** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832661
Title:
Xenial update: 4.4.181 upstream stable release
Status in
This bug was fixed in the package linux - 4.4.0-157.185
---
linux (4.4.0-157.185) xenial; urgency=medium
* linux: 4.4.0-157.185 -proposed tracker (LP: #1837476)
* systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage)
(LP: #1837235)
- Revert
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832661
Title:
Xenial update: 4.4.181 upstream stable
These 4 patches didn't apply cleanly and needed manual merging. Nothing
too hairy though:
synchronize sync(2) against cgroup writeback membership switches
KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes
arm64: cpu_ops: fix a leaked reference by adding missing of_node_put
The following patches were NOT applied since they were applied
previously:
tools include: Adopt linux/bits.h
net: create skb_gso_validate_mac_len()
bnx2x: disable GSO where gso_size is too big for hardware
--
You received this bug notification because you are a member of Kernel
Packages, which
Applied patches:
* x86/speculation/mds: Revert CPU buffer clear on double fault exit
* x86/speculation/mds: Improve CPU buffer clear documentation
* ARM: exynos: Fix a leaked reference by adding missing of_node_put
* crypto: vmx - fix copy-paste error in CTR mode
* crypto: crct10dif-generic - fix
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
7 matches
Mail list logo