Control: tag -1 + fixed-upstream
Control: tag -1 - moreinfo
Control: found -1 6.14.3-1~exp1
Control: fixed -1 6.15-1~exp1
Control: found -1 6.12.25-1
Control: fixed -1 6.12.32-1
Control: found -1 6.1.135-1
Control: notfound -1 6.1.140-1

Hello Klaus,

On Fri, Jun 20, 2025 at 02:44:44PM +0200, Klaus Singvogel wrote:
> Salvatore Bonaccorso wrote:
> > 
> > I have built 6.1.140-1 with the single patch on top in
> > https://people.debian.org/~carnil/tmp/linux/1107511/
> > 
> > Along I generated a sha256 sum file for the files and signed it with
> > the gpg for me in the Debian keyring, as we cannot provide signed
> > packages.
> > 
> > With the disclaimer that they are test-packages, it would be great if
> > you can test this.
> 
> I would like to sincerely thank you, Salvatore Bonaccorso, for kindly
> providing the 6.1.140 kernel, including the patch, as a Debian test
> package.

+1

> After testing this kernel twice, I can confirm that the issue did not
> occur anymore.

\o/. So for completeness we have this issue in the following intervals:

        v6.14-rc7~24^2~3^2~8 .. v6.15~6^2~1^2
        v6.14-rc7~24^2~3^2~8 .. v6.14.9~35
        v6.12.23~134 .. v6.12.31~32
        v6.6.87~84 .. v6.6.93~71
        v6.1.134~63 .. v6.1.141~64
        v5.15.180~51 .. v5.15.185~30

I marked the bug accordingly found and fixed.

That means the 6.1/bookworm is the only branch we need to fix yet.

> GnuPG-Key-ID: 1024R/5068792D  1994-06-27

Time to update your key I guess. 1024 RSA isn't recommended any more.

Best regards
Uwe

Attachment: signature.asc
Description: PGP signature

Reply via email to