Control: tag -1 + fixed-upstream Control: tag -1 - moreinfo Control: found -1 6.14.3-1~exp1 Control: fixed -1 6.15-1~exp1 Control: found -1 6.12.25-1 Control: fixed -1 6.12.32-1 Control: found -1 6.1.135-1 Control: notfound -1 6.1.140-1
Hello Klaus, On Fri, Jun 20, 2025 at 02:44:44PM +0200, Klaus Singvogel wrote: > Salvatore Bonaccorso wrote: > > > > I have built 6.1.140-1 with the single patch on top in > > https://people.debian.org/~carnil/tmp/linux/1107511/ > > > > Along I generated a sha256 sum file for the files and signed it with > > the gpg for me in the Debian keyring, as we cannot provide signed > > packages. > > > > With the disclaimer that they are test-packages, it would be great if > > you can test this. > > I would like to sincerely thank you, Salvatore Bonaccorso, for kindly > providing the 6.1.140 kernel, including the patch, as a Debian test > package. +1 > After testing this kernel twice, I can confirm that the issue did not > occur anymore. \o/. So for completeness we have this issue in the following intervals: v6.14-rc7~24^2~3^2~8 .. v6.15~6^2~1^2 v6.14-rc7~24^2~3^2~8 .. v6.14.9~35 v6.12.23~134 .. v6.12.31~32 v6.6.87~84 .. v6.6.93~71 v6.1.134~63 .. v6.1.141~64 v5.15.180~51 .. v5.15.185~30 I marked the bug accordingly found and fixed. That means the 6.1/bookworm is the only branch we need to fix yet. > GnuPG-Key-ID: 1024R/5068792D 1994-06-27 Time to update your key I guess. 1024 RSA isn't recommended any more. Best regards Uwe
signature.asc
Description: PGP signature