* [ANNOUNCE] 4.19.233-rt105
@ 2022-03-11 8:19 Daniel Wagner
2022-03-18 5:01 ` Ralf Mardorf
0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-11 8:19 UTC (permalink / raw)
To: LKML, linux-rt-users, Steven Rostedt, Thomas Gleixner,
Carsten Emde, John Kacur, Sebastian Andrzej Siewior, Tom Zanussi,
Clark Williams
Hello RT-list!
I'm pleased to announce the 4.19.233-rt105 stable release. This is just
an update to the latest upstream stable release. No RT specific changes.
Note, I've taken the maintainer job for the v4.19-rt series over from
Clark, hence the signing key has changed (see below).
You can get this release via the git tree at:
git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git
branch: v4.19-rt
Head SHA1: d335ad45d7f06f4cf7cbf6679a55d8cf957efca0
Or to build 4.19.233-rt105 directly, the following patches should be applied:
https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz
https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.233.xz
https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.233-rt105.patch.xz
Signing key fingerprint:
5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C
Enjoy!
Daniel
Changes from v4.19.232-rt104:
---
Alyssa Ross (1):
firmware: arm_scmi: Remove space in MODULE_ALIAS name
Antony Antony (1):
xfrm: fix the if_id check in changelink
Benjamin Beichler (1):
mac80211_hwsim: report NOACK frames in tx_status
Brian Norris (1):
arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output
D. Wythe (2):
net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
Daniel Wagner (2):
Merge tag 'v4.19.233' into v4.19-rt
Linux 4.19.233-rt105
Daniele Palmas (1):
net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
Eric Anholt (1):
i2c: bcm2835: Avoid clock stretching timeouts
Eric Dumazet (1):
netfilter: fix use-after-free in __nf_register_net_hook()
Filipe Manana (1):
btrfs: add missing run of delayed items after unlink during log replay
Florian Westphal (2):
netfilter: nf_queue: don't assume sk is full socket
netfilter: nf_queue: fix possible use-after-free
Greg Kroah-Hartman (1):
Linux 4.19.233
Hangyu Hua (2):
usb: gadget: don't release an existing dev->buf
usb: gadget: clear related members when goto fail
Hans de Goede (2):
Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power()
Input: elan_i2c - fix regulator enable count imbalance after suspend/resume
Huang Pei (1):
hamradio: fix macro redefine warning
Hugh Dickins (1):
memfd: fix F_SEAL_WRITE after shmem huge page allocated
JaeMan Park (1):
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
Jann Horn (1):
efivars: Respect "block" flag in efivar_entry_set_safe()
Jia-Ju Bai (1):
net: chelsio: cxgb3: check the return value of pci_find_capability()
Jiasheng Jiang (2):
soc: fsl: qe: Check of ioremap return value
nl80211: Handle nla_memdup failures in handle_nan_filter
Jiri Bohac (1):
xfrm: fix MTU regression
José Expósito (1):
Input: clear BTN_RIGHT/MIDDLE on buttonpads
Kai Vehmanen (2):
ASoC: rt5668: do not block workqueue if card is unbound
ASoC: rt5682: do not block workqueue if card is unbound
Leon Romanovsky (1):
xfrm: enforce validity of offload input flags
Lukas Wunner (1):
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
Marek Marczykowski-Górecki (1):
xen/netfront: destroy queues before real_num_tx_queues is zeroed
Marek Vasut (1):
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
Nicolas Escande (1):
mac80211: fix forwarded mesh frames AC & queue selection
Randy Dunlap (3):
net: stmmac: fix return value of __setup handler
net: sxgbe: fix return value of __setup handler
ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions
Ronnie Sahlberg (1):
cifs: fix double free race when mount fails in cifs_get_root()
Sergey Shtylyov (1):
ata: pata_hpt37x: fix PCI clock detection
Steven Rostedt (Google) (1):
tracing/histogram: Fix sorting on old "cpu" value
Sukadev Bhattiprolu (1):
ibmvnic: free reset-work-item when flushing
Sven Eckelmann (3):
batman-adv: Request iflink once in batadv-on-batadv check
batman-adv: Request iflink once in batadv_get_real_netdevice
batman-adv: Don't expect inter-netns unique iflink indices
Vincent Mailhol (1):
can: gs_usb: change active_channels's type from atomic_t to u8
Vladimir Oltean (2):
net: dcb: flush lingering app table entries for unregistered devices
net: dcb: disable softirqs in dcbnl_flush_dev()
William Mahon (1):
HID: add mapping for KEY_ALL_APPLICATIONS
Wolfram Sang (2):
i2c: cadence: allow COMPILE_TEST
i2c: qup: allow COMPILE_TEST
Ye Bin (1):
block: Fix fsync always failed if once failed
Yongzhi Liu (1):
dmaengine: shdma: Fix runtime PM imbalance on error
Zhen Ni (1):
ALSA: intel_hdmi: Fix reference to PCM buffer address
Zheyu Ma (1):
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
---
Makefile | 2 +-
arch/arm/mm/mmu.c | 2 +
arch/arm64/boot/dts/rockchip/rk3399-gru.dtsi | 17 ++++--
block/blk-flush.c | 4 +-
drivers/ata/pata_hpt37x.c | 4 +-
drivers/dma/sh/shdma-base.c | 4 +-
drivers/firmware/arm_scmi/driver.c | 2 +-
drivers/firmware/efi/vars.c | 5 +-
drivers/hid/hid-debug.c | 4 +-
drivers/hid/hid-input.c | 2 +
drivers/i2c/busses/Kconfig | 4 +-
drivers/i2c/busses/i2c-bcm2835.c | 11 ++++
drivers/input/input.c | 6 +++
drivers/input/mouse/elan_i2c_core.c | 64 ++++++++---------------
drivers/net/arcnet/com20020-pci.c | 3 ++
drivers/net/can/usb/gs_usb.c | 10 ++--
drivers/net/ethernet/chelsio/cxgb3/t3_hw.c | 2 +
drivers/net/ethernet/ibm/ibmvnic.c | 4 +-
drivers/net/ethernet/samsung/sxgbe/sxgbe_main.c | 6 +--
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 6 +--
drivers/net/hamradio/mkiss.c | 2 +
drivers/net/usb/cdc_mbim.c | 5 ++
drivers/net/wireless/mac80211_hwsim.c | 13 +++++
drivers/net/xen-netfront.c | 39 ++++++++------
drivers/pci/hotplug/pciehp_hpc.c | 7 +--
drivers/soc/fsl/qe/qe_io.c | 2 +
drivers/usb/gadget/legacy/inode.c | 10 ++--
fs/btrfs/tree-log.c | 18 +++++++
fs/cifs/cifsfs.c | 1 +
include/net/netfilter/nf_queue.h | 2 +-
include/uapi/linux/input-event-codes.h | 3 +-
include/uapi/linux/xfrm.h | 6 +++
kernel/trace/trace_events_hist.c | 6 +--
localversion-rt | 2 +-
mm/memfd.c | 30 ++++++++---
net/batman-adv/hard-interface.c | 29 ++++++----
net/dcb/dcbnl.c | 44 ++++++++++++++++
net/ipv6/ip6_output.c | 11 ++--
net/mac80211/rx.c | 4 +-
net/netfilter/core.c | 5 +-
net/netfilter/nf_queue.c | 22 ++++++--
net/netfilter/nfnetlink_queue.c | 12 +++--
net/smc/smc_core.c | 5 +-
net/wireless/nl80211.c | 12 +++++
net/xfrm/xfrm_device.c | 6 ++-
net/xfrm/xfrm_interface.c | 2 +-
sound/soc/codecs/rt5668.c | 12 +++--
sound/soc/codecs/rt5682.c | 12 +++--
sound/soc/soc-ops.c | 4 +-
sound/x86/intel_hdmi_audio.c | 2 +-
50 files changed, 346 insertions(+), 144 deletions(-)
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-11 8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner @ 2022-03-18 5:01 ` Ralf Mardorf 2022-03-18 8:48 ` Daniel Wagner 0 siblings, 1 reply; 9+ messages in thread From: Ralf Mardorf @ 2022-03-18 5:01 UTC (permalink / raw) To: linux-rt-users; +Cc: Daniel Wagner On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote: >Signing key fingerprint: > > 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C Hi, where is actually the required key (E072D068B1F5703E) uploaded, to verify the patch? [rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 5BF67BC5082672CABB45ACAE587C5ECA5D0A306C gpg: key 587C5ECA5D0A306C: "Daniel Wagner <dwagner@suse.de>" not changed gpg: Total number processed: 1 gpg: unchanged: 1 [rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022 09:10:11 CET gpg: using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E gpg: Can't check signature: No public key [rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://pgp.uni-mainz.de --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E gpg: keyserver receive failed: No data [rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E gpg: keyserver receive failed: No data [rocketmouse@archlinux linux-rt]$ ls -hl /bin/gpg2 lrwxrwxrwx root root 3 B Sat Nov 13 20:28:21 2021 /bin/gpg2 ⇒ gpg Regards, Ralf ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-18 5:01 ` Ralf Mardorf @ 2022-03-18 8:48 ` Daniel Wagner [not found] ` <20220318102051.483333f2@archlinux> 0 siblings, 1 reply; 9+ messages in thread From: Daniel Wagner @ 2022-03-18 8:48 UTC (permalink / raw) To: Ralf Mardorf; +Cc: linux-rt-users On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote: > On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote: > >Signing key fingerprint: > > > > 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C > > Hi, > > where is actually the required key (E072D068B1F5703E) uploaded, to > verify the patch? Sorry, forgot to add this to the announce template. The key is available on the korg keyring: git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git FWIW, I have a TODO for this: https://github.com/igaw/stable-rt-tools/issues/11 HTH! Daniel ^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <20220318102051.483333f2@archlinux>]
* Re: [ANNOUNCE] 4.19.233-rt105 [not found] ` <20220318102051.483333f2@archlinux> @ 2022-03-18 9:27 ` Ralf Mardorf 2022-03-18 9:45 ` Daniel Wagner 0 siblings, 1 reply; 9+ messages in thread From: Ralf Mardorf @ 2022-03-18 9:27 UTC (permalink / raw) To: linux-rt-users, Daniel Wagner On Fri, 18 Mar 2022 10:20:51 +0100, Ralf Mardorf wrote: >On Fri, 18 Mar 2022 09:48:00 +0100, Daniel Wagner wrote: >>On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote: >>> On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote: >>> >Signing key fingerprint: >>> > >>> > 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C >>> >>> Hi, >>> >>> where is actually the required key (E072D068B1F5703E) uploaded, to >>> verify the patch? >> >>Sorry, forgot to add this to the announce template. The key is >>available on the korg keyring: >> >> git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git >> >>FWIW, I have a TODO for this: >> >> https://github.com/igaw/stable-rt-tools/issues/11 > >Hi, > >I can't find the key > >1B45744BE36280CA7D6BD460E072D068B1F5703E >short E072D068B1F5703E > >at >https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master > >*?* >Ralf Actually I don't want to upload something, I want to download the needed key to verify the rt-patch. It's not available by any public key server I used when trying to get the public key. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-18 9:27 ` Ralf Mardorf @ 2022-03-18 9:45 ` Daniel Wagner 2022-03-18 17:00 ` Ralf Mardorf 0 siblings, 1 reply; 9+ messages in thread From: Daniel Wagner @ 2022-03-18 9:45 UTC (permalink / raw) To: Ralf Mardorf; +Cc: linux-rt-users On Fri, Mar 18, 2022 at 10:27:18AM +0100, Ralf Mardorf wrote: > >I can't find the key > > > >1B45744BE36280CA7D6BD460E072D068B1F5703E > >short E072D068B1F5703E > > > >at > >https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master > > > >*?* $ git clone git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git Cloning into 'pgpkeys'... remote: Enumerating objects: 24, done. remote: Counting objects: 100% (24/24), done. remote: Compressing objects: 100% (21/21), done. remote: Total 5391 (delta 6), reused 0 (delta 0), pack-reused 5367 Receiving objects: 100% (5391/5391), 16.69 MiB | 6.38 MiB/s, done. Resolving deltas: 100% (3045/3045), done. $ gpg pgpkeys/keys/587C5ECA5D0A306C.asc gpg: WARNING: no command supplied. Trying to guess what you mean ... pub rsa4096 2011-10-05 [SCEA] 5BF67BC5082672CABB45ACAE587C5ECA5D0A306C uid Daniel Wagner <wagi@monom.org> uid Daniel Wagner <wagi@kernel.org> uid Daniel Wagner <dwagner@suse.de> uid Daniel Wagner <daniel.wagner@suse.com> sub rsa2048 2018-01-07 [S] [expired: 2020-01-07] sub rsa2048 2018-01-07 [E] [expired: 2020-01-07] sub rsa4096 2019-08-04 [S] [expired: 2021-08-03] sub elg4096 2019-08-04 [E] [expired: 2021-08-03] sub elg4096 2021-09-07 [E] [expires: 2022-09-07] sub ed25519 2021-09-07 [S] [expires: 2022-09-07] Isn't this enough? > Actually I don't want to upload something, I want to download the > needed key to verify the rt-patch. It's not available by any public > key server I used when trying to get the public key. The wording might need some clarification. I asked Steven for advice as non native English speaking I tend to cause chaos with such things. In short, to upload the artifacts to korg we need to sign the files. The same key is used to sign the tags. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-18 9:45 ` Daniel Wagner @ 2022-03-18 17:00 ` Ralf Mardorf 2022-03-18 17:42 ` Ralf Mardorf 0 siblings, 1 reply; 9+ messages in thread From: Ralf Mardorf @ 2022-03-18 17:00 UTC (permalink / raw) To: Daniel Wagner, linux-rt-users On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote: >$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc Hi, that's the wrong key: [rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022 09:10:11 CET gpg: using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E ^^^^^^^^^^^^^^^^ 587C5ECA5D0A306C.asc Importing your key from a keyserver (e.g. from hkp://keyserver.ubuntu.com) isn't an issue at all. The rt-patch was either signed with another key (E072D068B1F5703E instead of 587C5ECA5D0A306C) or the uploaded patch is malicious. The patch was downloaded from https://www.kernel.org/pub/linux/kernel/projects/rt/ : [rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD [snip] _pkgver=4.19.233 _rtpatchver=105 pkgver="${_pkgver}_rt${_rtpatchver}" [snip] source=( "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz" "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign" "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz" "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign" Regards, Ralf ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-18 17:00 ` Ralf Mardorf @ 2022-03-18 17:42 ` Ralf Mardorf 2022-03-21 8:36 ` Daniel Wagner 0 siblings, 1 reply; 9+ messages in thread From: Ralf Mardorf @ 2022-03-18 17:42 UTC (permalink / raw) To: Daniel Wagner, linux-rt-users On Fri, 18 Mar 2022 18:00:57 +0100, Ralf Mardorf wrote: >On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote: >>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc >that's the wrong key: > > >[rocketmouse@archlinux linux-rt]$ gzip -cd >patch-4.19.233-rt105.patch.gz | gpg2 --verify >patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022 >09:10:11 CET gpg: using EDDSA key >1B45744BE36280CA7D6BD460E072D068B1F5703E > ^^^^^^^^^^^^^^^^ > 587C5ECA5D0A306C.asc > > >Importing your key from a keyserver (e.g. from >hkp://keyserver.ubuntu.com) isn't an issue at all. > >The rt-patch was either signed with another key (E072D068B1F5703E >instead of 587C5ECA5D0A306C) or the uploaded patch is malicious. > >The patch was downloaded from >https://www.kernel.org/pub/linux/kernel/projects/rt/ : > > >[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD >[snip] >_pkgver=4.19.233 >_rtpatchver=105 >pkgver="${_pkgver}_rt${_rtpatchver}" >[snip] >source=( > "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz" > "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign" > "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz" > "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign" PS: [de]/[en] [de] Ich habe das Patch weder über git bekommen, noch habe ich die xz Dateien heruntergeladen. Ich habe die gz Dateien heruntergeladen. Die gz Patch-Datei wurde mit einem anderen Schlüssel signiert. Dieser Schlüssel scheint nicht verfügbar zu sein. [en] I didn't get the patch from git, neither did I download the xz related files. I downloaded the gz related files. The gz patch file is signed with another key. This key seems to be unavailable. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-18 17:42 ` Ralf Mardorf @ 2022-03-21 8:36 ` Daniel Wagner 2022-03-21 10:13 ` Ralf Mardorf 0 siblings, 1 reply; 9+ messages in thread From: Daniel Wagner @ 2022-03-21 8:36 UTC (permalink / raw) To: Ralf Mardorf; +Cc: linux-rt-users Hi Ralf, On Fri, Mar 18, 2022 at 06:42:49PM +0100, Ralf Mardorf wrote: > >[rocketmouse@archlinux linux-rt]$ gzip -cd > >patch-4.19.233-rt105.patch.gz | gpg2 --verify > >patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022 > >09:10:11 CET gpg: using EDDSA key > >1B45744BE36280CA7D6BD460E072D068B1F5703E > > ^^^^^^^^^^^^^^^^ > > 587C5ECA5D0A306C.asc It's a subkey hence the file name wont match. The file name is the finger print and not the subkey. > >Importing your key from a keyserver (e.g. from > >hkp://keyserver.ubuntu.com) isn't an issue at all. > > > >The rt-patch was either signed with another key (E072D068B1F5703E > >instead of 587C5ECA5D0A306C) or the uploaded patch is malicious. Did you import 587C5ECA5D0A306C.asc from korg? It should contain all my public keys (incl. the subkeys). At least this is what I think I did when trying to follow (outdated, very outdated, complete useless or wrong) documentation. Hope this helps, Daniel ps: I have very strong feelings when it comes to gpg and no they are not the good ones. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105 2022-03-21 8:36 ` Daniel Wagner @ 2022-03-21 10:13 ` Ralf Mardorf 0 siblings, 0 replies; 9+ messages in thread From: Ralf Mardorf @ 2022-03-21 10:13 UTC (permalink / raw) To: linux-rt-users; +Cc: Daniel Wagner On Mon, 21 Mar 2022 09:36:11 +0100, Daniel Wagner wrote: >Did you import 587C5ECA5D0A306C.asc from korg? Hi, no, I imported it from a keyserver. >I have very strong feelings when it comes to gpg and no they are not >the good ones. ;) I suspected a subkey, but OTOH it's odd that a check points to a missing subkey, without mentioning the key that needs to be imported. It's also odd that the needed key is available by a keyserver, but without the subkey included. Thank you, I imported from git and all is good now [1]. Regards, Ralf [1] [rocketmouse@archlinux ~]$ gpg --import /tmp/pgpkeys/keys/587C5ECA5D0A306C.asc gpg: key 587C5ECA5D0A306C: 17 signatures not checked due to missing keys gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 24 new signatures gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 2 new subkeys gpg: Total number processed: 1 gpg: new subkeys: 2 gpg: new signatures: 24 [snip] [rocketmouse@archlinux linux-rt]$ makepkg -s ==> Making package: linux-rt 4.19.235_rt106-0.1000 (Mon 21 Mar 2022 10:58:09 CET) [snip] ==> Verifying source file signatures with gpg... linux-4.19.235.tar ... Passed patch-4.19.235-rt106.patch ... Passed [snip] ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2022-03-21 10:13 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-03-11 8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner
2022-03-18 5:01 ` Ralf Mardorf
2022-03-18 8:48 ` Daniel Wagner
[not found] ` <20220318102051.483333f2@archlinux>
2022-03-18 9:27 ` Ralf Mardorf
2022-03-18 9:45 ` Daniel Wagner
2022-03-18 17:00 ` Ralf Mardorf
2022-03-18 17:42 ` Ralf Mardorf
2022-03-21 8:36 ` Daniel Wagner
2022-03-21 10:13 ` Ralf Mardorf
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox