* [ANNOUNCE] 4.19.233-rt105
@ 2022-03-11 8:19 Daniel Wagner
2022-03-18 5:01 ` Ralf Mardorf
0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-11 8:19 UTC (permalink / raw)
To: LKML, linux-rt-users, Steven Rostedt, Thomas Gleixner,
Carsten Emde, John Kacur, Sebastian Andrzej Siewior, Tom Zanussi,
Clark Williams
Hello RT-list!
I'm pleased to announce the 4.19.233-rt105 stable release. This is just
an update to the latest upstream stable release. No RT specific changes.
Note, I've taken the maintainer job for the v4.19-rt series over from
Clark, hence the signing key has changed (see below).
You can get this release via the git tree at:
git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git
branch: v4.19-rt
Head SHA1: d335ad45d7f06f4cf7cbf6679a55d8cf957efca0
Or to build 4.19.233-rt105 directly, the following patches should be applied:
https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz
https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.233.xz
https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.233-rt105.patch.xz
Signing key fingerprint:
5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C
Enjoy!
Daniel
Changes from v4.19.232-rt104:
---
Alyssa Ross (1):
firmware: arm_scmi: Remove space in MODULE_ALIAS name
Antony Antony (1):
xfrm: fix the if_id check in changelink
Benjamin Beichler (1):
mac80211_hwsim: report NOACK frames in tx_status
Brian Norris (1):
arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output
D. Wythe (2):
net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
Daniel Wagner (2):
Merge tag 'v4.19.233' into v4.19-rt
Linux 4.19.233-rt105
Daniele Palmas (1):
net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
Eric Anholt (1):
i2c: bcm2835: Avoid clock stretching timeouts
Eric Dumazet (1):
netfilter: fix use-after-free in __nf_register_net_hook()
Filipe Manana (1):
btrfs: add missing run of delayed items after unlink during log replay
Florian Westphal (2):
netfilter: nf_queue: don't assume sk is full socket
netfilter: nf_queue: fix possible use-after-free
Greg Kroah-Hartman (1):
Linux 4.19.233
Hangyu Hua (2):
usb: gadget: don't release an existing dev->buf
usb: gadget: clear related members when goto fail
Hans de Goede (2):
Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power()
Input: elan_i2c - fix regulator enable count imbalance after suspend/resume
Huang Pei (1):
hamradio: fix macro redefine warning
Hugh Dickins (1):
memfd: fix F_SEAL_WRITE after shmem huge page allocated
JaeMan Park (1):
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
Jann Horn (1):
efivars: Respect "block" flag in efivar_entry_set_safe()
Jia-Ju Bai (1):
net: chelsio: cxgb3: check the return value of pci_find_capability()
Jiasheng Jiang (2):
soc: fsl: qe: Check of ioremap return value
nl80211: Handle nla_memdup failures in handle_nan_filter
Jiri Bohac (1):
xfrm: fix MTU regression
José Expósito (1):
Input: clear BTN_RIGHT/MIDDLE on buttonpads
Kai Vehmanen (2):
ASoC: rt5668: do not block workqueue if card is unbound
ASoC: rt5682: do not block workqueue if card is unbound
Leon Romanovsky (1):
xfrm: enforce validity of offload input flags
Lukas Wunner (1):
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
Marek Marczykowski-Górecki (1):
xen/netfront: destroy queues before real_num_tx_queues is zeroed
Marek Vasut (1):
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
Nicolas Escande (1):
mac80211: fix forwarded mesh frames AC & queue selection
Randy Dunlap (3):
net: stmmac: fix return value of __setup handler
net: sxgbe: fix return value of __setup handler
ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions
Ronnie Sahlberg (1):
cifs: fix double free race when mount fails in cifs_get_root()
Sergey Shtylyov (1):
ata: pata_hpt37x: fix PCI clock detection
Steven Rostedt (Google) (1):
tracing/histogram: Fix sorting on old "cpu" value
Sukadev Bhattiprolu (1):
ibmvnic: free reset-work-item when flushing
Sven Eckelmann (3):
batman-adv: Request iflink once in batadv-on-batadv check
batman-adv: Request iflink once in batadv_get_real_netdevice
batman-adv: Don't expect inter-netns unique iflink indices
Vincent Mailhol (1):
can: gs_usb: change active_channels's type from atomic_t to u8
Vladimir Oltean (2):
net: dcb: flush lingering app table entries for unregistered devices
net: dcb: disable softirqs in dcbnl_flush_dev()
William Mahon (1):
HID: add mapping for KEY_ALL_APPLICATIONS
Wolfram Sang (2):
i2c: cadence: allow COMPILE_TEST
i2c: qup: allow COMPILE_TEST
Ye Bin (1):
block: Fix fsync always failed if once failed
Yongzhi Liu (1):
dmaengine: shdma: Fix runtime PM imbalance on error
Zhen Ni (1):
ALSA: intel_hdmi: Fix reference to PCM buffer address
Zheyu Ma (1):
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
---
Makefile | 2 +-
arch/arm/mm/mmu.c | 2 +
arch/arm64/boot/dts/rockchip/rk3399-gru.dtsi | 17 ++++--
block/blk-flush.c | 4 +-
drivers/ata/pata_hpt37x.c | 4 +-
drivers/dma/sh/shdma-base.c | 4 +-
drivers/firmware/arm_scmi/driver.c | 2 +-
drivers/firmware/efi/vars.c | 5 +-
drivers/hid/hid-debug.c | 4 +-
drivers/hid/hid-input.c | 2 +
drivers/i2c/busses/Kconfig | 4 +-
drivers/i2c/busses/i2c-bcm2835.c | 11 ++++
drivers/input/input.c | 6 +++
drivers/input/mouse/elan_i2c_core.c | 64 ++++++++---------------
drivers/net/arcnet/com20020-pci.c | 3 ++
drivers/net/can/usb/gs_usb.c | 10 ++--
drivers/net/ethernet/chelsio/cxgb3/t3_hw.c | 2 +
drivers/net/ethernet/ibm/ibmvnic.c | 4 +-
drivers/net/ethernet/samsung/sxgbe/sxgbe_main.c | 6 +--
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 6 +--
drivers/net/hamradio/mkiss.c | 2 +
drivers/net/usb/cdc_mbim.c | 5 ++
drivers/net/wireless/mac80211_hwsim.c | 13 +++++
drivers/net/xen-netfront.c | 39 ++++++++------
drivers/pci/hotplug/pciehp_hpc.c | 7 +--
drivers/soc/fsl/qe/qe_io.c | 2 +
drivers/usb/gadget/legacy/inode.c | 10 ++--
fs/btrfs/tree-log.c | 18 +++++++
fs/cifs/cifsfs.c | 1 +
include/net/netfilter/nf_queue.h | 2 +-
include/uapi/linux/input-event-codes.h | 3 +-
include/uapi/linux/xfrm.h | 6 +++
kernel/trace/trace_events_hist.c | 6 +--
localversion-rt | 2 +-
mm/memfd.c | 30 ++++++++---
net/batman-adv/hard-interface.c | 29 ++++++----
net/dcb/dcbnl.c | 44 ++++++++++++++++
net/ipv6/ip6_output.c | 11 ++--
net/mac80211/rx.c | 4 +-
net/netfilter/core.c | 5 +-
net/netfilter/nf_queue.c | 22 ++++++--
net/netfilter/nfnetlink_queue.c | 12 +++--
net/smc/smc_core.c | 5 +-
net/wireless/nl80211.c | 12 +++++
net/xfrm/xfrm_device.c | 6 ++-
net/xfrm/xfrm_interface.c | 2 +-
sound/soc/codecs/rt5668.c | 12 +++--
sound/soc/codecs/rt5682.c | 12 +++--
sound/soc/soc-ops.c | 4 +-
sound/x86/intel_hdmi_audio.c | 2 +-
50 files changed, 346 insertions(+), 144 deletions(-)
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-11 8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner
@ 2022-03-18 5:01 ` Ralf Mardorf
2022-03-18 8:48 ` Daniel Wagner
0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 5:01 UTC (permalink / raw)
To: linux-rt-users; +Cc: Daniel Wagner
On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:
>Signing key fingerprint:
>
> 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C
Hi,
where is actually the required key (E072D068B1F5703E) uploaded, to
verify the patch?
[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 5BF67BC5082672CABB45ACAE587C5ECA5D0A306C
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <dwagner@suse.de>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
[rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign -
gpg: Signature made Fri 11 Mar 2022 09:10:11 CET
gpg: using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: Can't check signature: No public key
[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://pgp.uni-mainz.de --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: keyserver receive failed: No data
[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: keyserver receive failed: No data
[rocketmouse@archlinux linux-rt]$ ls -hl /bin/gpg2
lrwxrwxrwx root root 3 B Sat Nov 13 20:28:21 2021 /bin/gpg2 ⇒ gpg
Regards,
Ralf
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-18 5:01 ` Ralf Mardorf
@ 2022-03-18 8:48 ` Daniel Wagner
[not found] ` <20220318102051.483333f2@archlinux>
0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-18 8:48 UTC (permalink / raw)
To: Ralf Mardorf; +Cc: linux-rt-users
On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote:
> On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:
> >Signing key fingerprint:
> >
> > 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C
>
> Hi,
>
> where is actually the required key (E072D068B1F5703E) uploaded, to
> verify the patch?
Sorry, forgot to add this to the announce template. The key is
available on the korg keyring:
git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git
FWIW, I have a TODO for this:
https://github.com/igaw/stable-rt-tools/issues/11
HTH!
Daniel
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
[not found] ` <20220318102051.483333f2@archlinux>
@ 2022-03-18 9:27 ` Ralf Mardorf
2022-03-18 9:45 ` Daniel Wagner
0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 9:27 UTC (permalink / raw)
To: linux-rt-users, Daniel Wagner
On Fri, 18 Mar 2022 10:20:51 +0100, Ralf Mardorf wrote:
>On Fri, 18 Mar 2022 09:48:00 +0100, Daniel Wagner wrote:
>>On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote:
>>> On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:
>>> >Signing key fingerprint:
>>> >
>>> > 5BF6 7BC5 0826 72CA BB45 ACAE 587C 5ECA 5D0A 306C
>>>
>>> Hi,
>>>
>>> where is actually the required key (E072D068B1F5703E) uploaded, to
>>> verify the patch?
>>
>>Sorry, forgot to add this to the announce template. The key is
>>available on the korg keyring:
>>
>> git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git
>>
>>FWIW, I have a TODO for this:
>>
>> https://github.com/igaw/stable-rt-tools/issues/11
>
>Hi,
>
>I can't find the key
>
>1B45744BE36280CA7D6BD460E072D068B1F5703E
>short E072D068B1F5703E
>
>at
>https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master
>
>*?*
>Ralf
Actually I don't want to upload something, I want to download the
needed key to verify the rt-patch. It's not available by any public
key server I used when trying to get the public key.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-18 9:27 ` Ralf Mardorf
@ 2022-03-18 9:45 ` Daniel Wagner
2022-03-18 17:00 ` Ralf Mardorf
0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-18 9:45 UTC (permalink / raw)
To: Ralf Mardorf; +Cc: linux-rt-users
On Fri, Mar 18, 2022 at 10:27:18AM +0100, Ralf Mardorf wrote:
> >I can't find the key
> >
> >1B45744BE36280CA7D6BD460E072D068B1F5703E
> >short E072D068B1F5703E
> >
> >at
> >https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master
> >
> >*?*
$ git clone git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git
Cloning into 'pgpkeys'...
remote: Enumerating objects: 24, done.
remote: Counting objects: 100% (24/24), done.
remote: Compressing objects: 100% (21/21), done.
remote: Total 5391 (delta 6), reused 0 (delta 0), pack-reused 5367
Receiving objects: 100% (5391/5391), 16.69 MiB | 6.38 MiB/s, done.
Resolving deltas: 100% (3045/3045), done.
$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc
gpg: WARNING: no command supplied. Trying to guess what you mean ...
pub rsa4096 2011-10-05 [SCEA]
5BF67BC5082672CABB45ACAE587C5ECA5D0A306C
uid Daniel Wagner <wagi@monom.org>
uid Daniel Wagner <wagi@kernel.org>
uid Daniel Wagner <dwagner@suse.de>
uid Daniel Wagner <daniel.wagner@suse.com>
sub rsa2048 2018-01-07 [S] [expired: 2020-01-07]
sub rsa2048 2018-01-07 [E] [expired: 2020-01-07]
sub rsa4096 2019-08-04 [S] [expired: 2021-08-03]
sub elg4096 2019-08-04 [E] [expired: 2021-08-03]
sub elg4096 2021-09-07 [E] [expires: 2022-09-07]
sub ed25519 2021-09-07 [S] [expires: 2022-09-07]
Isn't this enough?
> Actually I don't want to upload something, I want to download the
> needed key to verify the rt-patch. It's not available by any public
> key server I used when trying to get the public key.
The wording might need some clarification. I asked Steven for advice as
non native English speaking I tend to cause chaos with such things. In
short, to upload the artifacts to korg we need to sign the files. The
same key is used to sign the tags.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-18 9:45 ` Daniel Wagner
@ 2022-03-18 17:00 ` Ralf Mardorf
2022-03-18 17:42 ` Ralf Mardorf
0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 17:00 UTC (permalink / raw)
To: Daniel Wagner, linux-rt-users
On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote:
>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc
Hi,
that's the wrong key:
[rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign -
gpg: Signature made Fri 11 Mar 2022 09:10:11 CET
gpg: using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E
^^^^^^^^^^^^^^^^
587C5ECA5D0A306C.asc
Importing your key from a keyserver (e.g. from
hkp://keyserver.ubuntu.com) isn't an issue at all.
The rt-patch was either signed with another key (E072D068B1F5703E
instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.
The patch was downloaded from
https://www.kernel.org/pub/linux/kernel/projects/rt/ :
[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD
[snip]
_pkgver=4.19.233
_rtpatchver=105
pkgver="${_pkgver}_rt${_rtpatchver}"
[snip]
source=(
"https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz"
"https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign"
"https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz"
"https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign"
Regards,
Ralf
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-18 17:00 ` Ralf Mardorf
@ 2022-03-18 17:42 ` Ralf Mardorf
2022-03-21 8:36 ` Daniel Wagner
0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 17:42 UTC (permalink / raw)
To: Daniel Wagner, linux-rt-users
On Fri, 18 Mar 2022 18:00:57 +0100, Ralf Mardorf wrote:
>On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote:
>>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc
>that's the wrong key:
>
>
>[rocketmouse@archlinux linux-rt]$ gzip -cd
>patch-4.19.233-rt105.patch.gz | gpg2 --verify
>patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022
>09:10:11 CET gpg: using EDDSA key
>1B45744BE36280CA7D6BD460E072D068B1F5703E
> ^^^^^^^^^^^^^^^^
> 587C5ECA5D0A306C.asc
>
>
>Importing your key from a keyserver (e.g. from
>hkp://keyserver.ubuntu.com) isn't an issue at all.
>
>The rt-patch was either signed with another key (E072D068B1F5703E
>instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.
>
>The patch was downloaded from
>https://www.kernel.org/pub/linux/kernel/projects/rt/ :
>
>
>[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD
>[snip]
>_pkgver=4.19.233
>_rtpatchver=105
>pkgver="${_pkgver}_rt${_rtpatchver}"
>[snip]
>source=(
> "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz"
> "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign"
> "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz"
> "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign"
PS: [de]/[en]
[de]
Ich habe das Patch weder über git bekommen, noch habe ich die xz Dateien
heruntergeladen. Ich habe die gz Dateien heruntergeladen.
Die gz Patch-Datei wurde mit einem anderen Schlüssel signiert. Dieser
Schlüssel scheint nicht verfügbar zu sein.
[en]
I didn't get the patch from git, neither did I download the xz
related files. I downloaded the gz related files.
The gz patch file is signed with another key. This key seems to be
unavailable.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-18 17:42 ` Ralf Mardorf
@ 2022-03-21 8:36 ` Daniel Wagner
2022-03-21 10:13 ` Ralf Mardorf
0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-21 8:36 UTC (permalink / raw)
To: Ralf Mardorf; +Cc: linux-rt-users
Hi Ralf,
On Fri, Mar 18, 2022 at 06:42:49PM +0100, Ralf Mardorf wrote:
> >[rocketmouse@archlinux linux-rt]$ gzip -cd
> >patch-4.19.233-rt105.patch.gz | gpg2 --verify
> >patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022
> >09:10:11 CET gpg: using EDDSA key
> >1B45744BE36280CA7D6BD460E072D068B1F5703E
> > ^^^^^^^^^^^^^^^^
> > 587C5ECA5D0A306C.asc
It's a subkey hence the file name wont match. The file name is the
finger print and not the subkey.
> >Importing your key from a keyserver (e.g. from
> >hkp://keyserver.ubuntu.com) isn't an issue at all.
> >
> >The rt-patch was either signed with another key (E072D068B1F5703E
> >instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.
Did you import 587C5ECA5D0A306C.asc from korg? It should contain all my
public keys (incl. the subkeys). At least this is what I think I did
when trying to follow (outdated, very outdated, complete useless or
wrong) documentation.
Hope this helps,
Daniel
ps: I have very strong feelings when it comes to gpg and no they are not
the good ones.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [ANNOUNCE] 4.19.233-rt105
2022-03-21 8:36 ` Daniel Wagner
@ 2022-03-21 10:13 ` Ralf Mardorf
0 siblings, 0 replies; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-21 10:13 UTC (permalink / raw)
To: linux-rt-users; +Cc: Daniel Wagner
On Mon, 21 Mar 2022 09:36:11 +0100, Daniel Wagner wrote:
>Did you import 587C5ECA5D0A306C.asc from korg?
Hi,
no, I imported it from a keyserver.
>I have very strong feelings when it comes to gpg and no they are not
>the good ones.
;)
I suspected a subkey, but OTOH it's odd that a check points to a
missing subkey, without mentioning the key that needs to be imported.
It's also odd that the needed key is available by a keyserver, but
without the subkey included.
Thank you, I imported from git and all is good now [1].
Regards,
Ralf
[1]
[rocketmouse@archlinux ~]$ gpg --import /tmp/pgpkeys/keys/587C5ECA5D0A306C.asc
gpg: key 587C5ECA5D0A306C: 17 signatures not checked due to missing keys
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 24 new signatures
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 2 new subkeys
gpg: Total number processed: 1
gpg: new subkeys: 2
gpg: new signatures: 24
[snip]
[rocketmouse@archlinux linux-rt]$ makepkg -s
==> Making package: linux-rt 4.19.235_rt106-0.1000 (Mon 21 Mar 2022 10:58:09 CET)
[snip]
==> Verifying source file signatures with gpg...
linux-4.19.235.tar ... Passed
patch-4.19.235-rt106.patch ... Passed
[snip]
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2022-03-21 10:13 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-11 8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner
2022-03-18 5:01 ` Ralf Mardorf
2022-03-18 8:48 ` Daniel Wagner
[not found] ` <20220318102051.483333f2@archlinux>
2022-03-18 9:27 ` Ralf Mardorf
2022-03-18 9:45 ` Daniel Wagner
2022-03-18 17:00 ` Ralf Mardorf
2022-03-18 17:42 ` Ralf Mardorf
2022-03-21 8:36 ` Daniel Wagner
2022-03-21 10:13 ` Ralf Mardorf
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.