041960
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1041960 to linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1041960 linux
Bug #1041960 [bugs.debian.org] bugs.debian.org: Missing 'boot messages' between 
grub screen and desktop showing up.
Bug reassigned from package 'bugs.debian.org' to 'linux'.
Ignoring request to alter found versions of bug #1041960 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1041960 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1041960: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041960
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



iproute2_6.5.0-1_source.changes ACCEPTED into unstable

2023-09-09 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 09 Sep 2023 16:32:54 +0100
Source: iproute2
Architecture: source
Version: 6.5.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Luca Boccassi 
Closes: 1050442
Changes:
 iproute2 (6.5.0-1) unstable; urgency=medium
 .
   [ Luca Boccassi ]
   * Use wildcard for Lintian overrides
 .
   [ Peter Kvillegård ]
   * Add Swedish translation of debconf messages (Closes: #1050442)
 .
   [ Luca Boccassi ]
   * Update upstream source from tag 'upstream/6.5.0'
   * Use cap_bpf instead of cap_sys_admin for ip vrf-exec
   * Package-provided config files are now shipped in /usr/iproute2 instead
 of /etc/iproute2
Checksums-Sha1:
 7fc3f84a96fc1abc08e91924d1dfc43dfa551871 2246 iproute2_6.5.0-1.dsc
 bfae322d5ac8949254b52ae77c992f8fdc953a35 925940 iproute2_6.5.0.orig.tar.xz
 60829054b14c13de4852fa04e0d8d41ff179a9ec 37524 iproute2_6.5.0-1.debian.tar.xz
 9c3652186e9d3119cf020070d39343e6b278e444 7519 iproute2_6.5.0-1_source.buildinfo
Checksums-Sha256:
 a30462a0872c663b81362f428b01b2cc64be213b9b463810e256c109b3e2 2246 
iproute2_6.5.0-1.dsc
 a70179085fa1b96d3c33b040c809b75e2b57563adc505a4ad05e2609df373463 925940 
iproute2_6.5.0.orig.tar.xz
 7341d923681d6856e5a695539840061ee6642d7f026950f0d522fc4b6ceae277 37524 
iproute2_6.5.0-1.debian.tar.xz
 b0ee5b4d6d5e3cf40305ce5cc8bcbcc6e72f1cef8684398fcb9295cfa940dd80 7519 
iproute2_6.5.0-1_source.buildinfo
Files:
 93bd20bc7016cf0958a4af0c13f38fee 2246 net optional iproute2_6.5.0-1.dsc
 ae811fc51b3a2c9c7701be308152c45a 925940 net optional iproute2_6.5.0.orig.tar.xz
 0424aadeba3275f40e1486fe987aee11 37524 net optional 
iproute2_6.5.0-1.debian.tar.xz
 993299359eafcacbd89d92f7d203 7519 net optional 
iproute2_6.5.0-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=DyaJ
-END PGP SIGNATURE-



Processing of iproute2_6.5.0-1_source.changes

2023-09-09 Thread Debian FTP Masters
iproute2_6.5.0-1_source.changes uploaded successfully to localhost
along with the files:
  iproute2_6.5.0-1.dsc
  iproute2_6.5.0.orig.tar.xz
  iproute2_6.5.0-1.debian.tar.xz
  iproute2_6.5.0-1_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1050442: marked as done (iproute2: [INTL:sv] Swedish translation of debconf messages)

2023-09-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Sep 2023 16:04:29 +
with message-id 
and subject line Bug#1050442: fixed in iproute2 6.5.0-1
has caused the Debian Bug report #1050442,
regarding iproute2: [INTL:sv] Swedish translation of debconf messages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050442: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050442
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: iproute2
Version: 6.4.0-1
Severity: wishlist
Tags: l10n patch
X-Debbugs-Cc: peterkvilleg...@posteo.net

Dear Maintainer,

Please copy the attachment into debian/po/sv.po
It's been reviewed by the Swedish translation team,
tested with msgfmt -c -v -o /dev/null sv.po, and is in UTF-8.

Regards,
Peter Kvillegård
# Swedish translation of iproute2 debconf messages
# Copyright (C) The iproute2 package copyright holders
# This file is distributed under the same license as the iproute2 package.
# Peter Kvillegård , 2023.
#
msgid ""
msgstr ""
"Project-Id-Version: iproute2 6.4.0-1\n"
"Report-Msgid-Bugs-To: iprou...@packages.debian.org\n"
"POT-Creation-Date: 2018-04-12 12:01+0100\n"
"PO-Revision-Date: 2023-08-21 19:02+0200\n"
"Last-Translator: Peter Kvillegård \n"
"Language-Team: Swedish \n"
"Language: sv\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: Poedit 3.2.2\n"

#. Type: boolean
#. Description
#: ../iproute2.templates:1001
msgid "Allow ordinary users to run ip vrf exec using capabilities?"
msgstr ""
"Tillåt vanliga användare att köra ip vrf exec genom att använda förmågor "
"(capabilities)?"

#. Type: boolean
#. Description
#: ../iproute2.templates:1001
msgid ""
"iproute2 can be used to configure and use Virtual Routing and Forwarding "
"(VRF) functionality in the  kernel. This normally requires root permissions, "
"but sometimes it's useful to allow ordinary users to execute commands from "
"inside a virtual routing and forwarding domain. E.g. ip vrf exec examplevrf "
"ping 10.0.0.1"
msgstr ""
"iproute2 kan användas för att konfigurera och använda kärnans funktioner för "
"virtuell dirigering och vidarebefordran (Virtual Routing and Forwarding "
"(VRF)). Detta kräver vanligen root-rättigheter, men ibland är det användbart "
"att tillåta vanliga användare att köra kommandon inifrån en domän för "
"virtuell dirigering och vidarebefordran. Till exempel ip vrf exec exempelvrf "
"ping 10.0.0.1"

#. Type: boolean
#. Description
#: ../iproute2.templates:1001
msgid ""
"The ip command supports dropping capabilities, making an exception for ip "
"vrf exec. The drawback of setting the permissions is that if in the unlikely "
"case of a security critical bug being found before the ip command has "
"dropped capabilities then it could be used by an attacker to gain root "
"permissions. It's up to you to decide about the trade-offs and select the "
"best setting for your system. This will give cap_dac_override, cap_net_admin "
"and cap_sys_admin to /bin/ip."
msgstr ""
"Kommandot ip stödjer att ta bort förmågor (capabilities) med undantag för ip "
"vrf exec. Nackdelen med att ställa in rättigheterna är att i den osannolika "
"händelsen av att ett kritiskt säkerhetsfel hittas innan ip har tagit bort "
"förmågor, så kan det användas av en angripare för att få root-rättigheter. "
"Det är upp till dig att göra en avvägning och välja vad som passar bäst för "
"ditt system. Detta kommer att ge förmågorna cap_dac_override, cap_net_admin, "
"och cap_sys_admin till /bin/ip."

#. Type: boolean
#. Description
#: ../iproute2.templates:1001
msgid ""
"More information about VRF can be found at: https://www.kernel.org/doc/;
"Documentation/networking/vrf.txt"
msgstr ""
"Mer information om virtuell dirigering och vidarebefordran (VRF) kan hittas "
"på https://www.kernel.org/doc/Documentation/networking/vrf.txt;
--- End Message ---
--- Begin Message ---
Source: iproute2
Source-Version: 6.5.0-1
Done: Luca Boccassi 

We believe that the bug you reported is fixed in the latest version of
iproute2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi  (supplier of updated iproute2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the 

Processed: limit source to linux, tagging 1041007

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'

> tags 1041007 + pending
Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM 
hardware RNG support (CONFIG_HW_RANDOM_TPM)
Bug #1051535 [src:linux] linux: HW_RANDOM_TPM disabled due to IMA=y
Added tag(s) pending.
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1041007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041007
1051535: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051535
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Andrew M.A. Cater
On Sat, Sep 09, 2023 at 11:42:45AM +0200, Bastian Blank wrote:
> Hi
> 
> On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote:
> > If we're now reaching the final limit and if it was foreseeable that we
> > would reach that limit, then yes it would have made sense to drop armel
> > *before* the bookworm release, but alas. If the kernel team can't support
> > the kernel on armel, than armel shouldn't be a release architecture for
> > trixie. If it's only some devices, than we "just" need to communicate that
> > clearly.
> 
> We have two armel kernel currently:
> - "rpi", for Raspberry Pi 1 and related devices.
> 
> The second one is for the original Raspberry Pi 1 type.  There we don't
> have any size limits, as the kernel is loaded from a file system.
> However those systems contain a ARMv6 CPU.  So our armel port is only
> partially usable anyway, as is is built for ARMv4.  There exists with
> Raspbian a better suited forked distribution with ARMv6 as target.
> 

No - Raspbian contains commercial software now by default. We have to use
Raspberry Pi firmware but Raspberry pi is *not* purely ARM v6 it's ARM v6 with
hardware floating point - and therefore incompatible with Debian and every
other ARM v6 version. Although it is less than optimal, it is still perfectly
supportable by all the packages in armel.

> So yes there is a small number of devices we can still support with the
> armel port, but where we are a bad choice.
> 

See above: note that the Raspberry Pi Zero (original version) is still very
much in production and is 32 bit and ARM v6 hardware floating point. It is
still a prime target for armel - and the number of devices produced is not
small.

> Everything newer is ARMv7, supported by the armhf port, or ARMv8,
> supported by the arm64 port.
> 
> Latest popcon for stable is:
> 
> linux-image-marvell: 31
> linux-image-rpi: 7
> 
> Debian itself does not have any armel hardware.  Everything is done on
> armhf or arm64.  Sadly the armhf supporting systems are already in the
> progress of drying up.  Even some ARMv8 vendors do not longer include
> 32bit support.
> 

This is, unfortunately, the case. I'm not sure where our sd card images
are built but the Raspberry Pi iamges are built from Gunnar Wolf's scripts
primarily for everything prior to RPi4.

All best, as ever, 

Andy

[amaca...@debian.org]

> Bastian
> 
> -- 
> Each kiss is as the first.
>   -- Miramanee, Kirk's wife, "The Paradise Syndrome",
>  stardate 4842.6
> 



Bug#1051535: linux: HW_RANDOM_TPM disabled due to IMA=y

2023-09-09 Thread Salvatore Bonaccorso
Hi,

Thanks for the report.

On Sat, Sep 09, 2023 at 12:38:21PM +0100, Tj wrote:
> Source: linux
> Severity: normal
> 
> Working with a Debian user in Matrix channel #Debian where they report
> that the TPM hardware random number generator that was available in
> v5.10* series is missing from v6.1* series for the amd64 kernel.
> 
> After examining the Kconfig options and the Debian configs I found that
> due to commit 6e679322d7d "Re-enable IMA" that possibly inadvertently
> it disabled HW_RANDOM_TPM.
> 
> The reason being that we have:
> 
> config HW_RANDOM_TPM
> bool "TPM HW Random Number Generator support"
> depends on TCG_TPM && HW_RANDOM && !(TCG_TPM=y && HW_RANDOM=m)
> 
> And when IMA=y that does:
> 
> config IMA
> bool "Integrity Measurement Architecture(IMA)"
>   ...
> select TCG_TPM if HAS_IOMEM
> 
> And `select` will force the target to the same value as this option.
> 
> TCG_TPM is tri-state (n,y,m) but IMA is boolean (n,y) so this select
> forces TCG_TPM=y.
> 
> so !(TCG_TPM=y && HW_RANDOM=m) is true and therefore HW_RANDOM_TPM is
> not set.
> 
> $ grep -rnE 'CONFIG_(IMA|TCG_TPM|HW_RANDOM)=' debian/config 
> /boot/config-6.1.0-11-amd64
> debian/config/config:457:CONFIG_HW_RANDOM=m
> debian/config/config:7752:CONFIG_IMA=y
> debian/config/arm64/config:172:CONFIG_TCG_TPM=m
> debian/config/kernelarch-x86/config:332:CONFIG_TCG_TPM=m
> debian/config/config.cloud:149:CONFIG_TCG_TPM=m
> /boot/config-6.1.0-11-amd64:4324:CONFIG_HW_RANDOM=m
> /boot/config-6.1.0-11-amd64:4352:CONFIG_TCG_TPM=y
> /boot/config-6.1.0-11-amd64:9774:CONFIG_IMA=y

The issue is handled already in #1041007, so merging both.

There is a MR to get the change first in unstable:
https://salsa.debian.org/kernel-team/linux/-/merge_requests/821
after that it can go into bookworm (likely in the next bookworm point
release).

Regards,
Salvatore



Processed: forcibly merging 1041007 1051535

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forcemerge 1041007 1051535
Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM 
hardware RNG support (CONFIG_HW_RANDOM_TPM)
Bug #1051535 [src:linux] linux: HW_RANDOM_TPM disabled due to IMA=y
Marked as found in versions linux/6.1.20-2~bpo11+1.
Merged 1041007 1051535
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1041007: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041007
1051535: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051535
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051535: linux: HW_RANDOM_TPM disabled due to IMA=y

2023-09-09 Thread Tj
Source: linux
Severity: normal

Working with a Debian user in Matrix channel #Debian where they report
that the TPM hardware random number generator that was available in
v5.10* series is missing from v6.1* series for the amd64 kernel.

After examining the Kconfig options and the Debian configs I found that
due to commit 6e679322d7d "Re-enable IMA" that possibly inadvertently
it disabled HW_RANDOM_TPM.

The reason being that we have:

config HW_RANDOM_TPM
bool "TPM HW Random Number Generator support"
depends on TCG_TPM && HW_RANDOM && !(TCG_TPM=y && HW_RANDOM=m)

And when IMA=y that does:

config IMA
bool "Integrity Measurement Architecture(IMA)"
...
select TCG_TPM if HAS_IOMEM

And `select` will force the target to the same value as this option.

TCG_TPM is tri-state (n,y,m) but IMA is boolean (n,y) so this select
forces TCG_TPM=y.

so !(TCG_TPM=y && HW_RANDOM=m) is true and therefore HW_RANDOM_TPM is
not set.

$ grep -rnE 'CONFIG_(IMA|TCG_TPM|HW_RANDOM)=' debian/config 
/boot/config-6.1.0-11-amd64
debian/config/config:457:CONFIG_HW_RANDOM=m
debian/config/config:7752:CONFIG_IMA=y
debian/config/arm64/config:172:CONFIG_TCG_TPM=m
debian/config/kernelarch-x86/config:332:CONFIG_TCG_TPM=m
debian/config/config.cloud:149:CONFIG_TCG_TPM=m
/boot/config-6.1.0-11-amd64:4324:CONFIG_HW_RANDOM=m
/boot/config-6.1.0-11-amd64:4352:CONFIG_TCG_TPM=y
/boot/config-6.1.0-11-amd64:9774:CONFIG_IMA=y


-- System Information:
Debian Release: 12.1
Architecture: amd64 (x86_64)
Foreign Architectures: i386



Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Salvatore Bonaccorso
Hi,

On Sat, Sep 09, 2023 at 11:49:11AM +0300, Adrian Bunk wrote:
> On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote:
> >...
> > - Relese the DSA without armel builds. This is not optimal and for the 
> > point release
> >   we need to have to have all builds, but this gives people who still are 
> > interested
> >   in this architecture to step up and propose a fix for the problem, 
> > otherwise then
> >   disable the image size check, and then effectively dropping some support.
> >...
> > armel people, can you have ideally look at it ASAP on the comments
> > please, I would not like to delay the DSA for linux on
> > bookworm-security too much.
> 
> Releasing this DSA without armel and sorting out the issue for the point 
> release sounds like the best option to me.

FWIW, following Ben's aproach for unstable, here is my proposed change
for bookworm in the near-term:

https://salsa.debian.org/kernel-team/linux/-/merge_requests/844

I have verified by cross-building that the image size goes down to

Image size 2644124/2729712, using 96.86%.  Image fits.  Continuing.

which would be sufficient so far.

So we can at least include the above for the point release and
releasing the DSA earlier without the armel builds.

Thank you!

Regards,
Salvatore



Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Bastian Blank
Hi

On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote:
> If we're now reaching the final limit and if it was foreseeable that we
> would reach that limit, then yes it would have made sense to drop armel
> *before* the bookworm release, but alas. If the kernel team can't support
> the kernel on armel, than armel shouldn't be a release architecture for
> trixie. If it's only some devices, than we "just" need to communicate that
> clearly.

We have two armel kernel currently:
- "marvell", for some CPU from Marvell, and
- "rpi", for Raspberry Pi 1 and related devices.

The first one is the one with included size limitations, because those
load the kernel from a pre-defined flash partition, whose size can't be
easily changed by the user.  This one is now overflowing for the second
to last documented one in the kernel package config.

The second one is for the original Raspberry Pi 1 type.  There we don't
have any size limits, as the kernel is loaded from a file system.
However those systems contain a ARMv6 CPU.  So our armel port is only
partially usable anyway, as is is built for ARMv4.  There exists with
Raspbian a better suited forked distribution with ARMv6 as target.

So yes there is a small number of devices we can still support with the
armel port, but where we are a bad choice.

Everything newer is ARMv7, supported by the armhf port, or ARMv8,
supported by the arm64 port.

Latest popcon for stable is:

linux-image-marvell: 31
linux-image-rpi: 7

Debian itself does not have any armel hardware.  Everything is done on
armhf or arm64.  Sadly the armhf supporting systems are already in the
progress of drying up.  Even some ARMv8 vendors do not longer include
32bit support.

Bastian

-- 
Each kiss is as the first.
-- Miramanee, Kirk's wife, "The Paradise Syndrome",
   stardate 4842.6



Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Paul Gevers

Hi Salvatore,

On 09-09-2023 10:15, Salvatore Bonaccorso wrote:

but should have been support for armel been
dropped earlier and should we do it for trixie


The kernel for armel went over some hardware limits before (I was 
affected with my NAS, where I couldn't upgrade the kernel to bullseye as 
documented in the release notes [1]). Is the current situation reaching 
the limit for all armel devices, or "just" for some and are the others 
probably fine for some years to come?


If we're now reaching the final limit and if it was foreseeable that we 
would reach that limit, then yes it would have made sense to drop armel 
*before* the bookworm release, but alas. If the kernel team can't 
support the kernel on armel, than armel shouldn't be a release 
architecture for trixie. If it's only some devices, than we "just" need 
to communicate that clearly.


I don't have a clear advice for the current situation in security and 
the next point release, let's hope you can stretch the situation a bit 
longer. I recall that the kernel package has safety checks in place and 
refuses to *try* to install the kernel if it doesn't fit on the 
hardware. That means that you don't cripple the hardware of affected 
people, but "merely" can't give them security support? I guess it would 
be possible (as long as support lasts; no LTS support) for effected 
systems to run the security supported bullseye kernel.


Paul

[1] 
https://www.debian.org/releases/bullseye/armel/release-notes/ch-information.en.html#no-longer-supported-hardware


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Adrian Bunk
On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote:
>...
> - Relese the DSA without armel builds. This is not optimal and for the point 
> release
>   we need to have to have all builds, but this gives people who still are 
> interested
>   in this architecture to step up and propose a fix for the problem, 
> otherwise then
>   disable the image size check, and then effectively dropping some support.
>...
> armel people, can you have ideally look at it ASAP on the comments
> please, I would not like to delay the DSA for linux on
> bookworm-security too much.

Releasing this DSA without armel and sorting out the issue for the point 
release sounds like the best option to me.

> Thanks for having a look,
> 
> Regards,
> Salvatore

cu
Adrian



Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Salvatore Bonaccorso
Hi all,

We have problem with the image size of armel builds in bookworm. There
is a pending bookworm-security linux update pending which is currently
blocked due to armel FTBFS due to the image size increase:

https://people.debian.org/~carnil/buildd-logs/linux/linux_6.1.52-1_armel-2023-09-07T08:53:41Z.gz

debian/bin/buildcheck.py debian/build/build_armel_none_marvell armel none 
marvell
Can't read ABI reference.  ABI not checked!
Image size 2753652/2729712, using 100.88%.  Too large.  Refusing to continue.
make[2]: *** [debian/rules.real:169: debian/stamps/build_armel_none_marvell] 
Error 1
make[2]: Leaving directory '/<>'
make[1]: *** [debian/rules.gen:1615: build-arch_armel_none_marvell_real_image] 
Error 2
make[1]: Leaving directory '/<>'
make: *** [debian/rules:39: build-arch] Error 2
dpkg-buildpackage: error: debian/rules binary-arch subprocess returned exit 
status 2

In fact we are already too narrow to 100% in any case, but there was a
bump between 6.1.41 and 6.1.42 upstream AFAICS:

6.1.52-1 Image size 2751596/2729712, using 100.80%.  Too large.  Refusing to 
continue.
6.1.51-1 Image size 2752212/2729712, using 100.82%.  Too large.  Refusing to 
continue.
6.1.47-1 Image size 2752676/2729712, using 100.84%.  Too large.  Refusing to 
continue.
6.1.45-1 Image size 2751292/2729712, using 100.79%.  Too large.  Refusing to 
continue.
6.1.43-1 Image size 2751348/2729712, using 100.79%.  Too large.  Refusing to 
continue.
6.1.42-1 Image size 2752924/2729712, using 100.85%.  Too large.  Refusing to 
continue.
6.1.41-1 Image size 2701348/2729712, using 98.96%.  Image fits.  Continuing.
6.1.40-1 Image size 2703956/2729712, using 99.06%.  Under 1% space in 
UNRELEASED.  Continuing.
6.1.38-1 Image size 2703076/2729712, using 99.02%.  Under 1% space in bookworm. 
 Continuing.

I doupt anybody is sensibly using armel nowdays under bookworm, so my proposed
course of action for unblock the bookworm-security update is:

Either

- ignore the image size and implicitly drop support for devices which would 
break
  due to size constraints, the current upper limit is adjusted for the 
following:

  # Buffalo Linkstation LS-WSXL/WXL/WVL (from stock kernel): 2729776 - 64 = 
2729712

or:

- Relese the DSA without armel builds. This is not optimal and for the point 
release
  we need to have to have all builds, but this gives people who still are 
interested
  in this architecture to step up and propose a fix for the problem, otherwise 
then
  disable the image size check, and then effectively dropping some support.

Attached is the result of bloat-o-meter script between 6.1.41 and 6.1.42.

I might put me in a bad spot, but should have been support for armel been
dropped earlier and should we do it for trixie following the same done for
mipsel?

Note that the last time the problem arised already earlier in
experimental and Ben workarounded it there with
https://salsa.debian.org/kernel-team/linux/-/commit/9dfe6d33a4fd220394228b30cbbfdb3b444d36ec
We probably can do that as well here. 60443c88f3a8 ("kallsyms: Improve
the performance of kallsyms_lookup_name()") was in fact backported to
6.1.42. So this is next I would try and disable MPTCP and
FUNCTION_TRACER. But the problem with armel will remain.

armel people, can you have ideally look at it ASAP on the comments
please, I would not like to delay the DSA for linux on
bookworm-security too much.

Thanks for having a look,

Regards,
Salvatore
add/remove: 7/6 grow/shrink: 50/14 up/down: 3772/-2456 (1316)
Function old new   delta
check_max_stack_depth_subprog  - 720+720
psi_rtpoll_worker  - 648+648
update_triggers- 504+504
kallsyms_lookup_names.constprop- 264+264
do_check_common 9892   10068+176
__mark_chain_precision  20082148+140
psi_trigger_create   564 684+120
dquot_writeback_dquots   428 548+120
psi_trigger_destroy  344 448+104
psi_schedule_rtpoll_work   -  88 +88
__check_func_call880 968 +88
collect_percpu_times 368 452 +84
is_callback_calling_function   -  64 +64
list_add22082256 +48
__inet_hash  436 484 +48
request_key_and_link14041448 +44
kvmalloc_array -  40 +40
bpf_lru_pop_free 708 748 +40
list_add_tail   22682304 +36
ip_send_unicast_reply784 820 +36
psi_avgs_work180 212 +32
bpf_check  10812   10844 +32