Update: Confirmed that enabling CSM does not solve this stolen memory
issue. Additionally, neither does i915.fastboot=1 <- that one was
only tried for the sake of completeness, because several forum posts
said it did the trick.
$ cat /proc/mtrr
reg00: base=0x0 (0MB), size=32768MB, co
Control: affects -1 linux-image-4.19.0-5-amd64 linux-image-4.19.0-1-amd64
linux-image-4.9.0-9-amd64 linux-image-4.9.0-1-amd64
Adding the specific kernel packages as well as attaching /proc/iomem the
/proc/iomem output that is probably necessary to resolve this bug.
Cheers,
Nicholas
-
Processing control commands:
> affects -1 linux-image-4.19.0-5-amd64 linux-image-4.19.0-1-amd64
> linux-image-4.9.0-9-amd64 linux-image-4.9.0-1-amd64
Bug #932159 [src:linux] drm:i915_gem_init_stolen *ERROR* Stolen reserved area
outside stolen memory zone
Added indication that 932159 affects linu
Mapping stretch to oldstable.
Mapping oldstable to oldstable-proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 19 Jul 2019 21:23:23 +0200
Source: linux-latest
Architecture: source
Version: 80+deb9u8
Distribution: stretch
Urgency: medium
Maintainer
linux-latest_80+deb9u8_source.changes uploaded successfully to localhost
along with the files:
linux-latest_80+deb9u8.dsc
linux-latest_80+deb9u8.tar.xz
linux-latest_80+deb9u8_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 19 Jul 2019 00:23:17 +0200
Source: linux-signed-i386
Binary: kernel-image-4.19.0-5-686-di nic-modules-4.19.0-5-686-di
nic-wireless-modules-4.19.0-5-686-di nic-shared-modules-4.19.0-5-686-di
linux-signed-i386_4.19.37+6_source.changes uploaded successfully to localhost
along with the files:
linux-signed-i386_4.19.37+6.dsc
linux-signed-i386_4.19.37+6.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 19 Jul 2019 00:23:17 +0200
Source: linux-signed-arm64
Binary: kernel-image-4.19.0-5-arm64-di nic-modules-4.19.0-5-arm64-di
nic-wireless-modules-4.19.0-5-arm64-di nic-shared-modules-4.19.0-5
linux-signed-arm64_4.19.37+6_source.changes uploaded successfully to localhost
along with the files:
linux-signed-arm64_4.19.37+6.dsc
linux-signed-arm64_4.19.37+6.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 19 Jul 2019 00:23:17 +0200
Source: linux-signed-amd64
Binary: kernel-image-4.19.0-5-amd64-di nic-modules-4.19.0-5-amd64-di
nic-wireless-modules-4.19.0-5-amd64-di nic-shared-modules-4.19.0-5
linux-signed-amd64_4.19.37+6_source.changes uploaded successfully to localhost
along with the files:
linux-signed-amd64_4.19.37+6.dsc
linux-signed-amd64_4.19.37+6.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing control commands:
> tags -1 fixed-upstream patch pending
Bug #932304 [src:linux] do_IRQ: 0.37 No irq handler for vector
Added tag(s) fixed-upstream, pending, and patch.
--
932304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932304
Debian Bug Tracking System
Contact ow...@bugs.de
Control: tags -1 fixed-upstream patch pending
OK, I found it:
b7107a67f0d1 x86/irq: Handle spurious interrupt after shutdown gracefully
Package: src:linux
Version: 4.19.37-5
Severity: minor
When power is removed from the monitor attached to the VGA interface,
the logs start filling with these, once every 10 seconds:
kernel: [217110.507445] i2c i2c-0: sendbytes: NAK bailout.
kernel: [217110.617797] [drm:radeon_vga_detect [radeon
Package: src:linux
Version: 4.9.168-1+deb9u3
Severity: important
-- Package-specific info:
** Version:
Linux version 4.9.0-9-amd64 (debian-kernel@lists.debian.org) (gcc version 6.3.0
20170516 (Debian 6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.168-1+deb9u3 (2019-06-16)
** Command line:
BOOT_IMAGE=/vm
Package: src:linux
Followup-For: Bug #932304
Installing a kernel from git/master show that the symptoms are now gone.
-- System Information:
Debian Release: 10.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.2.0+ (SMP w/4 CPU cores)
Kernel taint
Processing commands for cont...@bugs.debian.org:
> submitter 629905 !
Bug #629905 [nfs-common] NFS3 mounts are broken after upgrade squeeze -->
testing
Changed Bug submitter to 'Harald Dunkel ' from
'Harald Dunkel '.
> submitter 632970 !
Bug #632970 [xserver-xephyr] cannot set keyboard layout fo
17 matches
Mail list logo