Hi,
29 août 2022, 10:30 de rushil...@gmail.com:
> Does the firmware iwflwifi contains only 8265-22.ucode and 8265-36.ucode or
> 8265-22 to 8265.36 i.e , all the different firmwares like 23, 24 , 25 etc
>
Under Bullseye:
$ apt-file list firmware-iwlwifi
[...]firmware-iwlwifi:
Processing commands for cont...@bugs.debian.org:
> reassign 1018779 src:linux 5.10.136-1
Bug #1018779 [linux-image-amd64] nouveau DRM: Failure to read SCDC_TMDS_CONFIG:
-6 error message
Bug reassigned from package 'linux-image-amd64' to 'src:linux'.
No longer marked as found in versions
Processing commands for cont...@bugs.debian.org:
> forcemerge 1017425 1018776
Bug #1017425 [src:linux] [i386] Unconditional LFENCE instructions in
FILL_RETURN_BUFFER
Bug #1017494 [src:linux] [i386] Unconditional LFENCE instructions in
FILL_RETURN_BUFFER
Bug #1018060 [src:linux]
Package: linux-image-amd64
Version: 5.10.136-1
I recently bought a new monitor the cheap HP M24f 2D9K0AA and connected
via HDMI port to the NVIDIA GeForce GT 630 card.
When I switch twice virtual terminal (CTRL-ALT-F2 - CTRL-ALT-F7) it
happens that the kernel pollutes the VT screen with this
Package: src:linux
Version: 5.18.16-1
Severity: important
X-Debbugs-Cc: m...@posteo.de
Dear Maintainer,
* What led up to the situation?
Booting Kernel linux-image-5.18.0-4-686-pae on a Pentium 3 600
(Coppermine) or an Athlon XP (I can find out the exact model
number if you need).
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 1018752 + pending
Bug #1018752 [src:linux] src:linux: new certificate used for Secure Boot
Added tag(s)
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 1017894 + pending
Bug #1017894 [src:linux] linux-image-5.18.0-4-arm64: Kernel oops triggered by
heavy
Hi Martin,
On Tue, Aug 30, 2022 at 03:18:51PM +0300, Martin-??ric Racine wrote:
> On Tue, Aug 30, 2022 at 3:00 PM Peter Zijlstra wrote:
> > On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-??ric Racine wrote:
> > > On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra
> > > wrote:
> > > >
> > > > On
On Tue, Aug 30, 2022 at 3:00 PM Peter Zijlstra wrote:
> On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-Éric Racine wrote:
> > On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote:
> > >
> > > On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote:
> > >
> > > > So that puts the whole
On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-Éric Racine wrote:
> Greetings,
>
> On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote:
> >
> > On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote:
> >
> > > So that puts the whole __FILL_RETURN_BUFFER inside an alternative, and
> > >
Greetings,
On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote:
>
> On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote:
>
> > So that puts the whole __FILL_RETURN_BUFFER inside an alternative, and
> > we can't have nested alternatives. That's unfortunate.
>
> Well, both alternatives
Package: src:linux
Version: 5.10.136-1
Severity: normal
X-Debbugs-Cc: krylov.r...@gmail.com
Dear Maintainer,
On my GPD Pocket 1, the backlight worked well with the 4.19 kernel from
stretch-backports. After the upgrade to Bullseye, I cannot adjust the
backlight intensity either using the keyboard
ACL automatic-source-uploads: not allowed to upload source package
'linux-signed-5.10-i386'
Mapping oldstable-security to oldstable-proposed-updates.
binary:linux-headers-5.10-686 is NEW.
binary:linux-headers-5.10-686-pae is NEW.
binary:linux-headers-5.10-rt-686-pae is NEW.
ACL automatic-source-uploads: not allowed to upload source package
'linux-signed-5.10-arm64'
Mapping oldstable-security to oldstable-proposed-updates.
binary:linux-headers-5.10-arm64 is NEW.
binary:linux-headers-5.10-cloud-arm64 is NEW.
binary:linux-headers-5.10-rt-arm64 is NEW.
ACL automatic-source-uploads: not allowed to upload source package
'linux-signed-5.10-amd64'
Mapping oldstable-security to oldstable-proposed-updates.
binary:linux-headers-5.10-amd64 is NEW.
binary:linux-headers-5.10-cloud-amd64 is NEW.
binary:linux-headers-5.10-rt-amd64 is NEW.
On Mon, 15 Aug 2022 19:02:25 +0200 Computer Enthusiastic
wrote:
> Hello,
>
> To whom it may interests, I've successful tested the patch (see
> previous message [0]) with Debian
> kernels version 5.10.0-16-amd64 [1] from bullseye-security and,
> 5.18.0-0 [2] from bullseye-backports
>
> [0]
Source: linux
Version: 5.18.16-1
Control: found -1 5.10.127-1
Hi,
there is a new certificate used to sign the kernel modules for Secure
Boot. Its fingerprint (sha256) should be:
# CN = Debian Secure Boot Signer 2022 - linux
- 65378fdbd50b85960563bac3923b4cf6e43f60b7c969c1527ce2ca34f82f2dc5
Processing control commands:
> found -1 5.10.127-1
Bug #1018752 [src:linux] src:linux: new certificate used for Secure Boot
Marked as found in versions linux/5.10.127-1.
--
1018752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018752
Debian Bug Tracking System
Contact
18 matches
Mail list logo