Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Paul Wise
On Sat, 2023-09-09 at 11:42 +0200, Bastian Blank wrote: > The first one is the one with included size limitations, because those > load the kernel from a pre-defined flash partition, whose size can't be > easily changed by the user.  This one is now overflowing for the second > to last documented

linux-signed-i386_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. binary:acpi-modules-6.1.0-12-686-di is NEW. binary:acpi-modules-6.1.0-12-686-pae-di is NEW. binary:ata-modules-6.1.0-12-686-di is NEW. binary:ata-modules-6.1.0-12-686-pae-di is NEW. binary:btrfs-modules-6.1.0-12-686-di is NEW.

linux-signed-arm64_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. binary:ata-modules-6.1.0-12-arm64-di is NEW. binary:btrfs-modules-6.1.0-12-arm64-di is NEW. binary:cdrom-core-modules-6.1.0-12-arm64-di is NEW. binary:crc-modules-6.1.0-12-arm64-di is NEW. binary:crypto-dm-modules-6.1.0-12-arm64-di is NEW.

linux-signed-amd64_6.1.52+1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. binary:acpi-modules-6.1.0-12-amd64-di is NEW. binary:ata-modules-6.1.0-12-amd64-di is NEW. binary:btrfs-modules-6.1.0-12-amd64-di is NEW. binary:cdrom-core-modules-6.1.0-12-amd64-di is NEW. binary:crc-modules-6.1.0-12-amd64-di is NEW.

Bug#1051577: iproute2: obsolete conffiles

2023-09-09 Thread gregor herrmann
Package: iproute2 Version: 6.5.0-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 After upgrading to 6.5.0-1 adequate shows: adequate found packaging bugs - - iproute2: obsolete-conffile /etc/iproute2/rt_tables.d/README iproute2: obsolete-conffile

linux_6.1.52-1_source.changes is NEW

2023-09-09 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. binary:affs-modules-6.1.0-12-4kc-malta-di is NEW. binary:affs-modules-6.1.0-12-5kc-malta-di is NEW. binary:affs-modules-6.1.0-12-loongson-3-di is NEW. binary:affs-modules-6.1.0-12-mips32r2el-di is NEW. binary:affs-modules-6.1.0-12-mips64r2el-di is NEW.

Processed: closing 1022159

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1022159 Bug #1022159 [src:linux] bugs.debian.org: I upgraded to kernel 5.10.0-19 and Debian no longer works Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1022159:

Processed: reassign 1016874 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1016874 src:linux Bug #1016874 [bugs.debian.org] bugs.debian.org: PC unable to boot after package update Bug reassigned from package 'bugs.debian.org' to 'src:linux'. Ignoring request to alter found versions of bug #1016874 to the same

Processed: reassign 1022159 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1022159 src:linux Bug #1022159 [bugs.debian.org] bugs.debian.org: I upgraded to kernel 5.10.0-19 and Debian no longer works Bug reassigned from package 'bugs.debian.org' to 'src:linux'. Ignoring request to alter found versions of bug

Processed: reassign 1024006 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1024006 src:linux Bug #1024006 [bugs.debian.org] bugs.debian.org: Waking up from sleep causes laptop to irrecoverably freeze Bug reassigned from package 'bugs.debian.org' to 'src:linux'. Ignoring request to alter found versions of bug

Processed: reassign 1041960 to src:linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1041960 src:linux Bug #1041960 [linux] bugs.debian.org: Missing 'boot messages' between grub screen and desktop showing up. Bug reassigned from package 'linux' to 'src:linux'. Ignoring request to alter found versions of bug #1041960 to

Processed: reassign 1041960 to linux

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1041960 linux Bug #1041960 [bugs.debian.org] bugs.debian.org: Missing 'boot messages' between grub screen and desktop showing up. Bug reassigned from package 'bugs.debian.org' to 'linux'. Ignoring request to alter found versions of bug

iproute2_6.5.0-1_source.changes ACCEPTED into unstable

2023-09-09 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 09 Sep 2023 16:32:54 +0100 Source: iproute2 Architecture: source Version: 6.5.0-1 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team Changed-By: Luca

Processing of iproute2_6.5.0-1_source.changes

2023-09-09 Thread Debian FTP Masters
iproute2_6.5.0-1_source.changes uploaded successfully to localhost along with the files: iproute2_6.5.0-1.dsc iproute2_6.5.0.orig.tar.xz iproute2_6.5.0-1.debian.tar.xz iproute2_6.5.0-1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1050442: marked as done (iproute2: [INTL:sv] Swedish translation of debconf messages)

2023-09-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Sep 2023 16:04:29 + with message-id and subject line Bug#1050442: fixed in iproute2 6.5.0-1 has caused the Debian Bug report #1050442, regarding iproute2: [INTL:sv] Swedish translation of debconf messages to be marked as done. This means that you claim that the

Processed: limit source to linux, tagging 1041007

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1041007 + pending Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM hardware

Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Andrew M.A. Cater
On Sat, Sep 09, 2023 at 11:42:45AM +0200, Bastian Blank wrote: > Hi > > On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote: > > If we're now reaching the final limit and if it was foreseeable that we > > would reach that limit, then yes it would have made sense to drop armel > > *before*

Bug#1051535: linux: HW_RANDOM_TPM disabled due to IMA=y

2023-09-09 Thread Salvatore Bonaccorso
Hi, Thanks for the report. On Sat, Sep 09, 2023 at 12:38:21PM +0100, Tj wrote: > Source: linux > Severity: normal > > Working with a Debian user in Matrix channel #Debian where they report > that the TPM hardware random number generator that was available in > v5.10* series is missing from

Processed: forcibly merging 1041007 1051535

2023-09-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 1041007 1051535 Bug #1041007 [src:linux] linux-image-6.1.0-0.deb11.7-amd64: Please enable TPM hardware RNG support (CONFIG_HW_RANDOM_TPM) Bug #1051535 [src:linux] linux: HW_RANDOM_TPM disabled due to IMA=y Marked as found in versions

Bug#1051535: linux: HW_RANDOM_TPM disabled due to IMA=y

2023-09-09 Thread Tj
Source: linux Severity: normal Working with a Debian user in Matrix channel #Debian where they report that the TPM hardware random number generator that was available in v5.10* series is missing from v6.1* series for the amd64 kernel. After examining the Kconfig options and the Debian configs I

Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Salvatore Bonaccorso
Hi, On Sat, Sep 09, 2023 at 11:49:11AM +0300, Adrian Bunk wrote: > On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote: > >... > > - Relese the DSA without armel builds. This is not optimal and for the > > point release > > we need to have to have all builds, but this gives

Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Bastian Blank
Hi On Sat, Sep 09, 2023 at 11:13:56AM +0200, Paul Gevers wrote: > If we're now reaching the final limit and if it was foreseeable that we > would reach that limit, then yes it would have made sense to drop armel > *before* the bookworm release, but alas. If the kernel team can't support > the

Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Paul Gevers
Hi Salvatore, On 09-09-2023 10:15, Salvatore Bonaccorso wrote: but should have been support for armel been dropped earlier and should we do it for trixie The kernel for armel went over some hardware limits before (I was affected with my NAS, where I couldn't upgrade the kernel to bullseye as

Re: Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Adrian Bunk
On Sat, Sep 09, 2023 at 10:15:59AM +0200, Salvatore Bonaccorso wrote: >... > - Relese the DSA without armel builds. This is not optimal and for the point > release > we need to have to have all builds, but this gives people who still are > interested > in this architecture to step up and

Releasing linux/6.1.52-1 bookworm-security update without armel build, Image size problems

2023-09-09 Thread Salvatore Bonaccorso
Hi all, We have problem with the image size of armel builds in bookworm. There is a pending bookworm-security linux update pending which is currently blocked due to armel FTBFS due to the image size increase: