Your message dated Fri, 20 Aug 2021 21:35:32 +0000 with message-id <E1mHCAm-0002vr-Uw@fasolo.debian.org> and subject line Bug#987815: fixed in linux 5.13.12-1~exp1 has caused the Debian Bug report #987815, regarding MPTCP is not enabled to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 987815: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987815 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: MPTCP is not enabled
- From: chrysn <chrysn@fsfe.org>
- Date: Fri, 30 Apr 2021 11:18:40 +0200
- Message-id: <YIvLcBTVarDqbA8V@hephaistos.amsuess.com>
Source: linux Version: 5.10.28-1 Severity: wishlist The current configuration does not enable the multipath TCP functionality provided by the kernel through the MPTCP (and the the-default MPTCP_IPV6) binary options. These have been available since kernel version 5.6. When enabled, user space applications can opt in to MPTCP behavior by using the new IPPROTO_MPTCP; regular TCP connections are unaffected. Applications using this are starting slowly (outside of the Apple ecosystem where this has been in used for years to ensure smooth network handovers), but having this available widely would make it easier for application developers to verify MPTCP operation on systems where they can't easily (or don't have the experience to) rebuild their kernel with CONFIG_MPTCP=y. Please consider enabling this feature. -- System Information: Debian Release: 11.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.12.0-rc5 (SMP w/8 CPU threads) Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled -- To use raw power is to make yourself infinitely vulnerable to greater powers. -- Bene Gesserit axiomAttachment: signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 987815-close@bugs.debian.org
- Subject: Bug#987815: fixed in linux 5.13.12-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 20 Aug 2021 21:35:32 +0000
- Message-id: <E1mHCAm-0002vr-Uw@fasolo.debian.org>
- Reply-to: Bastian Blank <waldi@debian.org>
Source: linux Source-Version: 5.13.12-1~exp1 Done: Bastian Blank <waldi@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 987815@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank <waldi@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 20 Aug 2021 22:39:29 +0200 Source: linux Architecture: source Version: 5.13.12-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Bastian Blank <waldi@debian.org> Closes: 987815 992219 992221 992251 Changes: linux (5.13.12-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.10 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.11 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.12 . [ Salvatore Bonaccorso ] * net: Enable MPTCP (Closes: #987815) . [ Bastian Blank ] * [mips*] Increase RELOCATION_TABLE_SIZE to 0x1c0000. * Enable SECURITY_LANDLOCK, SECURITY_PATH. * Fix external modules build. (closes: #992219) * Force more compressions modules into main installer package. (closes: #992221) * Drop redundant patch for overlay in user namespace. . [ Uwe Kleine-König ] * [x86] Enable X86_PLATFORM_DRIVERS_DELL which is needed to keep some Dell specific drivers. (Closes: #992251) Checksums-Sha1: b1a5ef152ec05f4c36a851626ab950f3a5c21749 200748 linux_5.13.12-1~exp1.dsc c51741af72074f615a4aebea59e93cd6b08020a2 125123768 linux_5.13.12.orig.tar.xz eb53183bd7970125afde51e0fb691bfc8d4f1322 1390396 linux_5.13.12-1~exp1.debian.tar.xz 5c326cad3fcb810672215a0cf96add9f965702b6 6356 linux_5.13.12-1~exp1_source.buildinfo Checksums-Sha256: afe9d4a5692da5f36068702a2129ae55560900ea9dbcb03d0564025a53433832 200748 linux_5.13.12-1~exp1.dsc e972c0f3f26c7fad99061a551965bc2b4386a1808e896ad19792a68998928688 125123768 linux_5.13.12.orig.tar.xz 1f08eefa39db9d26b09488c62a0074322452c920e01c1f1eb8b462a23e7b9028 1390396 linux_5.13.12-1~exp1.debian.tar.xz 43d1eb454d1f7479dc3b893f717000038efcc634cabf82cbc38646c7e4ef6320 6356 linux_5.13.12-1~exp1_source.buildinfo Files: c564c0c7e5d328b942595f5e7e7f8e8d 200748 kernel optional linux_5.13.12-1~exp1.dsc ebc092e62ffe38cf472e7642f52fd4d0 125123768 kernel optional linux_5.13.12.orig.tar.xz 7bc610164d535ba99dc629cb1057b75c 1390396 kernel optional linux_5.13.12-1~exp1.debian.tar.xz 5c8e50334ab01cbb201e94d39a615809 6356 kernel optional linux_5.13.12-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQFFBAEBCgAvFiEER3HMN63jdS1rqjxLbZOIhYpp/lEFAmEgGhoRHHdhbGRpQGRl Ymlhbi5vcmcACgkQbZOIhYpp/lFCGggA7uMPX8BgN+7bIQW/xW+X2rEQrnVjHE9l rkOsF5J1HFEpZVJhAuDVRCU8MIVTLUyxfK1ztmq/dIcE98uhCfhAh7nn5F84Em8V EmOwb0FeRaIhIghyRPFZ3Wng3tcrftItbSDNVe5m5C0uHozc/znNiNjz+7+0x31m uByGLoGfUxcMrLNPN6f8ReNOyhZaXsYxJdiPvlGYeebfxEI+Px5QVtZJ+u+Lnwq2 NQj6xXt5XrT2/PuMTVRjJC2PXMWHvJGLdvo2FpTIcGekVoGZ/OgI7WfJ4TvxIN72 +N3rcSChDG2+h5jM9ADcIQFFhUQx+5Vo40lu5EIfRZ/1wtdsyb1aHQ== =/MzY -----END PGP SIGNATURE-----
--- End Message ---