[From nobody Wed Apr 29 12:07:16 2026
Received: (at submit) by bugs.debian.org; 30 Oct 2023 19:07:21 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
 (2021-04-09) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=4.0 tests=BAYES_00, FOURLA, MD5_SHA1_SUM,
 SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no
 version=3.4.6-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 15; hammy, 150; neutral, 40; spammy,
 0. spammytokens: hammytokens:0.000-+--sk:taint_o, 0.000-+--sk:TAINT_O,
 0.000-+--sk:taint_u, 0.000-+--sk:TAINT_U, 0.000-+--trixie
Return-path: &lt;agx@sigxcpu.org&gt;
Received: from honk.sigxcpu.org ([24.134.29.49]:56138)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.94.2) (envelope-from &lt;agx@sigxcpu.org&gt;) id 1qxXbd-00CDIs-Iz
 for submit@bugs.debian.org; Mon, 30 Oct 2023 19:07:21 +0000
Received: from localhost (localhost [127.0.0.1])
 by honk.sigxcpu.org (Postfix) with ESMTP id D5D33FB03
 for &lt;submit@bugs.debian.org&gt;; Mon, 30 Oct 2023 20:07:16 +0100 (CET)
Received: from honk.sigxcpu.org ([127.0.0.1])
 by localhost (honk.sigxcpu.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 13tecHwqMZZd for &lt;submit@bugs.debian.org&gt;;
 Mon, 30 Oct 2023 20:07:15 +0100 (CET)
Date: Mon, 30 Oct 2023 20:07:13 +0100
From: Guido =?iso-8859-1?Q?G=FCnther?= &lt;agx@sigxcpu.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: Initramfs significantly larger
Message-ID: &lt;ZT_-4ZPeGaXp4VHB@qwark.sigxcpu.org&gt;
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 12.0.0
Delivered-To: submit@bugs.debian.org

Source: osk-sdl
Version: 0.67.1-2
Severity: important

As of 40410cfef9f9e811db333a3406a701ddd18a4f8e the initramfs on the
Librem 5 grew quite a bit.

usr/lib/aarch64-linux-gnu/dri/ went from 22MB to 100MB making /boot run
out of space for some users.

I assume reverting the above would do the trick but haven't verified
yet.

Cheers,
 -- Guido

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable'), (1, 'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 6.5.0-1-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
]