Hi Ubuntu users! Signal 7 is SIGBUS. SIGBUS should be relatively
unusual on x86 [1].
[1] https://stackoverflow.com/questions/2089167/debugging-sigbus-
on-x86-linux
I'm excited to inform you that Fedora Linux users also started seeing
the same root problem. It is tied to the upgrade from kernel
I strongly suspect this is the same bug in upstream kernel v4.15, which
causes this issue:
https://bugs.launchpad.net/ubuntu/+source/xorg-
server/+bug/1760450/comments/6
I am basing this on the "signal 7" (SIGBUS), as this is relatively rare
on x86 [1]. Also that it occurs inside xorg_backtrace(
*** This bug is a duplicate of bug 1753012 ***
https://bugs.launchpad.net/bugs/1753012
Actually for frequent suspend -> SIGBUS in Xorg on Ubuntu 18.04, you
also need to look at this bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776887
--
You received this bug notification becau
*** This bug is a security vulnerability ***
Public security bug reported:
In a default installation, the daap plugin is enabled, and listens to
port 3689 (daap).
tcp0 0 *:daap *:*
LISTEN guest-43a0me 72019 -
Ubuntu has a "no open ports by default" polic
Thank you for fixing my silly mistake, Steve.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771196
Title:
daap plugin opens port by default
To manage notifications about this bug go to:
https://b
** Also affects: fedora via
https://bugzilla.redhat.com/show_bug.cgi?id=1553979
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1760450
Title:
Xorg cra
Uh, if anyone else is affected by this, there's a trivial fix upstream
already (and a workaround). Hop to it, Ubuntu. gregkh is looking
disappointed at you :-). I checked, and it looks like you didn't apply
it to you 4.15 tree. See end for links to the fix etc.
For users: The workaround is to
Public bug reported:
This upstream bug has been confirmed to affect Ubuntu users[1]. As per
the fix commit (below), the most frequent symptom is a crash of
Xorg/Xwayland, i.e. killing the entire GUI, when a laptop is woken from
system sleep. Frequency of the bug is described as once every few
da
** Patch added: "A copy of the original patch that was merged upstream"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776887/+attachment/5152516/+files/0001-block-do-not-use-interruptible-wait-anywhere.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs
Sorry, it's not convenient for me to test Ubuntu at the moment.
I abuse the above instructions to assert that this bug is confirmed,
citing the URLs provided. (1: The patch+description linked for kernel
4.17, 2: the lack of fix evidenced in the link for kernel 4.15.0-24.26).
I appeal to authorit
Awesome. Thanks.
I can't test suspend in a VM, and I don't have a physical Ubuntu
install.
The block developers arranged a more convenient test for the underlying
issue in https://github.com/osandov/blktests/
Before (i.e. linux-image-4.15.0-23-generic):
$ sudo ./check block/016
block/016 (send
Thanks for your confirmation, Julien. I have asked Ubuntu to import the
proper fix from upstream and they responded very promptly. See:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776887
They have posted a test kernel. I don't have a ubuntu install to test
it on - only a VM which can
Hi Vedant. Change the line in /etc/default/grub e.g.
GRUB_CMDLINE_LINUX_DEFAULT="quiet"
to
GRUB_CMDLINE_LINUX_DEFAULT="quiet scsi_mod.scan=sync"
and then re-run update-grub.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://
Also, I can confirm Maxim Loparev's comment #12. The current -hwe
kernels in Ubuntu 16.04 "Xenial" are also missing this critical kernel
fix. Please can you either update the list of affected Ubuntu versions,
or let us know if the bug needs reporting separately?
Link to HEAD source: https://git.
I don't see it! The changelog doesn't include this fix
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776887
the fix never reached the GIT tree to start with, unless it was force-
pushed away when I wasn't looking? The interruptible wait remains
present in blk-core.c.
https://git.launch
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1776887
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1769819
Title:
[nvidia] Xorg crashes after system sleep / wakeup, in libwfb.so+25597
→ nv
CurrentDmesg.txt:
[58189.152330] PM: suspend exit
[58189.162027] Read-error on swap-device (253:0:361608)
[58189.167038] Read-error on swap-device (253:0:361672)
"People die when they are killed". Specifically "Read-error on swap-
device" kills you with SIGBUS. Mystery solved.
I really expect
Please do auto-close. I don't have a Unity install to test this on, 2D
or otherwise. I don't plan on using community-supported Unity, partly
because I think there were other reported bugs that I didn't hear
anything about.
Also, it looks as if the root issue is fixed for new Firefox profiles.
*I
Is there an estimate for when users will receive the SRU? (Which was
submitted on 2018-06-29). So far I've seen 8 separate questions on
askubuntu.com which match this bug. Poke :-).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
That's not enough information. At this point you should report a new
bug, please.
Notice the linked bug #1760450 includes a crash trace. (Not saying for
sure you'd be able to do the same). The fatal signal is SIGBUS, as
opposed to the usual SIGSEGV or abort. If you've got a SIGSEGV or an
abort
I mean, use the link "Report a bug" at the top-right of this page. Not
add comments to this bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776887
Title:
Critical upstream bugfix missing in Ubu
21 matches
Mail list logo