nouveau.noaccel=1 kernel parameter needed with upgrade to Debian Bullseye
Linux - HardwareThis forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
nouveau.noaccel=1 kernel parameter needed with upgrade to Debian Bullseye
My computer has an old nVidia MCP61 chipset which requires the Linux kernel parameter nouveau.noaccel=1 when using the open source nVidia nouveau driver together with the MATE graphic environment. However, when I had Debian Buster, I could do without this parameter if I switched to GNOME.
After upgrading to Debian Bullseye, I now have to use this parameter again, even with GNOME. Therefore, I can no longer have GPU acceleration with Debian.
Is this a regression with a recurring bug after Debian released Bullseye? Any solution to this problem?
Do you mean Trinity Desktop Environmentmrmazda? How do you change modesetting from unloaded to loaded and why would it be necessary with Bullseye and not Buster?
Why the 4.9 kernel? Is not from bullseye it has a 5.10 kernel. Until you run an actual proper bullseye system it is impossible to tell where the problem comes from. Old kernel with new packages or the new packages themselves.
Code:
root@bullseye-raspi:~# uname -a
Linux bullseye-raspi 5.10.0-9-arm64 #1 SMP Debian 5.10.70-1 (2021-09-30) aarch64 GNU/Linux
root@bullseye-raspi:~# cat /etc/debian_version
11.1
I would think an entire version higher may have the possibility of a better driver for you. Also using the (code)(/code) before and after the text replacing the () with [] will give a scrolling text area for a posting of the terminal output to make the output take up less space on the posting of it. I have edited it in my response to show you this idea.
Do you mean Trinity Desktop Environment mrmazda? How do you change modesetting from unloaded to loaded and why would it be necessary with Bullseye and not Buster?
Yes
Either specify modesetting via /etc/X11/xorg.con* (which you would probably need to create, as normally this is handled automagically), or remove package xserver-xorg-video-nouveau
I don't think I've ever tried full-upgrade, which may be an Ubuntu variation. Also, sources.list needs an important modification for security, as spelled out in the release notes.
I don't think I've ever tried full-upgrade, which may be an Ubuntu variation.
It's just the new name of dist-upgrade. Despite what was said in this old thread on Debian forums, APT developers later added full-upgrade as a synonym for dist-upgrade first to apt (when it was first introduced in 2014) and then even to apt-get (2015). And aptitude still recongizes dist-upgrade as a synonym for full-upgrade to this day.
They're currently documented thusly:
aptitude docs speak of full-upgrade, but mention dist-upgrade as a deprecated synonym.
apt docs only speak of full-upgrade, but undocumented dist-upgrade is accepted as well.
apt-get docs only speak of dist-upgrade, but undocumented full-upgrade is accepted as well.
That is not good you are missing out on the security updates the format changed and a simple substitution will not result in a correct line.
Code:
root@bullseye-raspi:~# cat /etc/apt/sources.list
# For Bullseye https://www.debian.org/releases/bullseye/arm64/release-notes/ch-upgrading.en.html
deb http://deb.debian.org/debian bullseye main contrib non-free
# deb-src https://deb.debian.org/debian/ bullseye main contrib non-free
# For Bullseye Security https://www.debian.org/releases/bullseye/arm64/release-notes/ch-information.en.html#security-archive
deb http://security.debian.org/debian-security bullseye-security main contrib non-free
# deb-src https://deb.debian.org/debian-security bullseye-security main contrib non-free
# Bullseye Updates https://wiki.debian.org/DebianBullseye#FAQ
deb https://deb.debian.org/debian bullseye-updates main contrib non-free
# deb-src https://deb.debian.org/debian bullseye-updates main contrib non-free
# The Backports are _not_ enabled by default.
# Enable them by uncommenting the following line:
# Bullseye Backports https://backports.debian.org/
# deb http://deb.debian.org/debian bullseye-backports main contrib non-free
# deb-src https://deb.debian.org/debian/ bullseye-backports main contrib non-free
# Bullseye Proposed Updates https://wiki.debian.org/StableProposedUpdates
# deb https://deb.debian.org/debian/ bullseye-proposed-updates main contrib non-free
# deb-src https://deb.debian.org/debian/ bullseye-proposed-updates main contrib non-free
My list with the URLs in the comments it is from my Pi4 but the same applies to any other arch. You may want to read them. Try the below.
mrmazda I want to keep the nouveau driver since I tend to prefer open-source drivers. In any case it worked well on Buster and I wonder why it shouldn't on Bullseye.
Last edited by no-windose; 11-23-2021 at 04:15 PM.
I want to keep the nouveau driver since I tend to prefer open-source drivers.
Did you read the primer I linked to? Both modesetting DIX and nouveau DDX display drivers are open-source. The modesetting DIX is newer technology, is not reverse-engineered, and is the only one I use on all my NVidia hardware new enough for it to support.
Quote:
In any case it worked well on Buster and I wonder why it shouldn't on Bullseye.
Changes can occur because software both evolves and devolves. I'm sure few if any developers are able to bother testing with ancient 6150 IGPs, so regressions affecting them would only be caught by a select few people, such as yourself, ordinary users.
HappyTux: I don't know why I am still booting on kernel 4.9 after upgrading to Bullseye.
Code:
# uname -r
4.9.0-12-amd64
#
If I try to install kernel 5.10, I get a message warning that I won't be able to boot if I do so:
Code:
# apt install linux-image-5.10.0-9-amd64
You are running a kernel (version 4.9.0-12-amd64) and attempting to remove the same version. This can make the system unbootable as it will remove /boot/vmlinuz-4.9.0-12-amd64 and all modules under the directory /lib/modules/4.9.0-12-amd64. This can only be fixed with a copy of the kernel image and the corresponding modules. It is highly recommended to abort the kernel removal unless you are prepared to fix the system after removal.
Abort kernel removal?
Stranger still, it seems that kernel 5.10 is already installed:
Code:
# aptitude search linux-image | grep ^i
ip linux-image-4.9.0-12-amd64 - Linux 4.9 for 64-bit PCs
i linux-image-5.10.0-9-amd64 - Linux 5.10 for 64-bit PCs (signed)
i linux-image-amd64 - Linux for 64-bit PCs (meta-package)
#
Here is the output of dpkg get-selections and apt-cache policy:
If I run upgrade-grub, the file /boot/grub/grub.cfg is unchanged and only offers the option to boot on kernel 4.9.
Why can't I have kernel 5.10 and what should I do?
ondoho: Here is the output of dpkg-query -S vmlinuz:
That is strange you boot from an uninstalled kernel or I thought that is what the purge meant. Only thing to do is answer the question with a yes when it asks to remove the running kernel. Now I would have backed up my home directory to keep the setting in it for restoration. This if it fails to boot and a re-install is necessary, I would have fresh install media for the Debian 11 on hand to, as it will guarantee a proper install with the latest kernel used.
Thanks HappyTux. This is strange indeed. Could this mean that I have been hacked? I have noticed for a while that apt update && apt upgrade doesn't and didn't install any upgrade at all, even before I moved from Buster to Bullseye. How could I find out if I have been hacked before re-installing and loosing all trace of such a possible hack?
Thanks HappyTux. This is strange indeed. Could this mean that I have been hacked? I have noticed for a while that apt update && apt upgrade doesn't and didn't install any upgrade at all, even before I moved from Buster to Bullseye. How could I find out if I have been hacked before re-installing and loosing all trace of such a possible hack?
Nor would it those are stable releases. With them the only upgrades you will get is from the security repository or from places like the backports if enabled. Those are few and far between in my experience I keep expecting to see updates available when I do it but most days they are not there. A quick search gives me the file to look in to find out when.
Had some on the first and tenth of this month those were from the already mentioned security. It means by not following the procedure to do the upgrade it did not fully update all your packages like it should have, in short it is a mess best resolved by getting it properly done to get rid of any lingering problems it may cause in the future like it is doing now. I despise re-installs but some of the time they are necessary.
Edit: And by necessary I mean if it fails to boot after the kernel upgrade. If it continues working without problems after that is done then use it until problems attributable to the upgrade path are found, then the re-install is necessary.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.