[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#935945: marked as done (linux-image-5.2.0-2-amd64: does not load signed kernel modules when UEFI Secure Boot is enabled)



Your message dated Sun, 20 Oct 2019 22:05:41 +0000
with message-id <E1iMJKX-000Ibd-3e@fasolo.debian.org>
and subject line Bug#935945: fixed in linux 5.3.7-1
has caused the Debian Bug report #935945,
regarding linux-image-5.2.0-2-amd64: does not load signed kernel modules when UEFI Secure Boot is enabled
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
935945: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935945
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 5.2.9-2
Severity: important

Dear Maintainer,

   * What led up to the situation?

I regularly update Debian Testing (bullseye) on multiple computers. Two days ago something broke when kernel update from 4.19 to 5.2 arrived. Could you please help me to troubleshoot it?

   * What exactly did you do (or not do) that was effective (or ineffective)?

On computer with UEFI but without enabled Secure Boot everything works just fine and I can load DKMS ZFS module with kernel 5.2.0-2-amd64. On a computer with secure boot enabled I can’t load ZFS kernel module that is signed using my own key that was enrolled into UEFI using "mokutil".

   * What was the outcome of this action?

as root:
# modprobe zfs
modprobe: ERROR: could not insert 'zfs': Operation not permitted

   * What outcome did you expect instead?

Load it as usually. I was able to reproduce the same issue on a different computer with Secure Boot and signed modules.

A few notes:

* It works (modules are loaded) after I boot back to linux-image-4.19.0-5-amd64 (but this is not a solution)

* It works (modules are loaded) after I disable Secure Boot (but this is not a solution)

* I'm sure that the modules are signed. I tested using:

find /lib/modules -name '*.ko' -exec grep -FL '~Module signature appended~' {} \+

* I can check that the key was loaded from UEFI during boot

Boot log with `4.19.0-5-amd64`
-------------------------------
Aug 26 20:34:54 bedik002 kernel: efi: EFI v2.50 by INSYDE Corp.
Aug 26 20:34:54 bedik002 kernel: efi:  ACPI 2.0=0x7fffd014  SMBIOS=0x7f0d9000  SMBIOS 3.0=0x7f0d7000  ESRT=0x7f0d4158  MEMATTR=0x6f699018  TPMEventLog=0x66e32018
Aug 26 20:34:54 bedik002 kernel: Kernel is locked down from EFI secure boot; see https://wiki.debian.org/SecureBoot
Aug 26 20:34:54 bedik002 kernel: ACPI: UEFI 0x000000007FFFC000 000236 (v01 HPQOEM 8362     00000001 HP   00040000)
Aug 26 20:34:54 bedik002 kernel: ACPI: UEFI 0x000000007FFFB000 000042 (v01 HPQOEM 8362     00000002 HP   00040000)
Aug 26 20:34:54 bedik002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns
Aug 26 20:34:54 bedik002 kernel: pci 0000:00:02.0: BAR 2: assigned to efifb
Aug 26 20:34:54 bedik002 kernel: Registered efivars operations
Aug 26 20:34:54 bedik002 kernel: Asymmetric key parser 'x509' registered
Aug 26 20:34:54 bedik002 kernel: efifb: probing for efifb
Aug 26 20:34:54 bedik002 kernel: efifb: framebuffer at 0x90000000, using 8100k, total 8100k
Aug 26 20:34:54 bedik002 kernel: efifb: mode is 1920x1080x32, linelength=7680, pages=1
Aug 26 20:34:54 bedik002 kernel: efifb: scrolling: redraw
Aug 26 20:34:54 bedik002 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Aug 26 20:34:54 bedik002 kernel: fb0: EFI VGA frame buffer device
Aug 26 20:34:54 bedik002 kernel: Loading compiled-in X.509 certificates
Aug 26 20:34:54 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
Aug 26 20:34:54 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def'
Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' linked to secondary sys keyring
Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' linked to secondary sys keyring
Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:db cert 'Hewlett-Packard Company: HP UEFI Secure Boot 2013 DB key: 1d7cf2c2b92673f69c8ee1ec7063967ab9b62bec' linked to secondary sys keyring

my key:
Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:MokListRT cert 'bedik002 module signing key: b1025ea690c4c8f9593b0a158045e72586a3c12f' linked to secondary sys keyring

Aug 26 20:34:54 bedik002 kernel: Loaded UEFI:MokListRT cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1' linked to secondary sys keyring
Aug 26 20:34:54 bedik002 kernel: fb: switching to inteldrmfb from EFI VGA
Aug 26 20:34:54 bedik002 kernel: EFI Variables Facility v0.08 2004-May-17
Aug 26 20:34:54 bedik002 kernel: pstore: Registered efi as persistent store backend
Aug 26 20:34:56 bedik002 systemd[1]: Mounting /boot/efi...
Aug 26 20:34:56 bedik002 systemd[1]: Mounted /boot/efi.
Aug 26 20:35:03 bedik002 systemd[1841]: Listening on GnuPG network certificate management daemon.
Aug 26 20:35:08 bedik002 systemd[2187]: Listening on GnuPG network certificate management daemon.
-------------------------------

Boot log with `5.2.0-2-amd64` (looks different but it does load the key)
-------------------------------
Aug 26 20:39:37 bedik002 kernel: efi: EFI v2.50 by INSYDE Corp.
Aug 26 20:39:37 bedik002 kernel: efi:  ACPI 2.0=0x7fffd014  SMBIOS=0x7f0d9000  SMBIOS 3.0=0x7f0d7000  ESRT=0x7f0d4158  MEMATTR=0x6f699018  TPMEventLog=0x66e32018
Aug 26 20:39:37 bedik002 kernel: Kernel is locked down from EFI secure boot; see https://wiki.debian.org/SecureBoot
Aug 26 20:39:37 bedik002 kernel: ACPI: UEFI 0x000000007FFFC000 000236 (v01 HPQOEM 8362     00000001 HP   00040000)
Aug 26 20:39:37 bedik002 kernel: ACPI: UEFI 0x000000007FFFB000 000042 (v01 HPQOEM 8362     00000002 HP   00040000)
Aug 26 20:39:37 bedik002 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns
Aug 26 20:39:37 bedik002 kernel: ACPI: Core revision 20190509
Aug 26 20:39:37 bedik002 kernel: pci 0000:00:02.0: BAR 2: assigned to efifb
Aug 26 20:39:37 bedik002 kernel: Registered efivars operations
Aug 26 20:39:37 bedik002 kernel: Asymmetric key parser 'x509' registered
Aug 26 20:39:37 bedik002 kernel: efifb: probing for efifb
Aug 26 20:39:37 bedik002 kernel: efifb: framebuffer at 0x90000000, using 8100k, total 8100k
Aug 26 20:39:37 bedik002 kernel: efifb: mode is 1920x1080x32, linelength=7680, pages=1
Aug 26 20:39:37 bedik002 kernel: efifb: scrolling: redraw
Aug 26 20:39:37 bedik002 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Aug 26 20:39:37 bedik002 kernel: fb0: EFI VGA frame buffer device
Aug 26 20:39:37 bedik002 kernel: Loading compiled-in X.509 certificates
Aug 26 20:39:37 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
Aug 26 20:39:37 bedik002 kernel: Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def'
Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db
Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db
Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:db
Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Hewlett-Packard Company: HP UEFI Secure Boot 2013 DB key: 1d7cf2c2b92673f69c8ee1ec7063967ab9b62bec'
Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:MokListRT

my key:
Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'bedik002 module signing key: b1025ea690c4c8f9593b0a158045e72586a3c12f'

Aug 26 20:39:37 bedik002 kernel: integrity: Loading X.509 certificate: UEFI:MokListRT
Aug 26 20:39:37 bedik002 kernel: integrity: Loaded X.509 cert 'Debian Secure Boot CA: 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
Aug 26 20:39:37 bedik002 kernel: fb0: switching to inteldrmfb from EFI VGA
Aug 26 20:39:37 bedik002 kernel: EFI Variables Facility v0.08 2004-May-17
Aug 26 20:39:37 bedik002 kernel: pstore: Registered efi as persistent store backend
Aug 26 20:39:38 bedik002 systemd[1]: Mounting /boot/efi...
Aug 26 20:39:38 bedik002 systemd[1]: Mounted /boot/efi.
Aug 26 20:39:42 bedik002 systemd[1201]: Listening on GnuPG network certificate management daemon.
Aug 26 20:39:55 bedik002 systemd[1546]: Listening on GnuPG network certificate management daemon.
-------------------------------


-- Package-specific info:
** Version:
Linux version 5.2.0-2-amd64 (debian-kernel@lists.debian.org) (gcc version 8.3.0 (Debian 8.3.0-21)) #1 SMP Debian 5.2.9-2 (2019-08-21)

** Command line:
BOOT_IMAGE=/vmlinuz-5.2.0-2-amd64 root=/dev/mapper/sda_crypted ro rootflags=subvol=btroot systemd.show_status=1 quiet quiet

** Not tainted

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: HP
product_name: HP Pavilion Laptop 14-bk0xx
product_version: Type1ProductConfigId
chassis_vendor: HP
chassis_version: Chassis Version
bios_vendor: Insyde
bios_version: F.18
board_vendor: HP
board_name: 8362
board_version: 46.24

** Loaded modules:
nft_limit
bnep
nft_reject_ipv6
nf_reject_ipv6
nft_reject
fuse
nft_ct
nsh
nf_conncount
nf_nat
nf_conntrack
nf_defrag_ipv6
nf_defrag_ipv4
nf_tables_set
nft_counter
nf_tables
nfnetlink
nls_ascii
nls_cp437
vfat
fat
ext4
mbcache
jbd2
crc32c_generic
snd_soc_skl
snd_soc_skl_ipc
snd_hda_codec_hdmi
snd_soc_sst_ipc
snd_soc_sst_dsp
snd_hda_ext_core
snd_soc_acpi_intel_match
snd_soc_acpi
snd_hda_codec_realtek
intel_rapl
snd_hda_codec_generic
ledtrig_audio
snd_soc_core
snd_compress
x86_pkg_temp_thermal
intel_powerclamp
coretemp
snd_hda_intel
btusb
btrtl
btbcm
btintel
kvm_intel
bluetooth
snd_hda_codec
snd_hda_core
uvcvideo
iwlwifi
snd_hwdep
kvm
snd_pcm
videobuf2_vmalloc
joydev
videobuf2_memops
irqbypass
videobuf2_v4l2
snd_timer
videobuf2_common
efi_pstore
intel_cstate
cfg80211
videodev
intel_uncore
drbg
media
serio_raw
wmi_bmof
pcspkr
intel_rapl_perf
hp_wmi
ansi_cprng
sparse_keymap
efivars
snd
ecdh_generic
iTCO_wdt
iTCO_vendor_support
elan_i2c
ecc
mei_me
watchdog
rfkill
soundcore
crc16
sg
mei
processor_thermal_device
intel_pch_thermal
intel_soc_dts_iosf
battery
tpm_crb
hp_accel
int3403_thermal
tpm_tis
int340x_thermal_zone
pcc_cpufreq
tpm_tis_core
lis3lv02d
tpm
input_polldev
hp_wireless
rng_core
evdev
ac
int3400_thermal
acpi_thermal_rel
acpi_pad
sha512_ssse3
sunrpc
sha512_generic
efivarfs
ip_tables
x_tables
autofs4
btrfs
xor
zstd_decompress
zstd_compress
raid6_pq
libcrc32c
dm_crypt
dm_mod
sd_mod
crct10dif_pclmul
crc32_pclmul
i915
crc32c_intel
ghash_clmulni_intel
i2c_algo_bit
aesni_intel
drm_kms_helper
xhci_pci
xhci_hcd
ahci
libahci
aes_x86_64
crypto_simd
cryptd
r8169
libata
psmouse
glue_helper
usbcore
drm
i2c_i801
scsi_mod
realtek
libphy
usb_common
wmi
video
button


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-5.2.0-2-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.135
ii  kmod                                    26-1
ii  linux-base                              4.6

Versions of packages linux-image-5.2.0-2-amd64 recommends:
ii  apparmor             2.13.3-4
ii  firmware-linux-free  3.4

Versions of packages linux-image-5.2.0-2-amd64 suggests:
pn  debian-kernel-handbook  <none>
ii  grub-efi-amd64          2.04-2
pn  linux-doc-5.2           <none>

Versions of packages linux-image-5.2.0-2-amd64 is related to:
pn  firmware-amd-graphics     <none>
pn  firmware-atheros          <none>
pn  firmware-bnx2             <none>
pn  firmware-bnx2x            <none>
pn  firmware-brcm80211        <none>
pn  firmware-cavium           <none>
pn  firmware-intel-sound      <none>
pn  firmware-intelwimax       <none>
pn  firmware-ipw2x00          <none>
pn  firmware-ivtv             <none>
pn  firmware-iwlwifi          <none>
pn  firmware-libertas         <none>
pn  firmware-linux-nonfree    <none>
pn  firmware-misc-nonfree     <none>
pn  firmware-myricom          <none>
pn  firmware-netxen           <none>
pn  firmware-qlogic           <none>
pn  firmware-realtek          <none>
pn  firmware-samsung          <none>
pn  firmware-siano            <none>
pn  firmware-ti-connectivity  <none>
pn  xen-hypervisor            <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 5.3.7-1

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 935945@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 20 Oct 2019 00:56:32 +0200
Binary: linux-doc linux-doc-5.3 linux-headers-5.3.0-1-common linux-source linux-source-5.3 linux-support-5.3.0-1
Source: linux
Architecture: all source
Version: 5.3.7-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 935945 940530 940726
Description: 
 linux-doc  - Linux kernel specific documentation (meta-package)
 linux-doc-5.3 - Linux kernel specific documentation for version 5.3
 linux-headers-5.3.0-1-common - Common header files for Linux 5.3.0-1
 linux-source - Linux kernel source (meta-package)
 linux-source-5.3 - Linux kernel source for version 5.3 with Debian patches
 linux-support-5.3.0-1 - Support files for Linux 5.3
Changes:
 linux (5.3.7-1) unstable; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.3
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
     - mISDN: enforce CAP_NET_RAW for raw sockets (CVE-2019-17055)
     - appletalk: enforce CAP_NET_RAW for raw sockets (CVE-2019-17054)
     - ax25: enforce CAP_NET_RAW for raw sockets (CVE-2019-17052)
     - ieee802154: enforce CAP_NET_RAW for raw sockets (CVE-2019-17053)
     - nfc: enforce CAP_NET_RAW for raw sockets (CVE-2019-17056)
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
     - nl80211: validate beacon head (CVE-2019-16746)
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
 .
   [ Aurelien Jarno ]
   * [riscv64] Enable SOC_SIFIVE. Do not select CLK_SIFIVE,
     CLK_SIFIVE_FU540_PRCI, SIFIVE_PLIC, SERIAL_SIFIVE and
     SERIAL_SIFIVE_CONSOLE as they are selected by SOC_SIFIVE.
   * [riscv64] Install DTBS using dtbs_install target.
   * [riscv64] Enable SPI_SIFIVE.
   * [riscv64] Enable SERIAL_EARLYCON_RISCV_SBI.
   * [riscv64] Enable MMC, MMC_SPI.
   * [riscv64] udeb: Add mmc-core-modules and mmc-modules.
   * [riscv64] Fix memblock reservation for device tree blob.
   * [riscv64] Clear load reservations while restoring hart contexts.
 .
   [ Ben Hutchings ]
   * [mips*] Revert "Only define MAX_PHYSMEM_BITS on Loongson-3"
   * KEYS: Re-enable SECONDARY_TRUSTED_KEYRING, dropped in 5.2.6-1 by
     mis-merge (Closes: #935945)
 .
   [ John Paul Adrian Glaubitz ]
   * [m68k] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
   * [hppa] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
   * [sh4] Enable CONFIG_CRYPTO_MANAGER_DISABLE_TESTS
 .
   [ Salvatore Bonaccorso ]
   * RDMA/cxgb4: Do not dma memory off of the stack (CVE-2019-17075)
   * ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()
     (CVE-2019-15098)
 .
   [ Romain Perier ]
   * [armel/rpi] Enable CONFIG_BRCMFMAC_SDIO (Closes: #940530)
 .
   [ Héctor Orón Martínez ]
   * [x86] Enable ASoC: SOF sound driver (Closes: #940726)
Checksums-Sha1: 
 dd39fa2e65c62ec7c17add4d1578bbbff0429bd3 197683 linux_5.3.7-1.dsc
 45d9f10d69dceefafb5e9d1e29ad3e6e58bb96ff 112780220 linux_5.3.7.orig.tar.xz
 ca48db4fb3ff8e40daf4b8dbdfaa598e92f673b5 1161944 linux_5.3.7-1.debian.tar.xz
 71a522cf99e7872587c484cb2722bc2a08c4c5ad 48127 linux_5.3.7-1_source.buildinfo
 45a3592576cd34f2c145fec7cf078ee303eb0314 23082928 linux-doc-5.3_5.3.7-1_all.deb
 5b297e8a819ae1e44c9c3ab779b492c25d76b642 916 linux-doc_5.3.7-1_all.deb
 86212659324eaf57c5a595e3b5efda1705ced0f4 8241652 linux-headers-5.3.0-1-common_5.3.7-1_all.deb
 5d01961c534b93f080166348857e291c466eeca8 111565576 linux-source-5.3_5.3.7-1_all.deb
 b1f295b76ee1f3036bef1e2e250ba22142fa0a09 912 linux-source_5.3.7-1_all.deb
 f8d8f14538bfcb93dbc2ddda3b4595d5c3c1a90d 83344 linux-support-5.3.0-1_5.3.7-1_all.deb
 ad6e953567931073c23451652ceb12cec45789cc 53027 linux_5.3.7-1_all.buildinfo
Checksums-Sha256: 
 f725294a5feb858139b883e06173869822e13f3946416d0c2c59c40b05e34348 197683 linux_5.3.7-1.dsc
 8a020a6770a87aa332be1f2cbf419b99b6c33bb578a27a91bea1011ec7ea860a 112780220 linux_5.3.7.orig.tar.xz
 ce04f29431a3a8fb6cb17f6c2cdce6201130c99c24cd7e1ba0198f4334352de6 1161944 linux_5.3.7-1.debian.tar.xz
 b48149c4befeda3f341dbe046efdb49e83434779a4109a7646d5984aa9fe8fcf 48127 linux_5.3.7-1_source.buildinfo
 b10f9939021844b5556f84fba3713aa830020892d857c452e407b76aa7f7334d 23082928 linux-doc-5.3_5.3.7-1_all.deb
 9d05cb498d530c8aab18d70784fdda212a16a90c5be5bed87d4dca2abd7a3c20 916 linux-doc_5.3.7-1_all.deb
 8308c4de8557bfc5f5aacd4103b5c0a40e57c3f9e5f22a11d9e6681d813e6cae 8241652 linux-headers-5.3.0-1-common_5.3.7-1_all.deb
 6ad099c99fe4b90dd65f0e75270fbca1e80ac4964a3a41afd58ab5f436d95f3e 111565576 linux-source-5.3_5.3.7-1_all.deb
 fbf230a975ff9578713066afc2a2ae1382ae47ad1b3045a042d7ff9ab33b30a1 912 linux-source_5.3.7-1_all.deb
 e38b36003e5de24817cf02b59cd7a125cfebbb0f09629087f25df1416fca8e3f 83344 linux-support-5.3.0-1_5.3.7-1_all.deb
 8b7276033768df6531c0394b758319a9784261121b4382be1ca16bd47f77fbe8 53027 linux_5.3.7-1_all.buildinfo
Files: 
 224ae06dcf067d07244098801e5e6e50 197683 kernel optional linux_5.3.7-1.dsc
 0c287d56961660bf8c8e22a552ce3f24 112780220 kernel optional linux_5.3.7.orig.tar.xz
 d0372e61ee173e29920e571ca37298e3 1161944 kernel optional linux_5.3.7-1.debian.tar.xz
 20071d3bfe471705adc486dced8e64a5 48127 kernel optional linux_5.3.7-1_source.buildinfo
 8bbb3c27f0b062f027cf82197f25b165 23082928 doc optional linux-doc-5.3_5.3.7-1_all.deb
 f09b6031409c84585c75241f9c429aa4 916 doc optional linux-doc_5.3.7-1_all.deb
 b6cbc2cee8cbe6fa16d6cbecc6c8d909 8241652 kernel optional linux-headers-5.3.0-1-common_5.3.7-1_all.deb
 1f29f7ab89f6eac21cc948101b2a105d 111565576 kernel optional linux-source-5.3_5.3.7-1_all.deb
 190dbee7f69bd31fe636929d1debb758 912 kernel optional linux-source_5.3.7-1_all.deb
 8c4918bc0b4c324acc9a4c5cff3c06f9 83344 devel optional linux-support-5.3.0-1_5.3.7-1_all.deb
 de597c307bb08c7012faab98c841aa31 53027 kernel optional linux_5.3.7-1_all.buildinfo

-----BEGIN PGP SIGNATURE-----
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=jbPc
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: