Hi
On Sun, 05 Jan 2020 13:48:06 -0500 John Scott wrote:
> Can you run `reportbug -p --template pinta` and send back the system
> information that appears at the bottom of that? The output of `lscpu`
might
> would also be helpful.
-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 5.4.0-1-amd64 (SMP w/12 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8),
LANGUAGE=ru_RU:ru (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages pinta depends on:
ii gnome-icon-theme3.12.0-3
ii libc6 2.29-7
ii libcairo2 1.16.0-4
ii libgdk-pixbuf2.0-0 2.40.0+dfsg-1
ii libglib2.0-cil 2.12.40-2+b1
ii libgtk2.0-cil 2.12.40-2+b1
ii libmono-addins-gui0.2-cil 1.0+git20130406.adcd75b-4
ii libmono-addins0.2-cil 1.0+git20130406.adcd75b-4
ii libmono-cairo4.0-cil5.18.0.240+dfsg-5
ii libmono-corlib4.5-cil 5.18.0.240+dfsg-5
ii libmono-posix4.0-cil5.18.0.240+dfsg-5
ii libmono-sharpzip4.84-cil5.18.0.240+dfsg-5
ii libmono-system-core4.0-cil 5.18.0.240+dfsg-5
ii libmono-system-xml4.0-cil 5.18.0.240+dfsg-5
ii libmono-system4.0-cil 5.18.0.240+dfsg-5
ii mono-runtime5.18.0.240+dfsg-5
pinta recommends no packages.
pinta suggests no packages.
-- no debconf information
lscpu
Architecture:x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 43 bits physical, 48 bits virtual
CPU(s): 12
On-line CPU(s) list: 0-11
Thread(s) per core: 2
Core(s) per socket: 6
Socket(s): 1
NUMA node(s):1
Vendor ID: AuthenticAMD
CPU family: 23
Model: 8
Model name: AMD Ryzen 5 2600 Six-Core Processor
Stepping:2
Frequency boost: enabled
CPU MHz: 1517.428
CPU max MHz: 3400,
CPU min MHz: 1550,
BogoMIPS:6799.20
Virtualization: AMD-V
L1d cache: 192 KiB
L1i cache: 384 KiB
L2 cache:3 MiB
L3 cache:16 MiB
NUMA node0 CPU(s): 0-11
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass
disabled via prctl and
seccomp
Vulnerability Spectre v1:Mitigation; usercopy/swapgs barriers and
__user pointer san
itization
Vulnerability Spectre v2:Mitigation; Full AMD retpoline, IBPB
conditional, STIBP dis
abled, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic
sep mtrr pge mca cm
ov pat pse36 clflush mmx fxsr sse sse2 ht
syscall nx mmxext
fxsr_opt pdpe1gb rdtscp lm constant_tsc
rep_good nopl nons
top_tsc cpuid extd_apicid aperfmperf pni
pclmulqdq monitor
ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt
aes xsave avx f16
c rdrand lahf_lm cmp_legacy svm extapic
cr8_legacy abm sse4
a misalignsse 3dnowprefetch osvw skinit
wdt tce topoext per
fctr_core perfctr_nb bpext perfctr_llc
mwaitx cpb hw_pstate
sme ssbd sev ibpb vmmcall fsgsbase bmi1
avx2 smep bmi2 rds
eed adx smap clflushopt sha_ni xsaveopt
xsavec xgetbv1 xsav
es clzero irperf xsaveerptr arat npt lbrv
svm_lock nrip_sav
e tsc_scale vmcb_clean flushbyasid
decodeassists pausefilte
r pfthreshold avic v_vmsave_vmload vgif
overflow_recov succ
or smca
> How do you invoke Pinta? Do you use a command in a terminal to start it
or
> click it from a menu?
Tried both methods and they lead to the same results.
> What does `mono -V` say
Mono JIT compiler version 5.18.0.240 (Debian 5.18.0.240+dfsg-5 Tue Sep 10
13:23:34 UTC 2019)
Copyright (C) 2002-2014 Novell, Inc, Xamarin Inc and Contributors.
www.mono-project.com
TLS: __thread
SIGSEGV: altstack