[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#703370: marked as done (syslog messages overflow "drm:radeon_crtc_page_flip")



Your message dated Sat, 24 Apr 2021 08:07:19 -0700 (PDT)
with message-id <60843427.1c69fb81.735d1.91c5@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #703370,
regarding syslog messages overflow "drm:radeon_crtc_page_flip"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
703370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703370
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: linux-image-3.2.0-4-amd64
Version: 3.2.39-2
Severity: normal

After entering this kernel version 3.2.39-2 to wheezy, DRM is
supported now on my computer.

I have an AMD A10-5700 APU with integrated graphics:
ATI Trinity Radeon HD 7660D

The Gnome shell now works properly.

On syslog, i got a lot of error messages like this:

> [ 5142.377585] radeon 0000:00:01.0: ffff880036c50000 pin failed [
> 5142.377593] [drm:radeon_crtc_page_flip] *ERROR* failed to pin new
> rbo buffer before flip

My syslog is full with this messages.

If you need more informations, please let me know.

Best regards
Bernhard
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=GJYY
-----END PGP SIGNATURE-----

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: