Now that this is released, can we set it back to open again to reflect
the real state in the archive?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1826410
Title:
Please package libbpf
This problem also exists in kernel 4.15.0-51 version on Ubuntu 18.04
(i386).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1827884
Title:
Boot problems after upgrade to kernel
Public bug reported:
[Impact]
these firmware files are missing from bionic
icl_guc_32.0.3.bin
icl_huc_ver8_4_3238.bin
and are needed for linux-oem-osp1 kernel
[Test case]
Check that i915 from linux-oem-osp1 loads the firmware.
[Regression potential]
none, these are new firmare files for
eoan has these
** Changed in: linux-firmware (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1831698
Title:
i915: add GUC/HUC
This bug was fixed in the package linux-gcp - 4.15.0-1033.35~16.04.1
---
linux-gcp (4.15.0-1033.35~16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0-1033.35~16.04.1 -proposed tracker (LP: #1829196)
[ Ubuntu: 4.15.0-1033.35 ]
* linux-gcp: 4.15.0-1033.35 -proposed tracker
Hi Seth,
we debugged this and we found out that d0i3 was not disabled in iwlwifi.
This is a kind of power saving thing that requires integration with the
platform / kernel that should be enabled only for specific platform. Not
something that should be enabled in a distribution kernel.
I confirm.
This bug affects all my intel i386 machines (three with intel graphics and one
with amd graphics).
The 64 bit systems are all working fine.
Latest working kernel was 4.15.0-47
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
Lowering importance to Low due to currently different focus.
** Changed in: ubuntu-z-systems
Importance: Medium => Low
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1735420
Title:
This bug was fixed in the package linux-gcp - 4.15.0-1033.35~16.04.1
---
linux-gcp (4.15.0-1033.35~16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0-1033.35~16.04.1 -proposed tracker (LP: #1829196)
[ Ubuntu: 4.15.0-1033.35 ]
* linux-gcp: 4.15.0-1033.35 -proposed tracker
I've now got the v4 debs on 5 servers, and not a single crash since they
were installed on each. Looks good to me. Thank you!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824687
Title:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
Hi Kai-Heng,
dmesg attached.
Cheers,
Rob
** Attachment added: "dmesg dump"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831371/+attachment/5268899/+files/dmesg_1831371.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Well, it's "better" but still failing.
http://autopkgtest.ubuntu.com/packages/systemd/eoan/ppc64el
** Changed in: systemd (Ubuntu Eoan)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
This problem does not exist in kernel 4.18.0-21 (linux-generic-hwe-18.04),
but exists in kernel 5.0.0-16 (linux-generic-hwe-18.04-edge)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
Looks like it's very alike Dell's Mac passthrough, can you provide
acpidump?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1827961
Title:
Lenovo dock MAC Address pass through doesn't
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1831736
and then change the status of the bug to 'Confirmed'.
If, due to the
** Changed in: linux (Ubuntu Cosmic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1829942
Title:
Address performance issue w/ GICv4-based
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug will contain
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Tags added: id-5c41a9213e4f370442b690db
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1808056
Title:
vmlinuz is very large in arm64 -raspi2
Status in flash-kernel package in
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Changed in: lz4 (Ubuntu)
Status: New => Confirmed
** Changed in: initramfs-tools (Ubuntu)
Status: New => Fix Committed
** Changed in: live-build (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages,
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
still present on ubuntu 19.04
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1637709
Title:
Lenovo Ideapad 100 webcam always on
Status in linux package in Ubuntu:
Confirmed
Bug
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
Public bug reported:
Use `lz4 -9 -l` compression for initramfs by default as discussed on
ubuntu-devel.
This would also pull the lz4 package into main
https://lists.ubuntu.com/archives/ubuntu-devel/2019-June/040726.html
** Affects: initramfs-tools (Ubuntu)
Importance: Undecided
This patch has already been applied to Disco as part of the update to
5.0.12 upstream stable release (LP: #1830934).
** Changed in: linux (Ubuntu Disco)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is
On Wed, Jun 05, 2019 at 07:36:50AM -, Emmanuel Grumbach wrote:
> Hi Seth,
>
> we debugged this and we found out that d0i3 was not disabled in iwlwifi.
> This is a kind of power saving thing that requires integration with the
> platform / kernel that should be enabled only for specific
** Changed in: livecd-rootfs (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1831736
Title:
[MIR] lz4 by default
Status in initramfs-tools
Disco merge request:
https://code.launchpad.net/~rafaeldtinoco/ubuntu/+source/iproute2/+git/iproute2/+merge/368410
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
** Merge proposal linked:
https://code.launchpad.net/~rafaeldtinoco/ubuntu/+source/iproute2/+git/iproute2/+merge/368410
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
Public bug reported:
System: Intel SDP, Xeon(R) Gold 6252 CPU, 96 Core, 1708.5 GiB Memory (DCPMM
Optane Memory)
Series: Bionic
Kernel: 4.15.0-51-generic #55
Arch: AMD64
Libvirt: 4.0.0-1ubuntu8.10
Problem:
While testing this machine , we have discovered that virtual machines
created via
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1829192
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Added the virsh xmls that were generated via both , uvt-kvm and virt-
inst
** Attachment added: "bionic-virt-inst.xml"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831763/+attachment/5268957/+files/bionic-virt-inst.xml
--
You received this bug notification because you are a member
** Attachment added: "bionic-uvt-kvm.xml"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831763/+attachment/5268958/+files/bionic-uvt-kvm.xml
** Also affects: libvirt (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member
I have once again removed the BIOS whitelist for the WLAN cards, and
switched to a Wifi+Bluetooth Intel 7260 card.
Testing with only this cards internal bluetooth seems to work well, and
no skipping is going on. This is on a fresh Mint 19.1 install too, so
perhaps the coexistence rule works well.
Hi Sean,
for >1TB due to the defaults being for safety you need to set a different
machine type.
The suffix is "-hpb" like "pc-i440fx-bionic-hpb" in your case.
I have written about it here:
https://cpaelzer.github.io/blogs/005-guests-bigger-than-1tb/
Changing the default is an upstream
** Merge proposal linked:
https://code.launchpad.net/~rafaeldtinoco/ubuntu/+source/iproute2/+git/iproute2/+merge/368408
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to iproute2 in Ubuntu.
Matching subscriptions: iproute2
Since these changes to the default initramfs compression are already
being uploaded, it's critical that there be follow-through on the
upgrader and on the sizing of /boot partitions to ensure that this is a
smooth transition for our users.
This bug was fixed in the package live-build - 3.0~a57-1ubuntu38
---
live-build (3.0~a57-1ubuntu38) eoan; urgency=medium
* Stop setting LB_INITRAMFS_COMPRESSION default, and instead fallback to
using initramfs-tools default. LB_INITRAMFS_COMPRESSION is now only to
override
No problem, glad we were able to help get it resolved.
** Changed in: linux-firmware (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
Tests complete.
** Changed in: kernel-sru-workflow/stakeholder-signoff
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1829179
Title:
Cosmic merge request:
https://code.launchpad.net/~rafaeldtinoco/ubuntu/+source/iproute2/+git/iproute2/+merge/368407
** Description changed:
+ [Impact]
+
+ * ss can't filter using single entries in parentheses
+
+ [Test Case]
+
+ * ss -tn state established "( src [172.16.17.2] || src
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1831763
and then change the status of the bug to 'Confirmed'.
If, due to the
apport information
** Tags added: apport-collected uec-images
** Description changed:
System: Intel SDP, Xeon(R) Gold 6252 CPU, 96 Core, 1708.5 GiB Memory (DCPMM
Optane Memory)
Series: Bionic
Kernel: 4.15.0-51-generic #55
Arch: AMD64
Libvirt: 4.0.0-1ubuntu8.10
Problem:
Hey Christian,
thank you for your help thus far. This makes sense as I took a look at
your blog post and was unaware that the machine type would be a factor
in this sort of scenario. I'm going to give your suggestions a try and
will report back, then it may be fair to mark this bug a dup of bug
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
Public bug reported:
Investigating an issue for CTDB (LP: #722201), after suggesting a fix on
ss syntax to CTDB upstream project, we discovered that "ss" seems to be
broken in Ubuntu since Ubuntu Cosmic:
# Debian Sid
inaddy@workstation:~$ ss -tn state established "( src [172.16.17.2] ||
https://github.com/shemminger/iproute2/commit/38d209ecf2ae966b9b25de4acb60cdffb0e06ced
This commit looks like a fix for this issue:
ss: Review ssfilter
The original problem was ssfilter rejecting single expressions if
enclosed in braces, such as:
| sport = 22 or ( dport = 22 )
This is fixed
** Also affects: ubuntu-release-upgrader (Ubuntu)
Importance: Undecided
Status: New
** Changed in: ubuntu-release-upgrader (Ubuntu)
Assignee: (unassigned) => Dimitri John Ledkov (xnox)
** Changed in: ubuntu-release-upgrader (Ubuntu)
Status: New => Triaged
** Changed in:
** Also affects: libvirt (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug will
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug will
** Changed in: linux (Ubuntu Bionic)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Cosmic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux-meta-raspi2 (Ubuntu Xenial)
Status: In Progress => Fix Committed
** Changed in: linux-meta-raspi2 (Ubuntu Bionic)
Status: In Progress => Fix Committed
** Changed in: linux-meta-raspi2 (Ubuntu Cosmic)
Status: In Progress => Fix Committed
** Changed in:
** Description changed:
[Impact]
- * ss can't filter using single entries in parentheses
+ * ss won't be able to run commands with single filters inside
+ parentheses, like: "( sport == :X )", for example.
+
+ * A workaround is to remove "( )" from single filters, since it looks
+ the
Bug still present Xiaomi Mi Notebook Pro Ubuntu 18.04.2 –
4.18.0-20-generic. Here I am using NVIDIA proprietary drivers for MX 150
GPU.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Description changed:
System: Intel SDP, Xeon(R) Gold 6252 CPU, 96 Core, 1708.5 GiB Memory (DCPMM
Optane Memory)
Series: Bionic
Kernel: 4.15.0-51-generic #55
Arch: AMD64
Libvirt: 4.0.0-1ubuntu8.10
+ **Update**
+ Disco does not appear to be affected by this problem, as using the
Tests complete.
** Changed in: kernel-sru-workflow/stakeholder-signoff
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1829180
Title:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-cosmic
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
Tests complete.
** Changed in: kernel-sru-workflow/stakeholder-signoff
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1829213
Title:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
Tests complete.
** Changed in: kernel-sru-workflow/stakeholder-signoff
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1829214
Title:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug will
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1829176
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug will
May I suggest you leave a comment on the blog to prevent the next reader
from doing the same thing?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1830883
Title:
iwlwifi Intel
This bug was fixed in the package livecd-rootfs - 2.592
---
livecd-rootfs (2.592) eoan; urgency=medium
* Drop trying to mount removed maas squashfs.
* Stop overriding initramfs compression default to lzma. LP: #1831736
* Do not force lzma on ubuntu-core builds, the compress
*** This bug is a duplicate of bug 1769053 ***
https://bugs.launchpad.net/bugs/1769053
Confirmed that changing the machine type to pc-i440fx-bionic-hpb works,
"-hpb" needed to be appended. For more information on this, refer to
Christians blog, marking this bug as a dup
** Changed in:
1 - 100 of 212 matches
Mail list logo