Bug#1058890: fix

2024-04-13 Thread Dr . André Desgualdo Pereira
Fixed upstream and in Debian linux-image-6.1.0-20-amd64

Bug#1058890: bisect

2024-03-09 Thread Dr . André Desgualdo Pereira
I bisect the upstream kernel to find the bad commit: git bisect start # status: waiting for both good and bad commits # good: [2dde18cd1d8fac735875f2e4987f11817cc0bc2c] Linux 6.5 git bisect good 2dde18cd1d8fac735875f2e4987f11817cc0bc2c # status: waiting for bad commit, 1 good commit known # bad:

Bug#1058890: comment

2024-02-28 Thread Dr . André Desgualdo Pereira
Reported upstream: https://bugzilla.kernel.org/show_bug.cgi?id=218538

Bug#1058890: test

2024-02-21 Thread Dr . André Desgualdo Pereira
I compiled the kernel 6.1.76 from Debian sources without applying any patch and it can't wake up from suspend :-( May be there is an specific driver or module that needs to be compiled for sedutil to work properly on waking up from S3.

Bug#1058890: troubleshooting

2024-02-20 Thread Dr . André Desgualdo Pereira
I changed just the disk of the notebook and installed Debian 12 on it, without any encryption and suspend works fine on kernel 6.1.0-18. Which makes me conclude that something is wrong with some patch of that Debian kernel, not allowing the disk to be decrypted with sedutil after waking up. I

Bug#1058890: sedutil

2024-02-15 Thread Dr . André Desgualdo Pereira
New try: I recompiled sedutil after booting linux-image-6.1.0-18-amd64 (git clone --branch s3-sleep-support https://github.com/badicsalex/sedutil.git). It made no difference, i.e., I still can't get the machine to fully wake up. (sedutil compiled at linux-image-6.1.0-18-amd64 still works fine

Bug#1058890: new try

2024-02-13 Thread Dr . André Desgualdo Pereira
Adding "intel_iommu=off" to kernel boot does NOT change anything.

Bug#1058890: new try

2024-02-11 Thread Dr . André Desgualdo Pereira
Adding "init_on_alloc=0" to kernel boot does NOT change anything.

Bug#1058890: Bug Persists

2024-02-11 Thread Dr . André Desgualdo Pereira
The bug still persists with the linux-image-6.1.0-18-amd64.

Bug#1058890: More tests

2024-01-04 Thread Dr . André Desgualdo Pereira
Changing /etc/systemd/sleep.conf to have "SuspendState=standby" or "SuspendState=freeze" seems to make things worse because the notebook seems unable to enter sleep mode, while "SuspendState=mem" causes the same behavior as reported here, i. e., the notebook seems unable to wake up from

Bug#1058890: more info

2024-01-04 Thread Dr . André Desgualdo Pereira
The bug first appeared in linux-image-6.1.0-14-amd64 and persists through linux-image-6.1.0-15-amd64, linux-image-6.1.0-16-amd64 and linux-image-6.1.0-17-amd64. -- André Desgualdo Pereira

Bug#1058890: more tests

2023-12-25 Thread Dr . André Desgualdo Pereira
If I use "echo mem > /sys/power/state" instead of systemctl to suspend, the result is the same, ie, the notebook doesn't seem to fully wake up, when trying to wake up from suspend, the screen stays black. The CAPS LOCK led doesn't change when pressing the CAPS LOCK button, but the computer can

Bug#1058890: more info

2023-12-23 Thread Dr . André Desgualdo Pereira
sedutil seems to be working `$ cat /sys/module/libata/parameters/allow_tpm` result "1" and `sedutil-cli --scan` shows the disk correctly ("/dev/sda2 KINGSTON SKC600256G S4800105") If there are any further tests that can help elucidate the problem, please let me

Bug#1058890: Adding more information after tests

2023-12-20 Thread Dr . André Desgualdo Pereira
1. I tested booting with the kernel option "nomodeset", it made no difference. 2. I tested suspend by writing to /sys/power/pm_test the following successively "freezer", "devices", "platform", "processors", "core". Every single test was successful, ie, the system wake up on its own after 5

Bug#1058890: linux-image-6.1.0-16-amd64 breaks suspend

2023-12-17 Thread Dr . André Desgualdo Pereira
Package: src:linux Version: 6.1.67-1 Severity: grave Justification: renders package unusable Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? Updating the kernel * What exactly did you do (or not do) that