Your message dated Sat, 12 Apr 2025 15:32:45 +0000 with message-id <E1u3cqb-00Ay39-D5@fasolo.debian.org> and subject line Bug#1100634: fixed in linux 6.13.11-1~exp1 has caused the Debian Bug report #1100634, regarding linux: Please enable CONFIG_KALLSYMS_ALL for arm64 kernel to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1100634: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100634 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: Please enable CONFIG_KALLSYMS_ALL for arm64 kernel
- From: Hastalavista_debian <hastalavista_debian@murena.io>
- Date: Sun, 16 Mar 2025 13:20:28 +0000
- Message-id: <174213122881.128901.12161296130502030351.reportbug@localhost>
Source: linux Version: 6.1.129-1 Severity: wishlist X-Debbugs-Cc: hastalavista_debian@murena.io Dear Maintainer, I wish to use LKRG (https://lkrg.org) on my RPi, but it reported error "LKRG requires CONFIG_KALLSYMS_ALL" when building, which is strange to me because I have never run into such problems on amd64 laptops. I checked config file of arm64 kernel 6.1.129 and indeed it didn't have CONFIG_KALLSYMS_ALL enabled. I wish Debian can have CONFIG_KALLSYMS_ALL enabled by default, so that security tools like LKRG can run. -- System Information: Debian Release: 12.10 APT prefers stable-security APT policy: (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 6.1.0-31-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: 1100634-close@bugs.debian.org
- Subject: Bug#1100634: fixed in linux 6.13.11-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 12 Apr 2025 15:32:45 +0000
- Message-id: <E1u3cqb-00Ay39-D5@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: linux Source-Version: 6.13.11-1~exp1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1100634@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 12 Apr 2025 15:55:54 +0200 Source: linux Architecture: source Version: 6.13.11-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1100634 Changes: linux (6.13.11-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.11 . [ Emanuele Rocca ] * [arm64,powerpc,ppc64,ppc64el,riscv64,s390x] Enable KALLSYMS_ALL on all architectures where DEBUG_INFO_BTF is on (Closes: #1100634) * [arm64] Enable ARM_CCA_GUEST as module to run Debian in a protected VM under the Arm Confidential Compute Architecture (CCA). Checksums-Sha1: 194133f7ec369d368ccf956b90feb1cb07cdca73 198223 linux_6.13.11-1~exp1.dsc 4665c2276d7dc04590ae34c8ff0b9ea016b3f194 151562728 linux_6.13.11.orig.tar.xz ffde77c545b36763cf58a95d30b621d96dc28ced 1529600 linux_6.13.11-1~exp1.debian.tar.xz e828443dce79d03db880f603a52f1cbdf0d9fb18 6641 linux_6.13.11-1~exp1_source.buildinfo Checksums-Sha256: 3b39276f5e815f60fc55c377da005dd66e5fc90b91eb7fd91faa8d4ca0d7890b 198223 linux_6.13.11-1~exp1.dsc 5ee1f696ae0b71d2a444ce8d6070e7b52f8377bd982a8c0de207aeb968e14d93 151562728 linux_6.13.11.orig.tar.xz 990aea73c8f8c3fe7d84eacfbe0881fb1fccff0f9a0ace00f4f5a8fa10afbc02 1529600 linux_6.13.11-1~exp1.debian.tar.xz 81e7183fa8f1d86a5d13a87096093f264b956d6c785d4e8a41d2f59d41af4574 6641 linux_6.13.11-1~exp1_source.buildinfo Files: f39c0ca122922ed80ae55b20417ed3f5 198223 kernel optional linux_6.13.11-1~exp1.dsc 8b98e581eb26359252fb57ad593ced8b 151562728 kernel optional linux_6.13.11.orig.tar.xz b52d7042e18ee56b13f788308a799176 1529600 kernel optional linux_6.13.11-1~exp1.debian.tar.xz eddd2c0221729c4bc368e0c0ea3d52b3 6641 kernel optional linux_6.13.11-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmf6co5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EgX4P/0t5e9rqURWBLLgCygWVdN/Tx/VGEglB GJ7IRJdoDfjTmKuGDSz0JKmvh5t7wupDZP1jfgNNaAiVrMHh9OfZCw6fSvZwJIwq ErrXvLE1FBNy9UfFtr5y+EAY9Z28xaJroNSZaeE//SwqA9CChq/AqzOqHFdhLeyh s/Jwo0fBTojItqB4fXSsVK+97wHbGAiaih2TSZOPP2mIEjoiBJC97leOWIgJ3XI5 k69ZgktVJS65Pyo59Ka7cn0n+QCG3PZqzPN6Z4uO50pRj73tAQO6u9ZhCTsqFT0o ZeyPeAIb0fnW0O8cH4omcPqjtRjCIc+FdJuCGI+rbpGp2aQN5lYf8GprqF9af6PA GJzNwLhjDYzixPOLBpuGqBDLXci9m3Yeym/aT5smuiSO6P4wfpHvrMPFvKMMY2R2 50Nj7OsaZNvDhF3rodwH/rhJf4WVUXOt91YoH7UCD9Nes8K4nzN4Ijr+zATELHwn XPucpIT1DTiXE/Bbx+JF41jiytqvsR2OJEyiGZNAJQ0dgFkY3KWBXD3iqmP/OmDz f5evJPKxll4NFsXJUEp6+az8K+b4iHw+3SAxMaaHGBPbFUFZcs7TuHoPFk48L3kY vv9FViH4F48+cIMpAD4SYzBaaQ2hOaddBYjfGwJezkfhd1U7TQ7FKSt3cN0PgmvD AXl7gPkKNajl =9AmY -----END PGP SIGNATURE-----Attachment: pgpxrePHJ4W3c.pgp
Description: PGP signature
--- End Message ---