Bug#932159: drm:i915_gem_init_stolen *ERROR* Stolen reserved area outside stolen memory zone

2019-07-19 Thread Nicholas D Steeves
Update: Confirmed that enabling CSM does not solve this stolen memory issue. Additionally, neither does i915.fastboot=1 <- that one was only tried for the sake of completeness, because several forum posts said it did the trick. $ cat /proc/mtrr reg00: base=0x0 (0MB), size=32768MB, co

Bug#932159: drm:i915_gem_init_stolen *ERROR* Stolen reserved area outside stolen memory zone

2019-07-19 Thread Nicholas D Steeves
Control: affects -1 linux-image-4.19.0-5-amd64 linux-image-4.19.0-1-amd64 linux-image-4.9.0-9-amd64 linux-image-4.9.0-1-amd64 Adding the specific kernel packages as well as attaching /proc/iomem the /proc/iomem output that is probably necessary to resolve this bug. Cheers, Nicholas -

Processed: Re: Bug#932159: drm:i915_gem_init_stolen *ERROR* Stolen reserved area outside stolen memory zone

2019-07-19 Thread Debian Bug Tracking System
Processing control commands: > affects -1 linux-image-4.19.0-5-amd64 linux-image-4.19.0-1-amd64 > linux-image-4.9.0-9-amd64 linux-image-4.9.0-1-amd64 Bug #932159 [src:linux] drm:i915_gem_init_stolen *ERROR* Stolen reserved area outside stolen memory zone Added indication that 932159 affects linu

linux-latest_80+deb9u8_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new

2019-07-19 Thread Debian FTP Masters
Mapping stretch to oldstable. Mapping oldstable to oldstable-proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 19 Jul 2019 21:23:23 +0200 Source: linux-latest Architecture: source Version: 80+deb9u8 Distribution: stretch Urgency: medium Maintainer

Processing of linux-latest_80+deb9u8_source.changes

2019-07-19 Thread Debian FTP Masters
linux-latest_80+deb9u8_source.changes uploaded successfully to localhost along with the files: linux-latest_80+deb9u8.dsc linux-latest_80+deb9u8.tar.xz linux-latest_80+deb9u8_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)

linux-signed-i386_4.19.37+6_source.changes ACCEPTED into unstable

2019-07-19 Thread Debian FTP Masters
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 19 Jul 2019 00:23:17 +0200 Source: linux-signed-i386 Binary: kernel-image-4.19.0-5-686-di nic-modules-4.19.0-5-686-di nic-wireless-modules-4.19.0-5-686-di nic-shared-modules-4.19.0-5-686-di

Processing of linux-signed-i386_4.19.37+6_source.changes

2019-07-19 Thread Debian FTP Masters
linux-signed-i386_4.19.37+6_source.changes uploaded successfully to localhost along with the files: linux-signed-i386_4.19.37+6.dsc linux-signed-i386_4.19.37+6.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

linux-signed-arm64_4.19.37+6_source.changes ACCEPTED into unstable

2019-07-19 Thread Debian FTP Masters
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 19 Jul 2019 00:23:17 +0200 Source: linux-signed-arm64 Binary: kernel-image-4.19.0-5-arm64-di nic-modules-4.19.0-5-arm64-di nic-wireless-modules-4.19.0-5-arm64-di nic-shared-modules-4.19.0-5

Processing of linux-signed-arm64_4.19.37+6_source.changes

2019-07-19 Thread Debian FTP Masters
linux-signed-arm64_4.19.37+6_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_4.19.37+6.dsc linux-signed-arm64_4.19.37+6.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

linux-signed-amd64_4.19.37+6_source.changes ACCEPTED into unstable

2019-07-19 Thread Debian FTP Masters
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 19 Jul 2019 00:23:17 +0200 Source: linux-signed-amd64 Binary: kernel-image-4.19.0-5-amd64-di nic-modules-4.19.0-5-amd64-di nic-wireless-modules-4.19.0-5-amd64-di nic-shared-modules-4.19.0-5

Processing of linux-signed-amd64_4.19.37+6_source.changes

2019-07-19 Thread Debian FTP Masters
linux-signed-amd64_4.19.37+6_source.changes uploaded successfully to localhost along with the files: linux-signed-amd64_4.19.37+6.dsc linux-signed-amd64_4.19.37+6.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processed: Re: Bug#932304: do_IRQ: 0.37 No irq handler for vector

2019-07-19 Thread Debian Bug Tracking System
Processing control commands: > tags -1 fixed-upstream patch pending Bug #932304 [src:linux] do_IRQ: 0.37 No irq handler for vector Added tag(s) fixed-upstream, pending, and patch. -- 932304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932304 Debian Bug Tracking System Contact ow...@bugs.de

Bug#932304: do_IRQ: 0.37 No irq handler for vector

2019-07-19 Thread Mathieu Malaterre
Control: tags -1 fixed-upstream patch pending OK, I found it: b7107a67f0d1 x86/irq: Handle spurious interrupt after shutdown gracefully

Bug#932451: linux-image-4.19.0-5-amd64: radeon spits EDID VGA errors when monitor is unplugged

2019-07-19 Thread Francesco Potortì
Package: src:linux Version: 4.19.37-5 Severity: minor When power is removed from the monitor attached to the VGA interface, the logs start filling with these, once every 10 seconds: kernel: [217110.507445] i2c i2c-0: sendbytes: NAK bailout. kernel: [217110.617797] [drm:radeon_vga_detect [radeon

Bug#932436: linux-image-4.9.0-9-amd64: loop devices cannot be removed with losetup -d /dev/loopX

2019-07-19 Thread Andreas Hofmeier
Package: src:linux Version: 4.9.168-1+deb9u3 Severity: important -- Package-specific info: ** Version: Linux version 4.9.0-9-amd64 (debian-kernel@lists.debian.org) (gcc version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.168-1+deb9u3 (2019-06-16) ** Command line: BOOT_IMAGE=/vm

Bug#932304: do_IRQ: 0.37 No irq handler for vector

2019-07-19 Thread Mathieu Malaterre
Package: src:linux Followup-For: Bug #932304 Installing a kernel from git/master show that the symptoms are now gone. -- System Information: Debian Release: 10.0 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.2.0+ (SMP w/4 CPU cores) Kernel taint

Processed: new submitter

2019-07-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > submitter 629905 ! Bug #629905 [nfs-common] NFS3 mounts are broken after upgrade squeeze --> testing Changed Bug submitter to 'Harald Dunkel ' from 'Harald Dunkel '. > submitter 632970 ! Bug #632970 [xserver-xephyr] cannot set keyboard layout fo