Fix committed in linux-oem-osp1 5.0.0-1029.33 after it was rebased onto
disco 5.0.0-37.40.
** Changed in: linux-oem-osp1 (Ubuntu Bionic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
Hi Eddie,
190ubuntu0.1 suggests that you are on Ubuntu bionic or something derived from
that.
The package needs to know where it runs, and it does so via /etc/os-
release
# we have /etc/os-release, use it
if [ -r /etc/os-release ]; then
. /etc/os-release
DISTRO="${ID:-un
WHen tmux 3.0 is really released we should check if the fix is in and if not
maybe backport for the scope of Ubuntu 20.04.
But for now give upstream some time to release things...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
No, it means we may need some special quirk for this system.
If there's no better way to handle this, we may need to disable runtime
power management as a last resort.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
This was now accepted upstream in qemu.
[1] is the merge commit containing the new names discussed here 02fa60d1 /
9ab2237f but also tsx-ctrl which seems to be part of the overall tsx handlign
and not yet part of the patches of last week 2a9758c5.
@security - are you gonna take a look at picking
Narrow down to
1931a913df7e will.dea...@arm.com 2019-11-12 19:04:48 +0100 KVM: arm64: Set
SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe
fd872fd82e12 will.dea...@arm.com 2019-11-12 19:04:48 +0100 arm64: ssbd: Add
support for PSTATE.SSBS rather than trapping to EL3
2a3135c3033c will.dea.
Probably because that one is 5.4 based.
Can you please try 5.3 based kernel:
https://people.canonical.com/~khfeng/lp1851901-2/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851901
Title:
Touchpad
*** This bug is a duplicate of bug 1850541 ***
https://bugs.launchpad.net/bugs/1850541
This will be fixed in Bionic kernel version 4.15.0-71.80. Thank you for
the great work done to identify this issue as well as the fix.
** Also affects: linux (Ubuntu Eoan)
Importance: Undecided
St
The root cause of regression is within
d0f174e40a6 ykau...@suse.de 2019-11-12 19:04:49 +0100 arm64: enable generic CPU
vulnerabilites support
f94f9d3a3e8b jeremy.lin...@arm.com 2019-11-12 19:04:49 +0100 arm64: add sysfs
vulnerability show for meltdown
c288f6b5788d ykau...@suse.de 2019-11-12 19:0
Hi all,
Is there any update on the bug?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853102
Title:
Update Vulkan loader in bionic to version 1.1.121
To manage notifications about this bug go to:
>From dmesg in comment #5:
kernel: [0.00] Linux version 5.3.0-19-generic (buildd@lgw01-amd64-053)
(gcc version 9.2.1 20191008 (Ubuntu 9.2.1-9ubuntu2)) #20-Ubuntu SMP Fri Oct 18
09:04:39 UTC 2019 (Ubuntu 5.3.0-19.20-generic 5.3.1)
...
kernel: [ 327.012856] cut[7266]: segfault at 0 ip 000
@Colin, thank you very much. Verified with packages built in
https://launchpad.net/~vicamo/+archive/ubuntu/bug-1853090. Would like to
ACK the thread if I have had subscribed fwts-devel.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
h
Dupe of LP: #1852581?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852799
Title:
Regression: modules in bionic -hwe-18.04-edge kernels aren't signed
since 5.3.0-22
To manage notifications about
That solved for one day.
After a few minutes crashed again.
And it is not a crib script
Reverting to 19.04 works again
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849419
Title:
kernel panic aft
Can you please attach `journalctl -b -1 -k` to collect the log from last
boot, where the issue happens?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852837
Title:
Ubuntu 19.10 boots into blinking
After many testing i discoverd that was depending on a bash script where the
command
shutdown +3 was crashing everything
i changed to shutdown now and the problem seems solved
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
given back tests, the one remaining failing test
virtualbox/6.0.14-dfsg-1 (amd64)
doesn't look like it is Python specific.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835738
Title:
SRU: Updat
I have both a scanner and a hp printer. My scanner was connected with my
system previously, so I decided to connect my hp printer with my router.
At the time of connecting, it wanted a WPS pin. I somehow found the WPS
pin on hp printer from https://errorcode0x.com/wps-pin-on-hp-printer/
and connect
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825554
Title:
Ryzen5 2500U Vega 8 raven ridge flickering screen
To manage notificati
Please test latest mainline kernel:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4-rc8/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852865
Title:
Kernel bug in amdgpu system freezing
To man
Please test latest mainline kernel [1] and latest firmware [2]. If the issue
persists, please attach `dmesg` output when the issue happens.
[1] https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4-rc8/
[2] https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/
--
You receive
Public bug reported:
The Inforce 6640 and Dragonboard 820 have a Universal Flash Storage
(UFS) drive on board. This is a tracking bug for enabling kernel support
on these platforms.
This is a tracking bug, please don't triage
** Affects: linux-snapdragon (Ubuntu)
Importance: Undecided
This is affecting preadv203, preadv203_64 tests on Disco, issue found on
node modoc:
tst_test.c:1278: INFO: Testing on btrfs
tst_mkfs.c:90: INFO: Formatting /dev/loop2 with btrfs opts='' extra opts=''
tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s
safe_macros.c:452: BROK: preadv203.c:258
** Summary changed:
- Xorg freeze
+ 2500u random freeze during usage
** Summary changed:
- 2500u random freeze during usage
+ ryzen 2500u random freeze during usage
** Summary changed:
- ryzen 2500u random freeze during usage
+ ryzen 2500u random Xorg freeze
--
You received this bug notifica
Public bug reported:
hwinfo --mouse
40: USB 00.0: 10503 USB Mouse
[Created at usb.122]
Unique ID: 2jVo.M_nrmne0cTF
Parent ID: BSFT.RTX9xWW_uz4
SysFS ID: /devices/pci:00/:00:1d.2/usb7/7-2/7-2:1.0
SysFS BusID: 7-2:1.0
Hardware Class: mouse
Mod
Copied SRU justification from bug 1848922.
** Description changed:
+ [SRU Justification for backport-iwlwifi-dkms]
+
+ [Impact]
+ FTBFS against v5.3 kernels on Eoan/Focal.
+
+ [Fix]
+ * Backport fix from upstream commit f47729b94e11 (backport: rename
ktime_get_boot_ns for v5.3+).
+ * Also upda
** Description changed:
[SRU Justification]
[Impact]
- FTBFS on v5.3 kernels on Eoan/Focal.
+ FTBFS against v5.3 kernels on Eoan/Focal.
[Fix]
- Backport fix from upstream commit f47729b94e11 (backport: rename
ktime_get_boot_ns for v5.3+).
+ * Backport fix from upstream commit f47729b9
** Changed in: backport-iwlwifi-dkms (Ubuntu Eoan)
Status: New => In Progress
** Changed in: backport-iwlwifi-dkms (Ubuntu Eoan)
Assignee: (unassigned) => You-Sheng Yang (vicamo)
** Changed in: backport-iwlwifi-dkms (Ubuntu Eoan)
Importance: Undecided => Critical
--
You received
This bug has been reported on the Ubuntu ISO testing tracker.
A list of all reports related to this bug can be found here:
http://iso.qa.ubuntu.com/qatracker/reports/bugs/1853550
** Tags added: iso-testing
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
I have the same problem with audacious, on UbuntuStudio 18.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1808710
Title:
!xcb_xlib_threads_sequence_lost error with GTK2 applications
To manage not
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
desktop 20.04.2
ProcVersionSignature: Ubuntu 5.3.0-18.19-generic 5.3.1
Uname: Linux 5.3.0-18-generic x86_64
ApportVersion: 2.20.11-0ubuntu9
Architecture: amd64
CasperVersion: 1.432
CurrentDesktop: LXQt
Date: Fri Nov 22 02:16:39 2019
LiveMediaBuild: Lubuntu 20.04 LTS "Focal Fossa" - Alpha amd64
What's the bug actually? There doesn't seem to have any description to
it, neither in the title nor in the description or comments. Please give
as much information as possible.
** Changed in: linux (Ubuntu)
Status: Confirmed => Opinion
** Changed in: linux (Ubuntu)
Status: Opinion =
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853177
Title:
Xenial update: 4.4.202 upstream stable release
To manag
** Changed in: linux (Ubuntu Disco)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853067
Title:
Disco update: upstream stable patchset 2019-11-18
To man
** Changed in: linux (Ubuntu Disco)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852459
Title:
Disco update: upstream stable patchset 2019-11-13
To man
** Changed in: linux (Ubuntu Disco)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853382
Title:
Disco update: upstream stable patchset 2019-11-20
To man
** Changed in: linux (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852663
Title:
i40e: general protection fault in i40e_config_vf_promiscuo
** Changed in: linux-raspi2 (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1823151
Title:
Raspberry Pi 3B plus cpuinfo
To manage notifications abo
** Changed in: linux-raspi2 (Ubuntu Bionic)
Status: In Progress => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Disco)
Status: In Progress => Fix Committed
** Changed in: linux-raspi2 (Ubuntu Eoan)
Status: In Progress => Fix Committed
--
You received this bug notificat
** Changed in: linux-raspi2 (Ubuntu Bionic)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847432
Title:
bcm2835-sdhost: Lots of Compile warnings
To manage
I have verified the kernel image provided above. The PCR5 values in the
TCG logs and in the TPM match. I have also verified that the
ExitBootServices event is present in the binary_bios_measurements.
However, I see there is a mismatch for PCR4 and PCR7 between the TCG
logs and the TPM values. I am
I finally got around to reporting this upstream as
https://sourceware.org/bugzilla/show_bug.cgi?id=25215
** Bug watch added: Sourceware.org Bugzilla #25215
https://sourceware.org/bugzilla/show_bug.cgi?id=25215
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
@Michael Hudson-Doyle,
I'm glad that you are reading this :-)
An alternative, that I can see beyond editing the whole iso file:
- Add a menuentry in the iso file. This menuentry should have the boot
option 'persistent' alongside the other boot options. So there would be
two standard boot options
Public bug reported:
Not sure if this is an issue with the X server or with the kernel i915
module, so I'm starting with X.
The system is a Thinkpad X1 Carbon, Gen 7. Details on the graphics
hardware (from lspci -vv) are below. BIOS is up-to-date as of Nov. 21.
The symptom is that X will not red
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-
Public bug reported:
on opening the system it pops up with a message "system have bugs" with
options as report a problem or cancel
ProblemType: Bug
DistroRelease: Ubuntu 19.04
Package: ubuntu-release-upgrader-core 1:19.04.16.7
ProcVersionSignature: Ubuntu 5.0.0-32.34-generic 5.0.21
Uname: Linux 5
I am sorry you have an issue with python on Ubuntu.
By policy, Ubuntu does not blindly upgrade toolchains to point releases in
an LTS release, but we go through extensive validation with rebuild and
autopkgtests across all of our supported 6 architectures, which is usually
in excess of upstream te
any update on this? I'm on the LO6.3.3 this problem still occurs in
19.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1772683
Title:
[snap] Cannot sign a document, gpg keys are not listed
To man
I have a Dell 7391 and tried the above kernel and it enabled my
trackpad. However, I can no longer suspend.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851901
Title:
Touchpad doesn't work on Dell
All autopkgtests for the newly accepted glib2.0 (2.62.2-2~ubuntu19.10.1) for
eoan have finished running.
The following regressions have been reported in tests triggered by the package:
indicator-session/17.3.20+19.10.20190921-0ubuntu1 (arm64)
sbd/1.4.0-18-g5e3283c-1ubuntu1 (i386)
cairo/unknown (a
Thank you for taking the time to report this issue and helping to make
Ubuntu better.
Python 2 is very near EOL & thus Debian & Ubuntu have been working to
remove it as much as possible; ie. getting packages that use python
ported to use python3 instead, with only security fixes the exception.
Pl
All autopkgtests for the newly accepted glib2.0 (2.62.2-2~ubuntu19.10.1) for
eoan have finished running.
The following regressions have been reported in tests triggered by the package:
indicator-session/17.3.20+19.10.20190921-0ubuntu1 (arm64)
sbd/1.4.0-18-g5e3283c-1ubuntu1 (i386)
cairo/unknown (a
All autopkgtests for the newly accepted glib2.0 (2.62.2-2~ubuntu19.10.1) for
eoan have finished running.
The following regressions have been reported in tests triggered by the package:
indicator-session/17.3.20+19.10.20190921-0ubuntu1 (arm64)
sbd/1.4.0-18-g5e3283c-1ubuntu1 (i386)
cairo/unknown (a
Thank you for taking the time to report this issue and helping to make
Ubuntu better.
This package failure looks like it was caused by bad ISO download,
corrupted install media, or device failure. eg. look in the logs and
you'll see messages like these :-
Nov 21 21:30:51 ubuntu kernel: [ 593.627
All autopkgtests for the newly accepted glib2.0 (2.56.4-0ubuntu0.18.04.5) for
bionic have finished running.
The following regressions have been reported in tests triggered by the package:
gvfs/1.36.1-0ubuntu1.3.3 (ppc64el, amd64)
cairo/unknown (armhf)
firefox/70.0.1+build1-0ubuntu0.18.04.1 (armhf
I am still reading this (although busy, hence the delay). I quite
strongly don't want to change the default but maybe we can make it
easier to disable than applying sed to the entire ISO (!). Probably the
forums or discourse.ubuntu.com would be a better place to discuss this.
--
You received this
Also I want to add that I have to click `Turn Off' wifi twice if that
helps.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853005
Title:
Wifi randomly drops out
To manage notifications about this
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
I just marked precise and trusty as invalid since they are out of
standard support. Xenial version will be uploaded soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853063
Title:
SQL injection a
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
Running Manjaro 18.1.0 x86 (GNOME) on VMWare Workstation 15.5 - can
confirm that I have the same issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825842
Title:
[vmware] Background goes white wh
No. I tried it on a 4.13 kernel and the problem persists. Specifically,
1. I ping my router, everything is fine.
2. I download a large file from an ssh server at my uni. The speed is very
fast, 7.5 MB/s
3. After a few seconds, the internet drops out without any warning and I can no
longer ping m
For reference, this is the extensive upstream kernel discussion
https://bugzilla.kernel.org/show_bug.cgi?id=201685
The filesystem corruption issue is real, not theoretical, and
was the extensive discussion of problems experienced during the early days of
4.19:
** Bug watch added: Linux Kernel
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
** Changed in: redmine (Ubuntu Precise)
Status: New => Invalid
** Changed in: redmine (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853063
Title:
When this problem happens, does the wifi network on rpi4 still work?
e.g. using ping command or other network commands other than ssh?
Another test is when problems happens, switch back to 1007 kernel (the
1007 kernel, initrd and dtb are in the folder of
/boot/firmware/$filename.bak, remove .bak,
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-eoan
** Tags added: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For
Note, these accesses were added in
22d37f834b6f4605faa3887bae3cf4d0e1673278
** Changed in: gnome-system-monitor (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
connectome-workbench is a viewer and analysis tool for neuroimaging
data, this bug was assigned to the wrong package.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1778392
Title:
QoS CLI - “network
This data corruption issue was written about extensively here
https://lwn.net/Articles/774440/
as part of the early 4.19 days when a number of folks were seeing ext4
filesystem corruption as a consequence of the blk-mq bug.
--
You received this bug notification because you are a member of Ubunt
Thanks! I can test it once I'm back I can try to figure out how to build
the application.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852505
Title:
When using a hidpi screen the GL preview only u
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-azure (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1848739
Title:
** Changed in: linux (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853519
Title:
Bionic update: upstream stable patchset 2019-11-21
To manage no
** Changed in: linux (Ubuntu Bionic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853208
Title:
Bionic update: upstream stable patchset 2019-11-19
To m
Public bug reported:
Python 2.7 in 18.04 that is LTS version is in 2.7.15 RC1 version
this version broke my scripts and get me segmentation fault each time I trying
to do something.
IN LTS version always LATEST python 2.7 should be supported which is 2.7.17. so
why I have .15 and in RC1 version.
Public bug reported:
When powertop is actived, I have a unbearable whistling in 3.5mm jack
headphones.
When powertop is disabled, I have not problem with my 3.5mm jack
headphones.
Dell 9570 XPS 15 / Realtek ALC3266 audio card / Linux Mint 19.2 based on
Ubuntu 18.04 / same problems on Ubuntu 1
Public bug reported:
$ grep FAIL docker-integration-test.log.txt
FAIL: docker_cli_swarm_test.go:85: DockerSwarmSuite.TestSwarmInit
FAIL: docker_cli_swarm_test.go:37: DockerSwarmSuite.TestSwarmUpdate
OOPS: 1479 passed, 50 skipped, 2 FAILED
--- FAIL: Test (5215.24s)
FAIL
I've attached the full log
Note Failure exists on metal as well as in the clouds.
11/14 22:06:43 DEBUG| utils:0153| [stdout] 3 cycles/emulated jump
instruction
11/14 22:06:43 DEBUG| utils:0153| [stdout] 0 cycles/emulated move
instruction
11/14 22:06:43 DEBUG| utils:0153| [stdout] 0 cycles/emulated arithmetic
tested it in a 10 times loop and yes, it always have the same - it get
stuck here:
`[ 18.640574] ---[ end Kernel panic - not syncing: Attempted to kill
init! exitcode=0x000b `
`[ 18.641172] ---[ end Kernel panic - not syncing: Attempted to kill
init! exitcode=0x000b `
`[ 18.609838]
Having the exact same issue here:
- NVIDIA GeForce GTX 1050 Ti
- NVIDIA Driver Version: 430.50
System utterly broken after upgrade from 19.04 (kernel panics), managed
to kind of repair it, then this infinite login loop. I could get out of
the loop by logging in another virtual console, then typ
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
*** This bug is a duplicate of bug 1819543 ***
https://bugs.launchpad.net/bugs/1819543
** This bug has been marked a duplicate of bug 1819543
Does not exit correctly, have to "kill -9
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
Public bug reported:
errno 5. ı use usb
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: ubiquity 2.21.63.10
ProcVersionSignature: Ubuntu 4.15.0-45.48~16.04.1-generic 4.15.18
Uname: Linux 4.15.0-45-generic x86_64
ApportVersion: 2.20.1-0ubuntu2.18
Architecture: amd64
CasperVersion: 1.376.2
Da
Hi,
this bug also affects me.
Printer: HP LaserJet MFP M28-M31
hplip-version: 3.19.11
Operating System: Linux Mint 19.2
I have similar/the same issues as the ones @t-moreau pointed out:
Using "Simple Scan", scanning in "Text" mode with 150 or 300 dpi works.
Higher dpi-settings do not work. Usin
All autopkgtests for the newly accepted python3.7 (3.7.5-2~19.10) for eoan have
finished running.
The following regressions have been reported in tests triggered by the package:
libreoffice/1:6.3.3-0ubuntu0.19.10.1 (s390x)
virtualbox/6.0.14-dfsg-1 (amd64)
ros-ros-comm/1.14.3+ds1-5build2 (amd64)
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This bug was fixed in the package lmms - 1.2.1+dfsg1-2
---
lmms (1.2.1+dfsg1-2) unstable; urgency=medium
* Team upload
* debian/control: Do not B-D on libsoundio-dev on armel
-- Sebastian Ramacher Wed, 20 Nov 2019 19:48:27
+0100
** Changed in: lmms (Ubuntu)
Status: New
** Changed in: qjoypad (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1757823
Title:
Please port your package away from Qt 4
To manage notifications about
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
This bug was fixed in the package chromium-browser -
78.0.3904.108-0ubuntu0.16.04.1
---
chromium-browser (78.0.3904.108-0ubuntu0.16.04.1) xenial; urgency=medium
* Upstream release: 78.0.3904.108 (LP: #1853149)
- CVE-2019-13723: Use-after-free in Bluetooth.
- CVE-2019-13724:
This bug was fixed in the package chromium-browser -
78.0.3904.108-0ubuntu0.18.04.1
---
chromium-browser (78.0.3904.108-0ubuntu0.18.04.1) bionic; urgency=medium
* Upstream release: 78.0.3904.108 (LP: #1853149)
- CVE-2019-13723: Use-after-free in Bluetooth.
- CVE-2019-13724:
** Also affects: ubiquity (Ubuntu Focal)
Importance: Undecided
Status: Confirmed
** Also affects: ubuntustudio-meta (Ubuntu Focal)
Importance: Undecided
Status: Invalid
** Tags removed: rls-ff-incoming
--
You received this bug notification because you are a member of Ubuntu
This bug was fixed in the package chromium-browser -
78.0.3904.108-0ubuntu0.19.04.1
---
chromium-browser (78.0.3904.108-0ubuntu0.19.04.1) disco; urgency=medium
* Upstream release: 78.0.3904.108 (LP: #1853149)
- CVE-2019-13723: Use-after-free in Bluetooth.
- CVE-2019-13724: O
I set up the test system now again, and I can can confirm that
4.4.0-167.196 boots.
I can leave the system up for a while. I'll send details on how to
access the system privately.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
1 - 100 of 429 matches
Mail list logo