Contenu | Rechercher | Menus

Annonce

Si vous avez des soucis pour rester connecté, déconnectez-vous puis reconnectez-vous depuis ce lien en cochant la case
Me connecter automatiquement lors de mes prochaines visites.

À propos de l'équipe du forum.

#26 Le 23/01/2021, à 22:17

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ sudo canonical-livepatch refresh
[sudo] Mot de passe de kiki : 
checking for patches
nothing to apply
kernel: 5.4.0-52.57-generic
patch state: ✗ the application caused a crash last time it was applied, check system logs with `journalctl -f -t canonical-livepatch`
patch version: 74.1

kiki@kiki-Aspire-F5-573G:~$ 

Hors ligne

#27 Le 24/01/2021, à 12:02

kiki620

Re : [Résolu] livepatch

bonjour comment on fait pour revenir a la version 1ere. car je me demande si il n'y a pas 2 versions qui se mélangent j'ai plusieurs programmes en double

Dernière modification par kiki620 (Le 24/01/2021, à 12:04)

Hors ligne

#28 Le 24/01/2021, à 18:19

kiki620

Re : [Résolu] livepatch

coucou personne pour aider

Hors ligne

#29 Le 24/01/2021, à 19:17

xubu1957

Re : [Résolu] livepatch


Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#30 Le 24/01/2021, à 19:23

kiki620

Re : [Résolu] livepatch

bonsoir voilà

kiki@kiki-Aspire-F5-573G:~$ sudo canonical-livepatch status --verbose
[sudo] Mot de passe de kiki : 
{
  "Client-Version": "9.5.5",
  "Architecture": "x86_64",
  "CPU-Model": "Intel(R) Core(TM) i7-7500U CPU @ 2.70GHz",
  "Last-Check": "2021-01-21T14:11:51+01:00",
  "Boot-Time": "2021-01-24T06:33:09Z",
  "Uptime": "39181",
  "Status": [
    {
      "Kernel": "5.4.0-52.57-generic",
      "Running": true,
      "Livepatch": {
        "CheckState": "check-failed",
        "CheckInfo": "apply-failed",
        "State": "apply-failed",
        "Version": "74.1",
        "Fixes": [
          {
            "Name": "cve-2013-1798",
            "Description": "The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux \nkernel through 3.8.4 does not properly handle a certain combination of \ninvalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which \nallows guest OS users to obtain sensitive information from host OS \nmemory or cause a denial of service (host OS OOPS) via a crafted \napplication.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-0155",
            "Description": "Insufficient access control in a subsystem for Intel (R) processor \ngraphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) \nProcessor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold \nSeries; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; \nIntel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) \nProcessor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; \nIntel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or \n26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux \nDriver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, \n4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to \npotentially enable escalation of privilege via local access.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-0155:",
            "Description": "",
            "Bug": "1852141",
            "Patched": true
          },
          {
            "Name": "cve-2019-14615",
            "Description": "Insufficient control flow in certain data structures for some Intel(R) \nProcessors with Intel(R) Processor Graphics may allow an \nunauthenticated user to potentially enable information disclosure via \nlocal access.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-14895",
            "Description": "A heap-based buffer overflow was discovered in the Linux kernel, all \nversions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. \nThe flaw could occur when the station attempts a connection negotiation \nduring the handling of the remote devices country settings. This could \nallow the remote device to cause a denial of service (system crash) or \npossibly execute arbitrary code.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-14896",
            "Description": "A heap-based buffer overflow vulnerability was found in the Linux \nkernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote \nattacker could cause a denial of service (system crash) or, possibly \nexecute arbitrary code, when the lbs_ibss_join_existing function is \ncalled after a STA connects to an AP.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-14897",
            "Description": "A stack-based buffer overflow was found in the Linux kernel, version \nkernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to \ncause a denial of service (system crash) or, possibly execute arbitrary \ncode, when a STA works in IBSS mode (allows connecting stations \ntogether without the use of an AP) and connects to another STA.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-14901",
            "Description": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x \nand 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability \nallows a remote attacker to cause a system crash, resulting in a denial \nof service, or execute arbitrary code. The highest threat with this \nvulnerability is with the availability of the system. If code execution \noccurs, the code will run with the permissions of root. This will \naffect both confidentiality and integrity of files on the system.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-18885",
            "Description": "fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a \nbtrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs \nimage because fs_devices-\u003edevices is mishandled within find_device, aka \nCID-09ba3bc9dd15.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-19642",
            "Description": "On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS \n02.68, the Virtual Media feature allows OS Command Injection by \nauthenticated attackers who can send HTTP requests to the IPMI IP \naddress. This requires a POST to /rpc/setvmdrive.asp with shell \nmetacharacters in ShareHost or ShareName. The attacker can achieve a \npersistent backdoor.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-20096",
            "Description": "In the Linux kernel before 5.1, there is a memory leak in \n__feat_register_sp() in net/dccp/feat.c, which may cause denial of \nservice, aka CID-1d3ff0950e2b.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2019-3016",
            "Description": "In a Linux KVM guest that has PV TLB enabled, a process in the guest \nkernel may be able to read memory locations from another process in the \nsame guest. This problem is limit to the host running linux kernel 4.10 \nwith a guest running linux kernel 4.16 or later. The problem mainly \naffects AMD processors but Intel CPUs cannot be ruled out.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-10757",
            "Description": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the \nway mremap handled DAX Huge Pages. This flaw allows a local attacker \nwith access to a DAX enabled storage to escalate their privileges on \nthe system.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-11494",
            "Description": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the \nLinux kernel 3.16 through 5.6.2. It allows attackers to read \nuninitialized can_frame data, potentially containing sensitive \ninformation from kernel stack memory, if the configuration lacks \nCONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-11935",
            "Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-12114",
            "Description": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x \nbefore 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x \nbefore 4.19.119, and 5.x before 5.3 allows local users to cause a \ndenial of service (panic) by corrupting a mountpoint reference counter.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-12351",
            "Description": "Improper input validation in BlueZ may allow an unauthenticated user to \npotentially enable escalation of privilege via adjacent access.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-12352",
            "Description": "Improper access control in BlueZ may allow an unauthenticated user to \npotentially enable information disclosure via adjacent access.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-14386",
            "Description": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption \ncan be exploited to gain root privileges from unprivileged processes. \nThe highest threat from this vulnerability is to data confidentiality \nand integrity.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-14416",
            "Description": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data \nhandling in the slip and slcan line discipline could lead to a \nuse-after-free, aka CID-0ace17d56824. This affects \ndrivers/net/slip/slip.c and drivers/net/can/slcan.c.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-16119",
            "Description": "Use-after-free vulnerability in the Linux kernel exploitable by a local \nattacker due to reuse of a DCCP socket with an attached \ndccps_hc_tx_ccid object as a listener after being released. Fixed in \nUbuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, \n4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-16120",
            "Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-24490",
            "Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-2732",
            "Description": "A flaw was discovered in the way that the KVM hypervisor handled \ninstruction emulation for an L2 guest when nested virtualisation is \nenabled. Under some circumstances, an L2 guest may trick the L0 guest \ninto accessing sensitive L1 resources that should be inaccessible to \nthe L2 guest.\" \"** RESERVED cvelist lib tardir usr This candidate has \nbeen reserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-28374",
            "Description": "In drivers/target/target_core_xcopy.c in the Linux kernel before \n5.10.7, insufficient identifier checking in the LIO SCSI target code \ncan be used by remote attackers to read or write files via directory \ntraversal in an XCOPY request, aka CID-2896c93811e3. For example, an \nattack can occur over a network if the attacker has access to one iSCSI \nLUN. The attacker gains control over file access because I/O operations \nare proxied via an attacker-selected backstore.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-8647",
            "Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-8648",
            "Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
            "Bug": "",
            "Patched": true
          },
          {
            "Name": "cve-2020-8649",
            "Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the vgacon_invert_region function in \ndrivers/video/console/vgacon.c.",
            "Bug": "",
            "Patched": true
          }
        ]
      }
    }
  ]
}

Hors ligne

#31 Le 24/01/2021, à 19:28

xubu1957

Re : [Résolu] livepatch

Essaye :

sudo apt update

Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#32 Le 24/01/2021, à 19:31

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ sudo apt update
[sudo] Mot de passe de kiki : 
Atteint :1 http://archive.ubuntu.com/ubuntu focal InRelease
Atteint :2 http://archive.canonical.com/ubuntu focal InRelease
Lecture des listes de paquets... Fait
Construction de l'arbre des dépendances       
Lecture des informations d'état... Fait
Tous les paquets sont à jour.
kiki@kiki-Aspire-F5-573G:~

Hors ligne

#33 Le 24/01/2021, à 19:34

kiki620

Re : [Résolu] livepatch

dans les mises a jour il ne faudrait pas cocher quelques chose car moi je ne fait que mes mises à jour que de partenaires canonical tous les autres j'ai décoché

Hors ligne

#34 Le 24/01/2021, à 19:36

xubu1957

Re : [Résolu] livepatch

Montre le sources.list :

find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;

Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#35 Le 24/01/2021, à 19:37

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;

/etc/apt/sources.list.d/teejee2008-ubuntu-ppa-bionic.list

     1	# deb http://ppa.launchpad.net/teejee2008/ppa/ubuntu focal main # désactivé pour la mise à niveau vers focal
     2	# deb-src http://ppa.launchpad.net/teejee2008/ppa/ubuntu focal main # désactivé pour la mise à niveau vers focal

/etc/apt/sources.list.d/google-chrome.list

     1	# deb [arch=amd64] https://dl.google.com/linux/chrome/deb/ stable main # désactivé pour la mise à niveau vers focal

/etc/apt/sources.list

     1	# deb cdrom:[Ubuntu 18.04.2 LTS _Bionic Beaver_ - Release amd64 (20190210)]/ bionic main restricted
     2	
     3	# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
     4	# newer versions of the distribution.
     5	# deb http://mirror.de.leaseweb.net/ubuntu/ focal restricted main
     6	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic main restricted
     7	
     8	## Major bug fix updates produced after the final release of the
     9	## distribution.
    10	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates restricted main
    11	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
    12	
    13	## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
    14	## team. Also, please note that software in universe WILL NOT receive any
    15	## review or updates from the Ubuntu security team.
    16	# deb http://mirror.de.leaseweb.net/ubuntu/ focal universe
    17	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic universe
    18	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates universe
    19	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates universe
    20	
    21	## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu 
    22	## team, and may not be under a free licence. Please satisfy yourself as to 
    23	## your rights to use the software. Also, please note that software in 
    24	## multiverse WILL NOT receive any review or updates from the Ubuntu
    25	## security team.
    26	# deb http://mirror.de.leaseweb.net/ubuntu/ focal multiverse
    27	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic multiverse
    28	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates multiverse
    29	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates multiverse
    30	
    31	## N.B. software from this repository may not have been tested as
    32	## extensively as that contained in the main release, although it includes
    33	## newer versions of some applications which may provide useful features.
    34	## Also, please note that software in backports WILL NOT receive any review
    35	## or updates from the Ubuntu security team.
    36	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-backports restricted universe multiverse main
    37	# deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-backports main restricted universe multiverse
    38	
    39	## Uncomment the following two lines to add software from Canonical's
    40	## 'partner' repository.
    41	## This software is not part of Ubuntu, but is offered by Canonical and the
    42	## respective vendors as a service to Ubuntu users.
    43	deb http://archive.canonical.com/ubuntu focal partner
    44	deb-src http://archive.canonical.com/ubuntu focal partner
    45	
    46	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-security restricted main
    47	# deb-src http://security.ubuntu.com/ubuntu bionic-security main restricted
    48	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-security universe
    49	# deb-src http://security.ubuntu.com/ubuntu bionic-security universe
    50	# deb http://mirror.de.leaseweb.net/ubuntu/ focal-security multiverse
    51	# deb-src http://security.ubuntu.com/ubuntu bionic-security multiverse
    52	deb http://archive.ubuntu.com/ubuntu focal main universe restricted multiverse
kiki@kiki-Aspire-F5-573G:~$ 

Hors ligne

#36 Le 24/01/2021, à 19:43

xubu1957

Re : [Résolu] livepatch

Tu devrais tenter :  Suis le message # 37.

Le 21/10/2020, cqfd93 a écrit :

Bon, à priori, ça devrait se régler rapidement.

Les fichiers de ppa ne contenant que des dépôts désactivés, on peut faire du vide dans ces dossiers et si un jour tu en as besoin, tu pourras toujours les réinstaller proprement.
Pour faire ce vide :

cd /etc/apt/sources.list.d
sudo rm -v *.list*

Pour sources.list, le mieux est de remplacer l'existant par un truc complet mais épuré de tout commentaire. Copie / colle ce bloc en une seule fois dans le terminal (et termine avec Entrée) :

sudo tee /etc/apt/sources.list <<EOF

deb http://fr.archive.ubuntu.com/ubuntu/ focal main restricted universe multiverse 

deb http://fr.archive.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse 
deb http://fr.archive.ubuntu.com/ubuntu/ focal-updates main restricted universe multiverse 
deb http://fr.archive.ubuntu.com/ubuntu/ focal-backports main restricted universe multiverse 

deb http://archive.canonical.com/ubuntu focal partner
EOF

Et après tout ça, tu peux faire les mises à jour :

sudo apt update
sudo apt full-upgrade

repris dans Problème /etc/apt/sources.list Résolu

Dernière modification par xubu1957 (Le 24/01/2021, à 19:49)


Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#37 Le 24/01/2021, à 19:44

lepolau

Re : [Résolu] livepatch

1 / Donne le retour de cette commande :

grep livepatch /var/log/syslog

2 / Et essaye de te déconnecter de livepatch et de te reconnecter.

Hors ligne

#38 Le 24/01/2021, à 19:50

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ grep livepatch /var/log/syslog
Jan 24 07:34:05 kiki-Aspire-F5-573G systemd[1]: Started Service for snap application canonical-livepatch.canonical-livepatchd.
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting client daemon version 9.5.5
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "mitigation loop"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "mitigation loop" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "socket servers"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "socket servers" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "refresh loop"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "refresh loop" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: client daemon started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 07:37:59 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:37:59 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:10 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:38:12 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:39:10 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:39:12 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:32:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:32:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 16:04:11 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 18:26:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:26:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 18:29:11 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 18:36:07 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:36:07 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
kiki@kiki-Aspire-F5-573G:~$ 

Hors ligne

#39 Le 24/01/2021, à 19:56

lepolau

Re : [Résolu] livepatch

essaye :

sudo rm /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1

Hors ligne

#40 Le 24/01/2021, à 19:58

kiki620

Re : [Résolu] livepatch

toujours pareil désactivé  réactivé même redémarrer mon ordi maintenant j'ai tout  plein de mise a jour mais on m'a toujours dis de faire ses mises à jours de partenaires caniconal

Hors ligne

#41 Le 24/01/2021, à 20:00

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ sudo rm /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
[sudo] Mot de passe de kiki : 
rm: impossible de supprimer '/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1': Aucun fichier ou dossier de ce typ

Hors ligne

#42 Le 24/01/2021, à 20:02

kiki620

Re : [Résolu] livepatch

dois-je faire la mise à jour ??

Hors ligne

#43 Le 24/01/2021, à 20:19

xubu1957

Re : [Résolu] livepatch

Tu as utilisé la réponse du message #36 ?


Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#44 Le 24/01/2021, à 20:27

kiki620

Re : [Résolu] livepatch

oui on la fait ensemble faut refaire tout. j'ai fait la mise à jour et c'est toujours pareil sad

Hors ligne

#45 Le 24/01/2021, à 20:29

xubu1957

Re : [Résolu] livepatch

Si tu as suivi les consignes de cqfd93, montre le nouveau sources.list :

find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;

Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci.                   Membre de Linux-Azur

Hors ligne

#46 Le 24/01/2021, à 20:31

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;

/etc/apt/sources.list

     1	
     2	deb http://fr.archive.ubuntu.com/ubuntu/ focal main restricted universe multiverse
     3	
     4	deb http://fr.archive.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse
     5	
     6	deb http://archive.canonical.com/ubuntu focal partner
     7	deb http://security.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse
     8	deb http://fr.archive.ubuntu.com/ubuntu/ focal-updates multiverse main restricted universe
     9	deb http://fr.archive.ubuntu.com/ubuntu/ focal-backports multiverse main restricted universe
kiki@kiki-Aspire-F5-573G:~$ 

Hors ligne

#47 Le 24/01/2021, à 20:31

lepolau

Re : [Résolu] livepatch

fais :

cd /var/snap/canonical-livepatch/common/locks

puis

ls

et donne le retour stp

Hors ligne

#48 Le 24/01/2021, à 20:34

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ cd /var/snap/canonical-livepatch/common/locks
bash: cd: /var/snap/canonical-livepatch/common/locks: Permission non accordée
kiki@kiki-Aspire-F5-573G:~$ 

Dernière modification par kiki620 (Le 24/01/2021, à 20:34)

Hors ligne

#49 Le 24/01/2021, à 20:42

lepolau

Re : [Résolu] livepatch

essais :

sudo rm -r /var/snap/canonical-livepatch/common/locks

Hors ligne

#50 Le 24/01/2021, à 20:47

kiki620

Re : [Résolu] livepatch

kiki@kiki-Aspire-F5-573G:~$ sudo rm -r /var/snap/canonical-livepatch/common/locks
[sudo] Mot de passe de kiki : 
rm: impossible de supprimer '/var/snap/canonical-livepatch/common/locks': Aucun fichier ou dossier de ce type
kiki@kiki-Aspire-F5-573G:~$ 

Hors ligne