[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-09-04 Thread Nerdopolis
6_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse:  USERPID ACCESS COMMAND  /dev/snd/controlC1: nerdopolis 3007 F wireplumber  /dev/snd/controlC0: nerdopolis 3007 F wireplumber  /dev/snd/seq:nerdopolis 3003 F pipewire C

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-08-31 Thread Nerdopolis
20 ProcVersionSignature: Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse:  USERPID ACCESS COMMAND  /dev/snd/controlC1: nerdopolis 3007 F wireplumber  /dev/snd/controlC0: nerdopolis 3007 F

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-21 Thread Nerdopolis
0.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/s

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-17 Thread Nerdopolis
2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/snd/seq:

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-05-24 Thread Nerdopolis
x 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F.... wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/snd/seq:nerdopolis 300

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-05-10 Thread Nerdopolis
2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-27 Thread Nerdopolis
config that Ubuntu uses Thanks ProblemType: Bug DistroRelease: Ubuntu 23.04 Package: linux-image-6.2.0-20-generic 6.2.0-20.20 ProcVersionSignature: Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevi

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-25 Thread Nerdopolis
DistroRelease: Ubuntu 23.04 Package: linux-image-6.2.0-20-generic 6.2.0-20.20 ProcVersionSignature: Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/contr

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-24 Thread Nerdopolis
Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F wireplumber /dev/snd/controlC0: nerdopolis 3007 F wi

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-21 Thread Nerdopolis
as possible config that Ubuntu uses Thanks ProblemType: Bug DistroRelease: Ubuntu 23.04 Package: linux-image-6.2.0-20-generic 6.2.0-20.20 ProcVersionSignature: Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 A

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-19 Thread Nerdopolis
0.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/snd/se

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-17 Thread Nerdopolis
20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F.... wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/snd/seq:

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-15 Thread Nerdopolis
Thanks ProblemType: Bug DistroRelease: Ubuntu 23.04 Package: linux-image-6.2.0-20-generic 6.2.0-20.20 ProcVersionSignature: Ubuntu 6.2.0-20.20-generic 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER

[Kernel-packages] [Bug 2016398] [NEW] stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-04-15 Thread Nerdopolis
c 6.2.6 Uname: Linux 6.2.0-20-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: nerdopolis 3007 F.... wireplumber /dev/snd/controlC0: nerdopolis 3007 F wireplumber /dev/snd/seq:nerdopolis 30

[Kernel-packages] [Bug 1647007] [NEW] overlayfs no longer supports nested overlayfs mounts, but there is a fix upstream

2016-12-02 Thread Nerdopolis
4 ApportVersion: 2.20.3-0ubuntu8 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/pcmC0D0p: nerdopolis 1955 F...m pulseaudio /dev/snd/controlC0: nerdopolis 1955 F pulseaudio CurrentDesktop: KDE Date: Fri Dec 2 22:06:32 2016 HibernationDevice: RESUME=UUID=/dev

[Kernel-packages] [Bug 1330785] Re: Weston on Nouveau displays black screen on Nouveau due to page flip issues

2014-06-18 Thread Nerdopolis
Is http://cgit.freedesktop.org/~airlied/linux/patch/?id=af4870e406126b7ac0ae7c7ce5751f25ebe60f28 in there to be merged into the Trusty kernel? Sorry when I said 13.04, I made a mistake. I meant 14.04 -- You received this bug notification because you are a member of Kernel Packages, which is subs

[Kernel-packages] [Bug 1330785] Re: Weston on Nouveau displays black screen on Nouveau due to page flip issues

2014-06-16 Thread Nerdopolis
Hi. I am unable to run the command, but this issue has been confirmed upstream https://bugs.freedesktop.org/show_bug.cgi?id=75761 ** Bug watch added: freedesktop.org Bugzilla #75761 https://bugs.freedesktop.org/show_bug.cgi?id=75761 ** Changed in: linux (Ubuntu) Status: Incomplete => Co

[Kernel-packages] [Bug 1330785] [NEW] Weston on Nouveau displays black screen on Nouveau due to page flip issues

2014-06-16 Thread Nerdopolis
Public bug reported: Hi. On Ubuntu 13.04, it seems that Weston displays a black screen, and the screen stays black, due to page flipping issues in the Nouveau driver as reported here https://bugs.freedesktop.org/show_bug.cgi?id=75761 It seems that these two patches do apply to 3.13, and fix the