Package: src:linux Followup-For: Bug #949020 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Just confirming that this issue is still present, causing a terrible user experience when upgrading from Buster to Bullseye on a Lenovo laptop. Verified on a 4th Gen Thinkpad X1 Carbon. Setting intel_iommu=off is confirmed as workaround. I understand from the upstream discussion that this is mostly a Lenovo firmware issue. But I still believe something needs to be done in Debian to avoid every Lenovo user having to discover this bug report and implement the workaround manually. After first experiencing a complete system failure when trying to suspend the system. A feature which worked without a flaw on Debian Buster. - -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (990, 'testing'), (700, 'stable'), (600, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386, arm64 Kernel: Linux 5.6.0-2-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -----BEGIN PGP SIGNATURE----- iIQEARYKACwWIQRoe+CASfFh7aZ6shIiBE7Lv6RhXQUCXvSVXQ4cYmpvcm5AbW9y ay5ubwAKCRAiBE7Lv6RhXd/GAQCIsozUqKlBr9BkIXoOXp7lFk9WouEh0QSYMm1F oqluMwEA34mOpMqJL7bZWRAydIEctD1rWSAg7r1kpPAel1IwxAc= =hTTU -----END PGP SIGNATURE-----