All of lore.kernel.org
 help / color / mirror / Atom feed
* [ANNOUNCE] 4.19.233-rt105
@ 2022-03-11  8:19 Daniel Wagner
  2022-03-18  5:01 ` Ralf Mardorf
  0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-11  8:19 UTC (permalink / raw)
  To: LKML, linux-rt-users, Steven Rostedt, Thomas Gleixner,
	Carsten Emde, John Kacur, Sebastian Andrzej Siewior, Tom Zanussi,
	Clark Williams

Hello RT-list!

I'm pleased to announce the 4.19.233-rt105 stable release. This is just
an update to the latest upstream stable release. No RT specific changes.

Note, I've taken the maintainer job for the v4.19-rt series over from
Clark, hence the signing key has changed (see below).

You can get this release via the git tree at:

  git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git

  branch: v4.19-rt
  Head SHA1: d335ad45d7f06f4cf7cbf6679a55d8cf957efca0

Or to build 4.19.233-rt105 directly, the following patches should be applied:

  https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.19.tar.xz

  https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.19.233.xz

  https://www.kernel.org/pub/linux/kernel/projects/rt/4.19/older/patch-4.19.233-rt105.patch.xz

Signing key fingerprint:

  5BF6 7BC5 0826 72CA BB45  ACAE 587C 5ECA 5D0A 306C

Enjoy!
Daniel

Changes from v4.19.232-rt104:
---

Alyssa Ross (1):
      firmware: arm_scmi: Remove space in MODULE_ALIAS name

Antony Antony (1):
      xfrm: fix the if_id check in changelink

Benjamin Beichler (1):
      mac80211_hwsim: report NOACK frames in tx_status

Brian Norris (1):
      arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output

D. Wythe (2):
      net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
      net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server

Daniel Wagner (2):
      Merge tag 'v4.19.233' into v4.19-rt
      Linux 4.19.233-rt105

Daniele Palmas (1):
      net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990

Eric Anholt (1):
      i2c: bcm2835: Avoid clock stretching timeouts

Eric Dumazet (1):
      netfilter: fix use-after-free in __nf_register_net_hook()

Filipe Manana (1):
      btrfs: add missing run of delayed items after unlink during log replay

Florian Westphal (2):
      netfilter: nf_queue: don't assume sk is full socket
      netfilter: nf_queue: fix possible use-after-free

Greg Kroah-Hartman (1):
      Linux 4.19.233

Hangyu Hua (2):
      usb: gadget: don't release an existing dev->buf
      usb: gadget: clear related members when goto fail

Hans de Goede (2):
      Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power()
      Input: elan_i2c - fix regulator enable count imbalance after suspend/resume

Huang Pei (1):
      hamradio: fix macro redefine warning

Hugh Dickins (1):
      memfd: fix F_SEAL_WRITE after shmem huge page allocated

JaeMan Park (1):
      mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work

Jann Horn (1):
      efivars: Respect "block" flag in efivar_entry_set_safe()

Jia-Ju Bai (1):
      net: chelsio: cxgb3: check the return value of pci_find_capability()

Jiasheng Jiang (2):
      soc: fsl: qe: Check of ioremap return value
      nl80211: Handle nla_memdup failures in handle_nan_filter

Jiri Bohac (1):
      xfrm: fix MTU regression

José Expósito (1):
      Input: clear BTN_RIGHT/MIDDLE on buttonpads

Kai Vehmanen (2):
      ASoC: rt5668: do not block workqueue if card is unbound
      ASoC: rt5682: do not block workqueue if card is unbound

Leon Romanovsky (1):
      xfrm: enforce validity of offload input flags

Lukas Wunner (1):
      PCI: pciehp: Fix infinite loop in IRQ handler upon power fault

Marek Marczykowski-Górecki (1):
      xen/netfront: destroy queues before real_num_tx_queues is zeroed

Marek Vasut (1):
      ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min

Nicolas Escande (1):
      mac80211: fix forwarded mesh frames AC & queue selection

Randy Dunlap (3):
      net: stmmac: fix return value of __setup handler
      net: sxgbe: fix return value of __setup handler
      ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions

Ronnie Sahlberg (1):
      cifs: fix double free race when mount fails in cifs_get_root()

Sergey Shtylyov (1):
      ata: pata_hpt37x: fix PCI clock detection

Steven Rostedt (Google) (1):
      tracing/histogram: Fix sorting on old "cpu" value

Sukadev Bhattiprolu (1):
      ibmvnic: free reset-work-item when flushing

Sven Eckelmann (3):
      batman-adv: Request iflink once in batadv-on-batadv check
      batman-adv: Request iflink once in batadv_get_real_netdevice
      batman-adv: Don't expect inter-netns unique iflink indices

Vincent Mailhol (1):
      can: gs_usb: change active_channels's type from atomic_t to u8

Vladimir Oltean (2):
      net: dcb: flush lingering app table entries for unregistered devices
      net: dcb: disable softirqs in dcbnl_flush_dev()

William Mahon (1):
      HID: add mapping for KEY_ALL_APPLICATIONS

Wolfram Sang (2):
      i2c: cadence: allow COMPILE_TEST
      i2c: qup: allow COMPILE_TEST

Ye Bin (1):
      block: Fix fsync always failed if once failed

Yongzhi Liu (1):
      dmaengine: shdma: Fix runtime PM imbalance on error

Zhen Ni (1):
      ALSA: intel_hdmi: Fix reference to PCM buffer address

Zheyu Ma (1):
      net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
---
Makefile                                          |  2 +-
 arch/arm/mm/mmu.c                                 |  2 +
 arch/arm64/boot/dts/rockchip/rk3399-gru.dtsi      | 17 ++++--
 block/blk-flush.c                                 |  4 +-
 drivers/ata/pata_hpt37x.c                         |  4 +-
 drivers/dma/sh/shdma-base.c                       |  4 +-
 drivers/firmware/arm_scmi/driver.c                |  2 +-
 drivers/firmware/efi/vars.c                       |  5 +-
 drivers/hid/hid-debug.c                           |  4 +-
 drivers/hid/hid-input.c                           |  2 +
 drivers/i2c/busses/Kconfig                        |  4 +-
 drivers/i2c/busses/i2c-bcm2835.c                  | 11 ++++
 drivers/input/input.c                             |  6 +++
 drivers/input/mouse/elan_i2c_core.c               | 64 ++++++++---------------
 drivers/net/arcnet/com20020-pci.c                 |  3 ++
 drivers/net/can/usb/gs_usb.c                      | 10 ++--
 drivers/net/ethernet/chelsio/cxgb3/t3_hw.c        |  2 +
 drivers/net/ethernet/ibm/ibmvnic.c                |  4 +-
 drivers/net/ethernet/samsung/sxgbe/sxgbe_main.c   |  6 +--
 drivers/net/ethernet/stmicro/stmmac/stmmac_main.c |  6 +--
 drivers/net/hamradio/mkiss.c                      |  2 +
 drivers/net/usb/cdc_mbim.c                        |  5 ++
 drivers/net/wireless/mac80211_hwsim.c             | 13 +++++
 drivers/net/xen-netfront.c                        | 39 ++++++++------
 drivers/pci/hotplug/pciehp_hpc.c                  |  7 +--
 drivers/soc/fsl/qe/qe_io.c                        |  2 +
 drivers/usb/gadget/legacy/inode.c                 | 10 ++--
 fs/btrfs/tree-log.c                               | 18 +++++++
 fs/cifs/cifsfs.c                                  |  1 +
 include/net/netfilter/nf_queue.h                  |  2 +-
 include/uapi/linux/input-event-codes.h            |  3 +-
 include/uapi/linux/xfrm.h                         |  6 +++
 kernel/trace/trace_events_hist.c                  |  6 +--
 localversion-rt                                   |  2 +-
 mm/memfd.c                                        | 30 ++++++++---
 net/batman-adv/hard-interface.c                   | 29 ++++++----
 net/dcb/dcbnl.c                                   | 44 ++++++++++++++++
 net/ipv6/ip6_output.c                             | 11 ++--
 net/mac80211/rx.c                                 |  4 +-
 net/netfilter/core.c                              |  5 +-
 net/netfilter/nf_queue.c                          | 22 ++++++--
 net/netfilter/nfnetlink_queue.c                   | 12 +++--
 net/smc/smc_core.c                                |  5 +-
 net/wireless/nl80211.c                            | 12 +++++
 net/xfrm/xfrm_device.c                            |  6 ++-
 net/xfrm/xfrm_interface.c                         |  2 +-
 sound/soc/codecs/rt5668.c                         | 12 +++--
 sound/soc/codecs/rt5682.c                         | 12 +++--
 sound/soc/soc-ops.c                               |  4 +-
 sound/x86/intel_hdmi_audio.c                      |  2 +-
 50 files changed, 346 insertions(+), 144 deletions(-)

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-11  8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner
@ 2022-03-18  5:01 ` Ralf Mardorf
  2022-03-18  8:48   ` Daniel Wagner
  0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18  5:01 UTC (permalink / raw)
  To: linux-rt-users; +Cc: Daniel Wagner

On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:
>Signing key fingerprint:
>
>  5BF6 7BC5 0826 72CA BB45  ACAE 587C 5ECA 5D0A 306C

Hi,

where is actually the required key (E072D068B1F5703E) uploaded, to
verify the patch?

[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 5BF67BC5082672CABB45ACAE587C5ECA5D0A306C
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <dwagner@suse.de>" not changed
gpg: Total number processed: 1
gpg:              unchanged: 1
[rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign -
gpg: Signature made Fri 11 Mar 2022 09:10:11 CET
gpg:                using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: Can't check signature: No public key
[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://pgp.uni-mainz.de --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: keyserver receive failed: No data
[rocketmouse@archlinux linux-rt]$ gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 1B45744BE36280CA7D6BD460E072D068B1F5703E
gpg: keyserver receive failed: No data
[rocketmouse@archlinux linux-rt]$ ls -hl /bin/gpg2
lrwxrwxrwx root root 3 B Sat Nov 13 20:28:21 2021  /bin/gpg2 ⇒ gpg

Regards,
Ralf

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-18  5:01 ` Ralf Mardorf
@ 2022-03-18  8:48   ` Daniel Wagner
       [not found]     ` <20220318102051.483333f2@archlinux>
  0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-18  8:48 UTC (permalink / raw)
  To: Ralf Mardorf; +Cc: linux-rt-users

On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote:
> On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:
> >Signing key fingerprint:
> >
> >  5BF6 7BC5 0826 72CA BB45  ACAE 587C 5ECA 5D0A 306C
> 
> Hi,
> 
> where is actually the required key (E072D068B1F5703E) uploaded, to
> verify the patch?

Sorry, forgot to add this to the announce template. The key is
available on the korg keyring:

   git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git

FWIW, I have a TODO for this:

  https://github.com/igaw/stable-rt-tools/issues/11

HTH!
Daniel

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
       [not found]     ` <20220318102051.483333f2@archlinux>
@ 2022-03-18  9:27       ` Ralf Mardorf
  2022-03-18  9:45         ` Daniel Wagner
  0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18  9:27 UTC (permalink / raw)
  To: linux-rt-users, Daniel Wagner

On Fri, 18 Mar 2022 10:20:51 +0100, Ralf Mardorf wrote:
>On Fri, 18 Mar 2022 09:48:00 +0100, Daniel Wagner wrote:
>>On Fri, Mar 18, 2022 at 06:01:51AM +0100, Ralf Mardorf wrote:  
>>> On Fri, 11 Mar 2022 09:19:04 +0100, Daniel Wagner wrote:    
>>> >Signing key fingerprint:
>>> >
>>> >  5BF6 7BC5 0826 72CA BB45  ACAE 587C 5ECA 5D0A 306C    
>>> 
>>> Hi,
>>> 
>>> where is actually the required key (E072D068B1F5703E) uploaded, to
>>> verify the patch?    
>>
>>Sorry, forgot to add this to the announce template. The key is
>>available on the korg keyring:
>>
>>   git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git
>>
>>FWIW, I have a TODO for this:
>>
>>  https://github.com/igaw/stable-rt-tools/issues/11  
>
>Hi,
>
>I can't find the key
>
>1B45744BE36280CA7D6BD460E072D068B1F5703E
>short                   E072D068B1F5703E
>
>at
>https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master
>
>*?*
>Ralf

Actually I don't want to upload something, I want to download the
needed key to verify the rt-patch. It's not available by any public
key server I used when trying to get the public key.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-18  9:27       ` Ralf Mardorf
@ 2022-03-18  9:45         ` Daniel Wagner
  2022-03-18 17:00           ` Ralf Mardorf
  0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-18  9:45 UTC (permalink / raw)
  To: Ralf Mardorf; +Cc: linux-rt-users

On Fri, Mar 18, 2022 at 10:27:18AM +0100, Ralf Mardorf wrote:
> >I can't find the key
> >
> >1B45744BE36280CA7D6BD460E072D068B1F5703E
> >short                   E072D068B1F5703E
> >
> >at
> >https://kernel.googlesource.com/pub/scm/docs/kernel/pgpkeys/+/refs/heads/master
> >
> >*?*

$ git clone git://git.kernel.org/pub/scm/docs/kernel/pgpkeys.git
Cloning into 'pgpkeys'...
remote: Enumerating objects: 24, done.
remote: Counting objects: 100% (24/24), done.
remote: Compressing objects: 100% (21/21), done.
remote: Total 5391 (delta 6), reused 0 (delta 0), pack-reused 5367
Receiving objects: 100% (5391/5391), 16.69 MiB | 6.38 MiB/s, done.
Resolving deltas: 100% (3045/3045), done.

$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc
gpg: WARNING: no command supplied.  Trying to guess what you mean ...
pub   rsa4096 2011-10-05 [SCEA]
      5BF67BC5082672CABB45ACAE587C5ECA5D0A306C
uid           Daniel Wagner <wagi@monom.org>
uid           Daniel Wagner <wagi@kernel.org>
uid           Daniel Wagner <dwagner@suse.de>
uid           Daniel Wagner <daniel.wagner@suse.com>
sub   rsa2048 2018-01-07 [S] [expired: 2020-01-07]
sub   rsa2048 2018-01-07 [E] [expired: 2020-01-07]
sub   rsa4096 2019-08-04 [S] [expired: 2021-08-03]
sub   elg4096 2019-08-04 [E] [expired: 2021-08-03]
sub   elg4096 2021-09-07 [E] [expires: 2022-09-07]
sub   ed25519 2021-09-07 [S] [expires: 2022-09-07]

Isn't this enough?

> Actually I don't want to upload something, I want to download the
> needed key to verify the rt-patch. It's not available by any public
> key server I used when trying to get the public key.

The wording might need some clarification. I asked Steven for advice as
non native English speaking I tend to cause chaos with such things. In
short, to upload the artifacts to korg we need to sign the files. The
same key is used to sign the tags.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-18  9:45         ` Daniel Wagner
@ 2022-03-18 17:00           ` Ralf Mardorf
  2022-03-18 17:42             ` Ralf Mardorf
  0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 17:00 UTC (permalink / raw)
  To: Daniel Wagner, linux-rt-users

On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote:
>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc

Hi,

that's the wrong key:


[rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign -
gpg: Signature made Fri 11 Mar 2022 09:10:11 CET
gpg:                using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E
                                                            ^^^^^^^^^^^^^^^^
                                                            587C5ECA5D0A306C.asc


Importing your key from a keyserver (e.g. from
hkp://keyserver.ubuntu.com) isn't an issue at all.

The rt-patch was either signed with another key (E072D068B1F5703E
instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.

The patch was downloaded from
https://www.kernel.org/pub/linux/kernel/projects/rt/ :


[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD
[snip]
_pkgver=4.19.233
_rtpatchver=105
pkgver="${_pkgver}_rt${_rtpatchver}"
[snip]
source=(
  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz"
  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign"
  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz"
  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign"


Regards,
Ralf

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-18 17:00           ` Ralf Mardorf
@ 2022-03-18 17:42             ` Ralf Mardorf
  2022-03-21  8:36               ` Daniel Wagner
  0 siblings, 1 reply; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-18 17:42 UTC (permalink / raw)
  To: Daniel Wagner, linux-rt-users

On Fri, 18 Mar 2022 18:00:57 +0100, Ralf Mardorf wrote:
>On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote:
>>$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc  
>that's the wrong key:
>
>
>[rocketmouse@archlinux linux-rt]$ gzip -cd
>patch-4.19.233-rt105.patch.gz | gpg2 --verify
>patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022
>09:10:11 CET gpg:                using EDDSA key
>1B45744BE36280CA7D6BD460E072D068B1F5703E
>                        ^^^^^^^^^^^^^^^^
>                        587C5ECA5D0A306C.asc
>
>
>Importing your key from a keyserver (e.g. from
>hkp://keyserver.ubuntu.com) isn't an issue at all.
>
>The rt-patch was either signed with another key (E072D068B1F5703E
>instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.
>
>The patch was downloaded from
>https://www.kernel.org/pub/linux/kernel/projects/rt/ :
>
>
>[rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD
>[snip]
>_pkgver=4.19.233
>_rtpatchver=105
>pkgver="${_pkgver}_rt${_rtpatchver}"
>[snip]
>source=(
>  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz"
>  "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign"
>  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz"
>  "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign"

PS: [de]/[en]

[de]
Ich habe das Patch weder über git bekommen, noch habe ich die xz Dateien
heruntergeladen. Ich habe die gz Dateien heruntergeladen.
Die gz Patch-Datei wurde mit einem anderen Schlüssel signiert. Dieser
Schlüssel scheint nicht verfügbar zu sein.

[en]
I didn't get the patch from git, neither did I download the xz
related files. I downloaded the gz related files.
The gz patch file is signed with another key. This key seems to be
unavailable.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-18 17:42             ` Ralf Mardorf
@ 2022-03-21  8:36               ` Daniel Wagner
  2022-03-21 10:13                 ` Ralf Mardorf
  0 siblings, 1 reply; 9+ messages in thread
From: Daniel Wagner @ 2022-03-21  8:36 UTC (permalink / raw)
  To: Ralf Mardorf; +Cc: linux-rt-users

Hi Ralf,

On Fri, Mar 18, 2022 at 06:42:49PM +0100, Ralf Mardorf wrote:
> >[rocketmouse@archlinux linux-rt]$ gzip -cd
> >patch-4.19.233-rt105.patch.gz | gpg2 --verify
> >patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022
> >09:10:11 CET gpg:                using EDDSA key
> >1B45744BE36280CA7D6BD460E072D068B1F5703E
> >                        ^^^^^^^^^^^^^^^^
> >                        587C5ECA5D0A306C.asc

It's a subkey hence the file name wont match. The file name is the
finger print and not the subkey.

> >Importing your key from a keyserver (e.g. from
> >hkp://keyserver.ubuntu.com) isn't an issue at all.
> >
> >The rt-patch was either signed with another key (E072D068B1F5703E
> >instead of 587C5ECA5D0A306C) or the uploaded patch is malicious.

Did you import 587C5ECA5D0A306C.asc from korg? It should contain all my
public keys (incl. the subkeys). At least this is what I think I did
when trying to follow (outdated, very outdated, complete useless or
wrong) documentation.

Hope this helps,
Daniel

ps: I have very strong feelings when it comes to gpg and no they are not
the good ones.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [ANNOUNCE] 4.19.233-rt105
  2022-03-21  8:36               ` Daniel Wagner
@ 2022-03-21 10:13                 ` Ralf Mardorf
  0 siblings, 0 replies; 9+ messages in thread
From: Ralf Mardorf @ 2022-03-21 10:13 UTC (permalink / raw)
  To: linux-rt-users; +Cc: Daniel Wagner

On Mon, 21 Mar 2022 09:36:11 +0100, Daniel Wagner wrote:
>Did you import 587C5ECA5D0A306C.asc from korg?

Hi,

no, I imported it from a keyserver.

>I have very strong feelings when it comes to gpg and no they are not
>the good ones.

;)

I suspected a subkey, but OTOH it's odd that a check points to a
missing subkey, without mentioning the key that needs to be imported.
It's also odd that the needed key is available by a keyserver, but
without the subkey included.

Thank you, I imported from git and all is good now [1].

Regards,
Ralf

[1]
[rocketmouse@archlinux ~]$ gpg --import /tmp/pgpkeys/keys/587C5ECA5D0A306C.asc 
gpg: key 587C5ECA5D0A306C: 17 signatures not checked due to missing keys
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 24 new signatures
gpg: key 587C5ECA5D0A306C: "Daniel Wagner <wagi@monom.org>" 2 new subkeys
gpg: Total number processed: 1
gpg:            new subkeys: 2
gpg:         new signatures: 24
[snip]
[rocketmouse@archlinux linux-rt]$ makepkg -s 
==> Making package: linux-rt 4.19.235_rt106-0.1000 (Mon 21 Mar 2022 10:58:09 CET)
[snip]
==> Verifying source file signatures with gpg...
    linux-4.19.235.tar ... Passed
    patch-4.19.235-rt106.patch ... Passed
[snip]

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2022-03-21 10:13 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-11  8:19 [ANNOUNCE] 4.19.233-rt105 Daniel Wagner
2022-03-18  5:01 ` Ralf Mardorf
2022-03-18  8:48   ` Daniel Wagner
     [not found]     ` <20220318102051.483333f2@archlinux>
2022-03-18  9:27       ` Ralf Mardorf
2022-03-18  9:45         ` Daniel Wagner
2022-03-18 17:00           ` Ralf Mardorf
2022-03-18 17:42             ` Ralf Mardorf
2022-03-21  8:36               ` Daniel Wagner
2022-03-21 10:13                 ` Ralf Mardorf

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.