Kernel update

Questions about applications and software
Forum rules
Before you post read how to get help. Topics in this forum are automatically closed 6 months after creation.
Locked
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Kernel update

Post by Rusty Relic »

Earlier today the update manager indicated that there was an update available so I clicked on the icon and typed in my password. Then a error message came up saying I had to manually run some part of the update:
"E: dpkg was interrupted, you must manually run 'dpkg --configure -a' to correct the problem.
E: _cache->open() failed, please report."

Does anyone understand what has happened? I presume this has to be done with the terminal.
Is this safe to do and if so, what is the protocol for doing it?

I am running 19.3 Mate
Kindly move to the correct forum if this question is in the wrong place.
Thank you for any help.
Last edited by LockBot on Wed Dec 28, 2022 7:16 am, edited 2 times in total.
Reason: Topic automatically closed 6 months after creation. New replies are no longer allowed.
User avatar
all41
Level 19
Level 19
Posts: 9520
Joined: Tue Dec 31, 2013 9:12 am
Location: Computer, Car, Cage

Re: Kernel update

Post by all41 »

Yes, there is an incomplete package, open a terminal and enter:

Code: Select all

sudo dpkg --configure -a
Then run:

Code: Select all

apt update
If any errors copy and paste those results here.
That should correct update problems.
Everything in life was difficult before it became easy.
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Re: Kernel update

Post by Rusty Relic »

I haven't forgotten. I ran timeshift this morning and will back up all the files tonight or tomorrow morning and then experiment with the terminal. All it seems to take for me to mess up using the terminal is adding a space or not including a space. Maybe I am exaggerating a bit but not much.
Just an observation. I checked the update icon this morning and there were three more updates so I unchecked all but one and it still requires code to be entered in the terminal. Is this some sort of new security feature or is it just being included to irritate people like me who don't have any knowledge regarding the use of the terminal?
Last edited by Rusty Relic on Wed Apr 14, 2021 10:47 pm, edited 1 time in total.
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Re: Kernel update

Post by Rusty Relic »

Here is what comes on the terminal screen when I type in the coed snippets above:

Code: Select all

W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.4.0-45-generic
W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.4.0-42-generic
W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.3.0-62-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-61-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-59-generic
It seems to have gone into a loop, each section appears to be the same. There was a lot more that I didn't copy because it all looked the same.
User avatar
all41
Level 19
Level 19
Posts: 9520
Joined: Tue Dec 31, 2013 9:12 am
Location: Computer, Car, Cage

Re: Kernel update

Post by all41 »

All it seems to take for me to mess up using the terminal is adding a space or not including a space. Maybe I am exaggerating a bit but not much.
lol -- no exaggeration at all. Copy/paste is the best option--but trust first
Could you please post the results of inxi inquiry:

Code: Select all

inxi -Fxxxrz
This hides all identifiable information
Everything in life was difficult before it became easy.
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Re: Kernel update

Post by Rusty Relic »

The results of the previous request:

Code: Select all

inxi -Fxxxrz
System:
  Host: Dell Kernel: 5.4.0-70-generic x86_64 bits: 64 compiler: gcc v: 7.5.0 
  Desktop: MATE 1.22.2 info: mate-panel wm: marco 1.22.3 dm: LightDM 1.26.0 
  Distro: Linux Mint 19.3 Tricia base: Ubuntu 18.04 bionic 
Machine:
  Type: Desktop System: Dell product: OptiPlex 380 v: N/A serial: <filter> 
  Chassis: type: 15 serial: <filter> 
  Mobo: Dell model: 01TKCC v: A01 serial: <filter> BIOS: Dell v: A06 
  date: 09/01/2011 
CPU:
  Topology: Dual Core model: Intel Core2 Duo E7500 bits: 64 type: MCP 
  arch: Penryn rev: A L2 cache: 3072 KiB 
  flags: lm nx pae sse sse2 sse3 sse4_1 ssse3 vmx bogomips: 11703 
  Speed: 1596 MHz min/max: 1600/2933 MHz Core speeds (MHz): 1: 1596 2: 1596 
Graphics:
  Device-1: Intel 4 Series Integrated Graphics vendor: Dell driver: i915 
  v: kernel bus ID: 00:02.0 chip ID: 8086:2e32 
  Display: x11 server: X.Org 1.19.6 driver: modesetting unloaded: fbdev,vesa 
  compositor: marco v: 1.22.3 resolution: 1920x1200~60Hz 
  OpenGL: renderer: Mesa DRI Intel G41 (ELK) v: 2.1 Mesa 20.0.8 
  direct render: Yes 
Audio:
  Device-1: Intel NM10/ICH7 Family High Definition Audio vendor: Dell 
  driver: snd_hda_intel v: kernel bus ID: 00:1b.0 chip ID: 8086:27d8 
  Sound Server: ALSA v: k5.4.0-70-generic 
Network:
  Device-1: Broadcom and subsidiaries NetLink BCM57780 Gigabit Ethernet PCIe 
  vendor: Dell driver: tg3 v: 3.137 port: ece0 bus ID: 02:00.0 
  chip ID: 14e4:1692 
  IF: enp2s0 state: up speed: 100 Mbps duplex: full mac: <filter> 
Drives:
  Local Storage: total: 931.51 GiB used: 113.15 GiB (12.1%) 
  ID-1: /dev/sda vendor: Seagate model: ST1000DM003-1ER162 size: 931.51 GiB 
  speed: <unknown> rotation: 7200 rpm serial: <filter> rev: CC46 scheme: MBR 
Partition:
  ID-1: / size: 915.89 GiB used: 113.15 GiB (12.4%) fs: ext4 dev: /dev/sda1 
Sensors:
  System Temperatures: cpu: 38.0 C mobo: N/A 
  Fan Speeds (RPM): N/A 
Repos:
  No active apt repos in: /etc/apt/sources.list 
  Active apt repos in: /etc/apt/sources.list.d/official-package-repositories.list 
  1: deb http://packages.linuxmint.com tricia main upstream import backport #id:linuxmint_main
  2: deb http://archive.ubuntu.com/ubuntu bionic main restricted universe multiverse
  3: deb http://archive.ubuntu.com/ubuntu bionic-updates main restricted universe multiverse
  4: deb http://archive.ubuntu.com/ubuntu bionic-backports main restricted universe multiverse
  5: deb http://security.ubuntu.com/ubuntu/ bionic-security main restricted universe multiverse
  6: deb http://archive.canonical.com/ubuntu/ bionic partner
  Active apt repos in: /etc/apt/sources.list.d/opera-stable.list 
  1: deb https://deb.opera.com/opera-stable/ stable non-free #Opera Browser (final releases)
Info:
  Processes: 162 Uptime: 1h 51m Memory: 3.75 GiB used: 923.0 MiB (24.1%) 
  Init: systemd v: 237 runlevel: 5 Compilers: gcc: 7.5.0 alt: 7 Shell: bash 
  v: 4.4.20 running in: mate-terminal inxi: 3.0.32 
r@Dell:~$ 
User avatar
all41
Level 19
Level 19
Posts: 9520
Joined: Tue Dec 31, 2013 9:12 am
Location: Computer, Car, Cage

Re: Kernel update

Post by all41 »

sources all look good. Have you retried apt-update lately?

Code: Select all

apt update
copy/paste any errors
Perhaps select another mirror.
Do you know how?
Everything in life was difficult before it became easy.
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Re: Kernel update

Post by Rusty Relic »

As requested:

Code: Select all

r@Dell:~$ apt update
[sudo] password for r:           
Ign:1 http://packages.linuxmint.com tricia InRelease
Hit:2 http://archive.canonical.com/ubuntu bionic InRelease                     
Hit:3 http://packages.linuxmint.com tricia Release                             
Get:4 http://security.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]    
Hit:5 http://archive.ubuntu.com/ubuntu bionic InRelease                        
Hit:6 https://deb.opera.com/opera-stable stable InRelease                      
Get:7 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]      
Get:8 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]    
Get:10 http://security.ubuntu.com/ubuntu bionic-security/main amd64 DEP-11 Metadata [49.0 kB]
Get:11 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 DEP-11 Metadata [295 kB]
Get:12 http://security.ubuntu.com/ubuntu bionic-security/universe amd64 DEP-11 Metadata [60.4 kB]
Get:13 http://security.ubuntu.com/ubuntu bionic-security/multiverse amd64 DEP-11 Metadata [2,464 B]
Get:14 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 DEP-11 Metadata [290 kB]
Get:15 http://archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 DEP-11 Metadata [2,468 B]
Get:16 http://archive.ubuntu.com/ubuntu bionic-backports/universe amd64 DEP-11 Metadata [9,292 B]
Fetched 960 kB in 3s (371 kB/s)                                         
Reading package lists... Done
Building dependency tree       
Reading state information... Done
25 packages can be upgraded. Run 'apt list --upgradable' to see them.
r@Dell:~$ 
r@Dell:~$ apt list --upgradable
Listing... Done
libhogweed4/bionic-updates,bionic-security 3.4-1ubuntu0.1 amd64 [upgradable from: 3.4-1]
libnettle6/bionic-updates,bionic-security 3.4-1ubuntu0.1 amd64 [upgradable from: 3.4-1]
libnss-myhostname/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
libnss-systemd/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
libpam-systemd/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
libseccomp2/bionic-updates 2.5.1-1ubuntu1~18.04.1 amd64 [upgradable from: 2.4.3-1ubuntu3.18.04.3]
libsystemd0/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
libudev1/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
linux-generic/bionic-updates,bionic-security 4.15.0.141.128 amd64 [upgradable from: 4.15.0.140.127]
linux-generic-hwe-18.04/bionic-updates,bionic-security 5.4.0.71.79~18.04.64 amd64 [upgradable from: 5.4.0.70.78~18.04.63]
linux-headers-generic/bionic-updates,bionic-security 4.15.0.141.128 amd64 [upgradable from: 4.15.0.140.127]
linux-headers-generic-hwe-18.04/bionic-updates,bionic-security 5.4.0.71.79~18.04.64 amd64 [upgradable from: 5.4.0.70.78~18.04.63]
linux-image-generic/bionic-updates,bionic-security 4.15.0.141.128 amd64 [upgradable from: 4.15.0.140.127]
linux-image-generic-hwe-18.04/bionic-updates,bionic-security 5.4.0.71.79~18.04.64 amd64 [upgradable from: 5.4.0.70.78~18.04.63]
linux-libc-dev/bionic-updates,bionic-security 4.15.0-141.145 amd64 [upgradable from: 4.15.0-140.144]
opera-stable/stable 75.0.3969.171 amd64 [upgradable from: 75.0.3969.149]
systemd/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
systemd-coredump/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
systemd-sysv/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
udev/bionic-updates 237-3ubuntu10.46 amd64 [upgradable from: 237-3ubuntu10.45]
xserver-common/bionic-updates,bionic-updates,bionic-security,bionic-security 2:1.19.6-1ubuntu4.9 all [upgradable from: 2:1.19.6-1ubuntu4.8]
xserver-xephyr/bionic-updates,bionic-security 2:1.19.6-1ubuntu4.9 amd64 [upgradable from: 2:1.19.6-1ubuntu4.8]
xserver-xorg-core/bionic-updates,bionic-security 2:1.19.6-1ubuntu4.9 amd64 [upgradable from: 2:1.19.6-1ubuntu4.8]
xserver-xorg-legacy/bionic-updates,bionic-security 2:1.19.6-1ubuntu4.9 amd64 [upgradable from: 2:1.19.6-1ubuntu4.8]
xwayland/bionic-updates,bionic-security 2:1.19.6-1ubuntu4.9 amd64 [upgradable from: 2:1.19.6-1ubuntu4.8]
r@Dell:~$ apt --upgrade
apt
Usage: apt command [options]
       apt help command [options]

Commands:
  add-repository   - Add entries to apt sources.list
  autoclean        - Erase old downloaded archive files
  autoremove       - Remove automatically all unused packages
  build            - Build binary or source packages from sources
  build-dep        - Configure build-dependencies for source packages
  changelog        - View a package's changelog
  check            - Verify that there are no broken dependencies
  clean            - Erase downloaded archive files
  contains         - List packages containing a file
  content          - List files contained in a package
  deb              - Install a .deb package
  depends          - Show raw dependency information for a package
  dist-upgrade     - Upgrade the system by removing/installing/upgrading packages
  download         - Download the .deb file for a package
  edit-sources     - Edit /etc/apt/sources.list with your preferred text editor
  dselect-upgrade  - Follow dselect selections
  full-upgrade     - Same as 'dist-upgrade'
  held             - List all held packages
  help             - Show help for a command
  hold             - Hold a package
  install          - Install/upgrade packages
  list             - List packages based on package names
  policy           - Show policy settings
  purge            - Remove packages and their configuration files
  recommends       - List missing recommended packages for a particular package
  rdepends         - Show reverse dependency information for a package
  reinstall        - Download and (possibly) reinstall a currently installed package
  remove           - Remove packages
  search           - Search for a package by name and/or expression
  show             - Display detailed information about a package
  showhold         - Same as 'held'
  showsrc          - Display all the source package records that match the given package name
  source           - Download source archives
  sources          - Same as 'edit-sources'
  unhold           - Unhold a package
  update           - Download lists of new/upgradable packages
  upgrade          - Perform a safe upgrade
  version          - Show the installed version of a package

r@Dell:~$ 
In case anyone is interested, I have no idea what to do, I am not a programmer, I just want the machine to work and not need to spend time messing with it. Would it be better to download the latest version of 19.3 Mate or maybe xfce and install it? Then I would need to try and get the HP printer connected again which required a lot of time right when I needed the printer. Printer connection thread is here: viewtopic.php?f=51&t=313689
User avatar
karlchen
Level 23
Level 23
Posts: 18212
Joined: Sat Dec 31, 2011 7:21 am
Location: Germany

Re: Kernel update

Post by karlchen »

You do not have to be a programmer in order to execute the "apt upgrade" command in the right way. Note: No double dashes prefixed to "upgrade".
A simple: sudo apt upgrade should do. :wink:

But Update Manager (GUI) should be able to execute the same update operation as well, totally without having to type any commandline. - It has done so last night here. - And I guess in quite a few other place as well. :wink:
Image
The people of Alderaan have been bravely fighting back the clone warriors sent out by the unscrupulous Sith Lord Palpatine for 771 days now.
Lifeline
User avatar
karlchen
Level 23
Level 23
Posts: 18212
Joined: Sat Dec 31, 2011 7:21 am
Location: Germany

Re: Kernel update

Post by karlchen »

The output which you had posted some posts above is displayed, because your previous software update had brought along a linux-firmware update.

The updater complained about potentially missing firmware modules (may or may not be the case on your machine. Some complaints on mine as well.)

The update initramfs ouput is normal as well:
Whenever lixun-firmware gets updated, all existing boot images in /boot will be updated as well with the new linux-firmware package.

No black magic involved.
Rusty Relic wrote: Wed Apr 14, 2021 10:47 pm Here is what comes on the terminal screen when I type in the coed snippets above:

Code: Select all

W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.4.0-45-generic
W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.4.0-42-generic
W: Possible missing firmware /lib/firmware/i915/tgl_dmc_ver2_04.bin for module i915
W: Possible missing firmware /lib/firmware/i915/skl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/bxt_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/glk_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/kbl_guc_33.0.0.bin for module i915
W: Possible missing firmware /lib/firmware/i915/icl_guc_33.0.0.bin for module i915
update-initramfs: Generating /boot/initrd.img-5.3.0-62-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-61-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-59-generic
It seems to have gone into a loop, each section appears to be the same. There was a lot more that I didn't copy because it all looked the same.
If this list

Code: Select all

update-initramfs: Generating /boot/initrd.img-5.3.0-62-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-61-generic
update-initramfs: Generating /boot/initrd.img-5.3.0-59-generic
is in fact very much longer, then this reveals that you have never bothered to uninstall obsolete kernels (including everything which each kernel brings along)
Do so, please. Update Manager => View => Linux Kernels.
Mark each installed & obsolete kernel and click [Remove]
Leave the currently loaded kernel (obviously it cannot be removed) and the previous one.
That's it.

If for the future you want Update Manager to do this cleanup of obsolete kernels automatically, without bothering you, then inside Update Manager go to Edit => Preferences => Automation and enable Automatic Maintenance. (The option tells you what it will do.)
Image
The people of Alderaan have been bravely fighting back the clone warriors sent out by the unscrupulous Sith Lord Palpatine for 771 days now.
Lifeline
Rusty Relic
Level 1
Level 1
Posts: 42
Joined: Tue Mar 03, 2020 11:15 pm

Re: Kernel update (appears to be solved)

Post by Rusty Relic »

Removing the obsolete kernels seems to have corrected the update issue. Thank you to everyone who responded and in particular to Karichen for noticing the outdated kernels. On that point how was I to know that there were extra kernels that should be removed and why isn't the Update Manager automatic maintenance supplied in running mode instead of needing to be turned on by the user?
Thanks again for the help.
motoryzen
Level 10
Level 10
Posts: 3474
Joined: Sun Dec 08, 2019 12:25 am

Re: Kernel update

Post by motoryzen »

how was I to know that there were extra kernels that should be removed and why isn't the Update Manager automatic maintenance supplied in running mode instead of needing to be turned on by the user?
I can't say I blame you for asking that. Perhaps Clem and/or his team can eventually implement that function within Update Manager someday ( shrugs) I definitely see it as a helpful thing for incoming Linux newcomers and really don't see how it could hurt anything.
Mint 21.2 Cinnamon 5.8.4
asrock x570 taichi ...bios p5.00
ryzen 5900x
128GB Kingston Fury @ 3600mhz
Corsair mp600 pro xt NVME ssd 4TB
three 4TB ssds
dual 1TB ssds
Two 16TB Toshiba hdd's
24GB amd 7900xtx vid card
Viewsonic Elite UHD 32" 144hz monitor
User avatar
Moem
Level 22
Level 22
Posts: 16230
Joined: Tue Nov 17, 2015 9:14 am
Location: The Netherlands
Contact:

Re: Kernel update

Post by Moem »

Mod note:
The question by Bullfinch1 is now here. Please do not piggyback on existing topics. Thanks!
Image

If your issue is solved, kindly indicate that by editing the first post in the topic, and adding [SOLVED] to the title. Thanks!
User avatar
karlchen
Level 23
Level 23
Posts: 18212
Joined: Sat Dec 31, 2011 7:21 am
Location: Germany

Re: Kernel update (appears to be solved)

Post by karlchen »

Rusty Relic wrote: Thu Apr 15, 2021 10:00 pmwhy isn't the Update Manager automatic maintenance supplied in running mode instead of needing to be turned on by the user?
Precisely what you request, in another thread, forum user Pjotr phrased the same as a suggestion.
Switch the default from "Automatic removal of obsolete kernels" is "Off" to "Automatic removal of obsolete kernels" is "On".
Let's see whether the Mint Dev Team will notice the request / suggestion and whether they will change the default setting.
(Update Manager => Edit => Preferences => Automation => Automatic Maintenance, default: off)
Image
The people of Alderaan have been bravely fighting back the clone warriors sent out by the unscrupulous Sith Lord Palpatine for 771 days now.
Lifeline
Locked

Return to “Software & Applications”