On 2017-11-03 13:46 +0100, Christoph Pohl wrote:
> after upgrading to kernel 4.13, the nouveau kernel module crashes when
> the kernel tries to switch to frame buffer during boot. Under 4.12,
> where everything was working fine, this was the relevant output of
> dmesg:
>
> Nov 3 09:15:04 ws6779
Processing commands for cont...@bugs.debian.org:
> forwarded 880660 https://bugs.freedesktop.org/show_bug.cgi?id=103421
Bug #880660 [src:linux] xserver-xorg-video-nouveau: Crash when kernel tries to
switch to frame buffer
Set Bug forwarded-to-address to
Processing commands for cont...@bugs.debian.org:
> reassign 886768 src:linux
Bug #886768 [linux-headers-3.16.0-5-amd64] linux-headers-3.16.0-5-amd64:
inode_change_ok() missing, breaks openafs module build
Warning: Unknown package 'linux-headers-3.16.0-5-amd64'
Bug reassigned from package
Mapping oldstable-security to oldstable-proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 09 Jan 2018 00:42:09 +
Source: linux-latest
Binary: linux-source linux-doc linux-tools linux-image-alpha-generic
linux-headers-alpha-generic
Versionn linux-image-4.9.0-3-amd64 seems Ok.
--
John Hughes, CalvaEDI S.A.S. -- An Esker Company
+33 1 4313 3131
Hi,
On 12/22/2017 02:01 AM, Hans van Kranenburg wrote:
> To: Debian xen and kernel team list, Ian Jackson
I'm replying to my own email, since there has not been a reply on the
lists to it yet.
For Ian Jackson: There's a question for you below (section "Moving
packaging repository"), can you
Processing commands for cont...@bugs.debian.org:
> found 886506 4.14.7-1
Bug #886506 [src:linux] linux-image-4.14.0-3-686-pae: Kernel panic during
reboot - since 4.14.0-2 - 4.14.0-1 works normal and boots
Marked as found in versions linux/4.14.7-1.
> severity 886506 important
Bug #886506
Package: src:linux
Version: 4.9.65-3+deb9u1
Severity: normal
Dear Maintainer,
since linux-image-4.9.0-3-amd64 DKMS sends my system into suspend.
Switching off the monitor causes suspend of the system.
With Kernel-Versions linux-image-4.9.0-1-amd64 and linux-image-4.9.0-2-
amd64 I had no
I've switched to linux-image-4.13.0-0.bpo.1-amd64 from the backports repository.
It does not seem to flicker, though now my computer won't wake up from sleep.
Hi,
The initramfs-tools-core package in Ubuntu (version 0.125ubuntu9) supports a
very useful kernel boot option "loop=":
loop= ""
path within the original root file system to loop-mount and use
as the real root file system.
However, the current Debian package
I spoke too soon, after a while my eDP-1 starts shaking when I move my mouse.
It's also shifted, or should I say rotated. The external monitor is fine now
though.
Package: src:linux
Version: 4.9.65-3+deb9u2
Severity: normal
Dear Maintainer,
* What led up to the situation?
Installed linux-image-4.9.0-5-amd64 version 4.9.65-3+deb9u2
* What exactly did you do (or not do) that was effective (or
ineffective)?
Open a gnome-terminal window, wait a
I have a similar issue with the same Linux kernel 4.14.0-3-686-pae. It's
reproducible in virtualbox 5.2, VMWare WS 14, or the physical machine
Lenovo T420s.
Attached please find the screenshot about the kernel panic.
While there is _NO_ such issue when using Linux kernel 4.14.0-3-amd64.
Thanks.
Hi,
I wanted to build a Debian-kernel by applying Linux v4.14.13-rc1
patchset against linux (4.14.12-2) from Debian/unstable.
My system is a Debian/stretch AMD64.
I consulted the Debian-kernel handbook [1] to do this the "Debian way".
The patchset was extraxted as a series from
This bug hit me too.
All my servers are using hidepid as default.
So every system I rebooted was unusable after reboot, everything
starting at boot gave the trace output, ssh'ing to the system gave
the trace output without successful ssh login :-(
--
ciao, Marc
Mapping oldstable-security to oldstable-proposed-updates.
binary:acpi-modules-3.16.0-5-586-di is NEW.
binary:acpi-modules-3.16.0-5-686-pae-di is NEW.
binary:acpi-modules-3.16.0-5-amd64-di is NEW.
binary:affs-modules-3.16.0-5-4kc-malta-di is NEW.
binary:affs-modules-3.16.0-5-loongson-2e-di is NEW.
Hans van Kranenburg writes:
> == Security update for Stretch ==
>
> On IRC I got some questions about the already earlier released XSA
> patches, which still aren't in Stretch.
It would be a lovely if a security upload that includes patches for the
following XSAs could be
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 08 Jan 2018 22:13:59 +
Source: linux
Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16
linux-support-3.16.0-5 linux-libc-dev linux-headers-3.16.0-5-all
linux-headers-3.16.0-5-all-alpha
18 matches
Mail list logo