#26 Le 23/01/2021, à 22:17
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ sudo canonical-livepatch refresh
[sudo] Mot de passe de kiki :
checking for patches
nothing to apply
kernel: 5.4.0-52.57-generic
patch state: ✗ the application caused a crash last time it was applied, check system logs with `journalctl -f -t canonical-livepatch`
patch version: 74.1
kiki@kiki-Aspire-F5-573G:~$
Hors ligne
#27 Le 24/01/2021, à 12:02
- kiki620
Re : [Résolu] livepatch
bonjour comment on fait pour revenir a la version 1ere. car je me demande si il n'y a pas 2 versions qui se mélangent j'ai plusieurs programmes en double
Dernière modification par kiki620 (Le 24/01/2021, à 12:04)
Hors ligne
#28 Le 24/01/2021, à 18:19
- kiki620
Re : [Résolu] livepatch
coucou personne pour aider
Hors ligne
#29 Le 24/01/2021, à 19:17
- xubu1957
Re : [Résolu] livepatch
Bonjour,
Quel retour avec :
sudo canonical-livepatch status --verbose
?
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#30 Le 24/01/2021, à 19:23
- kiki620
Re : [Résolu] livepatch
bonsoir voilà
kiki@kiki-Aspire-F5-573G:~$ sudo canonical-livepatch status --verbose
[sudo] Mot de passe de kiki :
{
"Client-Version": "9.5.5",
"Architecture": "x86_64",
"CPU-Model": "Intel(R) Core(TM) i7-7500U CPU @ 2.70GHz",
"Last-Check": "2021-01-21T14:11:51+01:00",
"Boot-Time": "2021-01-24T06:33:09Z",
"Uptime": "39181",
"Status": [
{
"Kernel": "5.4.0-52.57-generic",
"Running": true,
"Livepatch": {
"CheckState": "check-failed",
"CheckInfo": "apply-failed",
"State": "apply-failed",
"Version": "74.1",
"Fixes": [
{
"Name": "cve-2013-1798",
"Description": "The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux \nkernel through 3.8.4 does not properly handle a certain combination of \ninvalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which \nallows guest OS users to obtain sensitive information from host OS \nmemory or cause a denial of service (host OS OOPS) via a crafted \napplication.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-0155",
"Description": "Insufficient access control in a subsystem for Intel (R) processor \ngraphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) \nProcessor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold \nSeries; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; \nIntel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) \nProcessor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; \nIntel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or \n26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux \nDriver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, \n4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to \npotentially enable escalation of privilege via local access.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-0155:",
"Description": "",
"Bug": "1852141",
"Patched": true
},
{
"Name": "cve-2019-14615",
"Description": "Insufficient control flow in certain data structures for some Intel(R) \nProcessors with Intel(R) Processor Graphics may allow an \nunauthenticated user to potentially enable information disclosure via \nlocal access.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-14895",
"Description": "A heap-based buffer overflow was discovered in the Linux kernel, all \nversions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. \nThe flaw could occur when the station attempts a connection negotiation \nduring the handling of the remote devices country settings. This could \nallow the remote device to cause a denial of service (system crash) or \npossibly execute arbitrary code.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-14896",
"Description": "A heap-based buffer overflow vulnerability was found in the Linux \nkernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote \nattacker could cause a denial of service (system crash) or, possibly \nexecute arbitrary code, when the lbs_ibss_join_existing function is \ncalled after a STA connects to an AP.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-14897",
"Description": "A stack-based buffer overflow was found in the Linux kernel, version \nkernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to \ncause a denial of service (system crash) or, possibly execute arbitrary \ncode, when a STA works in IBSS mode (allows connecting stations \ntogether without the use of an AP) and connects to another STA.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-14901",
"Description": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x \nand 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability \nallows a remote attacker to cause a system crash, resulting in a denial \nof service, or execute arbitrary code. The highest threat with this \nvulnerability is with the availability of the system. If code execution \noccurs, the code will run with the permissions of root. This will \naffect both confidentiality and integrity of files on the system.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-18885",
"Description": "fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a \nbtrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs \nimage because fs_devices-\u003edevices is mishandled within find_device, aka \nCID-09ba3bc9dd15.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-19642",
"Description": "On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS \n02.68, the Virtual Media feature allows OS Command Injection by \nauthenticated attackers who can send HTTP requests to the IPMI IP \naddress. This requires a POST to /rpc/setvmdrive.asp with shell \nmetacharacters in ShareHost or ShareName. The attacker can achieve a \npersistent backdoor.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-20096",
"Description": "In the Linux kernel before 5.1, there is a memory leak in \n__feat_register_sp() in net/dccp/feat.c, which may cause denial of \nservice, aka CID-1d3ff0950e2b.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2019-3016",
"Description": "In a Linux KVM guest that has PV TLB enabled, a process in the guest \nkernel may be able to read memory locations from another process in the \nsame guest. This problem is limit to the host running linux kernel 4.10 \nwith a guest running linux kernel 4.16 or later. The problem mainly \naffects AMD processors but Intel CPUs cannot be ruled out.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-10757",
"Description": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the \nway mremap handled DAX Huge Pages. This flaw allows a local attacker \nwith access to a DAX enabled storage to escalate their privileges on \nthe system.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-11494",
"Description": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the \nLinux kernel 3.16 through 5.6.2. It allows attackers to read \nuninitialized can_frame data, potentially containing sensitive \ninformation from kernel stack memory, if the configuration lacks \nCONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-11935",
"Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-12114",
"Description": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x \nbefore 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x \nbefore 4.19.119, and 5.x before 5.3 allows local users to cause a \ndenial of service (panic) by corrupting a mountpoint reference counter.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-12351",
"Description": "Improper input validation in BlueZ may allow an unauthenticated user to \npotentially enable escalation of privilege via adjacent access.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-12352",
"Description": "Improper access control in BlueZ may allow an unauthenticated user to \npotentially enable information disclosure via adjacent access.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-14386",
"Description": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption \ncan be exploited to gain root privileges from unprivileged processes. \nThe highest threat from this vulnerability is to data confidentiality \nand integrity.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-14416",
"Description": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data \nhandling in the slip and slcan line discipline could lead to a \nuse-after-free, aka CID-0ace17d56824. This affects \ndrivers/net/slip/slip.c and drivers/net/can/slcan.c.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-16119",
"Description": "Use-after-free vulnerability in the Linux kernel exploitable by a local \nattacker due to reuse of a DCCP socket with an attached \ndccps_hc_tx_ccid object as a listener after being released. Fixed in \nUbuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, \n4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-16120",
"Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-24490",
"Description": "cvelist lib tardir usr RESERVED cvelist lib tardir usr This candidate \nhas been reserved by an organization or individual that will use it \nwhen announcing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-2732",
"Description": "A flaw was discovered in the way that the KVM hypervisor handled \ninstruction emulation for an L2 guest when nested virtualisation is \nenabled. Under some circumstances, an L2 guest may trick the L0 guest \ninto accessing sensitive L1 resources that should be inaccessible to \nthe L2 guest.\" \"** RESERVED cvelist lib tardir usr This candidate has \nbeen reserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.\" \"** \nRESERVED cvelist lib tardir usr This candidate has been reserved by an \norganization or individual that will use it when announcing a new \nsecurity problem. When the candidate has been publicized, the details \nfor this candidate will be provided.\" \"** RESERVED cvelist lib tardir \nusr This candidate has been reserved by an organization or individual \nthat will use it when announcing a new security problem. When the \ncandidate has been publicized, the details for this candidate will be \nprovided.\" \"** RESERVED cvelist lib tardir usr This candidate has been \nreserved by an organization or individual that will use it when \nannouncing a new security problem. When the candidate has been \npublicized, the details for this candidate will be provided.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-28374",
"Description": "In drivers/target/target_core_xcopy.c in the Linux kernel before \n5.10.7, insufficient identifier checking in the LIO SCSI target code \ncan be used by remote attackers to read or write files via directory \ntraversal in an XCOPY request, aka CID-2896c93811e3. For example, an \nattack can occur over a network if the attacker has access to one iSCSI \nLUN. The attacker gains control over file access because I/O operations \nare proxied via an attacker-selected backstore.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-8647",
"Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-8648",
"Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"Bug": "",
"Patched": true
},
{
"Name": "cve-2020-8649",
"Description": "There is a use-after-free vulnerability in the Linux kernel through \n5.5.2 in the vgacon_invert_region function in \ndrivers/video/console/vgacon.c.",
"Bug": "",
"Patched": true
}
]
}
}
]
}
Hors ligne
#31 Le 24/01/2021, à 19:28
- xubu1957
Re : [Résolu] livepatch
Essaye :
sudo apt update
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#32 Le 24/01/2021, à 19:31
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ sudo apt update
[sudo] Mot de passe de kiki :
Atteint :1 http://archive.ubuntu.com/ubuntu focal InRelease
Atteint :2 http://archive.canonical.com/ubuntu focal InRelease
Lecture des listes de paquets... Fait
Construction de l'arbre des dépendances
Lecture des informations d'état... Fait
Tous les paquets sont à jour.
kiki@kiki-Aspire-F5-573G:~
Hors ligne
#33 Le 24/01/2021, à 19:34
- kiki620
Re : [Résolu] livepatch
dans les mises a jour il ne faudrait pas cocher quelques chose car moi je ne fait que mes mises à jour que de partenaires canonical tous les autres j'ai décoché
Hors ligne
#34 Le 24/01/2021, à 19:36
- xubu1957
Re : [Résolu] livepatch
Montre le sources.list :
find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#35 Le 24/01/2021, à 19:37
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;
/etc/apt/sources.list.d/teejee2008-ubuntu-ppa-bionic.list
1 # deb http://ppa.launchpad.net/teejee2008/ppa/ubuntu focal main # désactivé pour la mise à niveau vers focal
2 # deb-src http://ppa.launchpad.net/teejee2008/ppa/ubuntu focal main # désactivé pour la mise à niveau vers focal
/etc/apt/sources.list.d/google-chrome.list
1 # deb [arch=amd64] https://dl.google.com/linux/chrome/deb/ stable main # désactivé pour la mise à niveau vers focal
/etc/apt/sources.list
1 # deb cdrom:[Ubuntu 18.04.2 LTS _Bionic Beaver_ - Release amd64 (20190210)]/ bionic main restricted
2
3 # See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
4 # newer versions of the distribution.
5 # deb http://mirror.de.leaseweb.net/ubuntu/ focal restricted main
6 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic main restricted
7
8 ## Major bug fix updates produced after the final release of the
9 ## distribution.
10 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates restricted main
11 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
12
13 ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
14 ## team. Also, please note that software in universe WILL NOT receive any
15 ## review or updates from the Ubuntu security team.
16 # deb http://mirror.de.leaseweb.net/ubuntu/ focal universe
17 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic universe
18 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates universe
19 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates universe
20
21 ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
22 ## team, and may not be under a free licence. Please satisfy yourself as to
23 ## your rights to use the software. Also, please note that software in
24 ## multiverse WILL NOT receive any review or updates from the Ubuntu
25 ## security team.
26 # deb http://mirror.de.leaseweb.net/ubuntu/ focal multiverse
27 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic multiverse
28 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-updates multiverse
29 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-updates multiverse
30
31 ## N.B. software from this repository may not have been tested as
32 ## extensively as that contained in the main release, although it includes
33 ## newer versions of some applications which may provide useful features.
34 ## Also, please note that software in backports WILL NOT receive any review
35 ## or updates from the Ubuntu security team.
36 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-backports restricted universe multiverse main
37 # deb-src http://be.archive.ubuntu.com/ubuntu/ bionic-backports main restricted universe multiverse
38
39 ## Uncomment the following two lines to add software from Canonical's
40 ## 'partner' repository.
41 ## This software is not part of Ubuntu, but is offered by Canonical and the
42 ## respective vendors as a service to Ubuntu users.
43 deb http://archive.canonical.com/ubuntu focal partner
44 deb-src http://archive.canonical.com/ubuntu focal partner
45
46 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-security restricted main
47 # deb-src http://security.ubuntu.com/ubuntu bionic-security main restricted
48 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-security universe
49 # deb-src http://security.ubuntu.com/ubuntu bionic-security universe
50 # deb http://mirror.de.leaseweb.net/ubuntu/ focal-security multiverse
51 # deb-src http://security.ubuntu.com/ubuntu bionic-security multiverse
52 deb http://archive.ubuntu.com/ubuntu focal main universe restricted multiverse
kiki@kiki-Aspire-F5-573G:~$
Hors ligne
#36 Le 24/01/2021, à 19:43
- xubu1957
Re : [Résolu] livepatch
Tu devrais tenter : Suis le message # 37.
Bon, à priori, ça devrait se régler rapidement.
Les fichiers de ppa ne contenant que des dépôts désactivés, on peut faire du vide dans ces dossiers et si un jour tu en as besoin, tu pourras toujours les réinstaller proprement.
Pour faire ce vide :cd /etc/apt/sources.list.d sudo rm -v *.list*
Pour sources.list, le mieux est de remplacer l'existant par un truc complet mais épuré de tout commentaire. Copie / colle ce bloc en une seule fois dans le terminal (et termine avec Entrée) :
sudo tee /etc/apt/sources.list <<EOF deb http://fr.archive.ubuntu.com/ubuntu/ focal main restricted universe multiverse deb http://fr.archive.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse deb http://fr.archive.ubuntu.com/ubuntu/ focal-updates main restricted universe multiverse deb http://fr.archive.ubuntu.com/ubuntu/ focal-backports main restricted universe multiverse deb http://archive.canonical.com/ubuntu focal partner EOF
Et après tout ça, tu peux faire les mises à jour :
sudo apt update sudo apt full-upgrade
repris dans Problème /etc/apt/sources.list Résolu
Dernière modification par xubu1957 (Le 24/01/2021, à 19:49)
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#37 Le 24/01/2021, à 19:44
- lepolau
Re : [Résolu] livepatch
1 / Donne le retour de cette commande :
grep livepatch /var/log/syslog
2 / Et essaye de te déconnecter de livepatch et de te reconnecter.
Hors ligne
#38 Le 24/01/2021, à 19:50
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ grep livepatch /var/log/syslog
Jan 24 07:34:05 kiki-Aspire-F5-573G systemd[1]: Started Service for snap application canonical-livepatch.canonical-livepatchd.
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting client daemon version 9.5.5
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "mitigation loop"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "mitigation loop" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "socket servers"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "socket servers" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: starting svc "refresh loop"
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: service "refresh loop" started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: client daemon started
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 07:34:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 07:34:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 07:37:59 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:37:59 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 07:38:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 07:38:10 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:38:12 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:39:10 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 07:39:12 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 08:29:30 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 08:30:00 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 09:15:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 09:16:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 10:02:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 10:02:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 11:08:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 11:08:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 11:32:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 11:32:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 12:07:52 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 12:08:22 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 13:21:25 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 13:21:55 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 14:19:15 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 14:19:45 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 15:32:47 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 15:33:17 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 16:04:11 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 16:41:03 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 16:41:33 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 17:39:31 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 17:40:01 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 18:26:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:26:10 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 18:29:11 kiki-Aspire-F5-573G snapd[889]: storehelpers.go:551: cannot refresh: snap has no updates available: "canonical-livepatch", "core", "core18", "gnome-3-26-1604", "gnome-3-28-1804", "gnome-3-34-1804", "gnome-calculator", "gnome-characters", "gnome-logs", "gnome-system-monitor", "gtk-common-themes", "spider-solitaire", "vlc"
Jan 24 18:36:07 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:36:07 kiki-Aspire-F5-573G canonical-livepatch[1020]: failure when getting status: apply-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 18:40:26 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: Client.Check
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: error in livepatch check state: check-failed
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: Module may have caused kernel crash! Not inserting module.
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: To override this warning, remove /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: multiple failures
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot check: apply-failed
Jan 24 18:40:56 kiki-Aspire-F5-573G canonical-livepatch[1020]: during refresh: cannot apply patches: lock file "/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1" already exists
kiki@kiki-Aspire-F5-573G:~$
Hors ligne
#39 Le 24/01/2021, à 19:56
- lepolau
Re : [Résolu] livepatch
essaye :
sudo rm /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
Hors ligne
#40 Le 24/01/2021, à 19:58
- kiki620
Re : [Résolu] livepatch
toujours pareil désactivé réactivé même redémarrer mon ordi maintenant j'ai tout plein de mise a jour mais on m'a toujours dis de faire ses mises à jours de partenaires caniconal
Hors ligne
#41 Le 24/01/2021, à 20:00
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ sudo rm /var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1
[sudo] Mot de passe de kiki :
rm: impossible de supprimer '/var/snap/canonical-livepatch/common/locks/livepatch_Ubuntu_5_4_0_52_57_generic_74_74.1': Aucun fichier ou dossier de ce typ
Hors ligne
#42 Le 24/01/2021, à 20:02
- kiki620
Re : [Résolu] livepatch
dois-je faire la mise à jour ??
Hors ligne
#43 Le 24/01/2021, à 20:19
- xubu1957
Re : [Résolu] livepatch
Tu as utilisé la réponse du message #36 ?
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#44 Le 24/01/2021, à 20:27
- kiki620
Re : [Résolu] livepatch
oui on la fait ensemble faut refaire tout. j'ai fait la mise à jour et c'est toujours pareil
Hors ligne
#45 Le 24/01/2021, à 20:29
- xubu1957
Re : [Résolu] livepatch
Si tu as suivi les consignes de cqfd93, montre le nouveau sources.list :
find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;
Conseils pour les nouveaux demandeurs et pas qu'eux
Important : Pensez à passer vos sujets en [Résolu] lorsque ceux-ci le sont, au début du titre en cliquant sur Modifier sous le premier message, et un bref récapitulatif de la solution à la fin de celui-ci. Merci. Membre de Linux-Azur
En ligne
#46 Le 24/01/2021, à 20:31
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ find /etc/apt -name '*.list' -exec bash -c 'echo -e "\n$1\n"; nl -ba "$1"' _ '{}' \;
/etc/apt/sources.list
1
2 deb http://fr.archive.ubuntu.com/ubuntu/ focal main restricted universe multiverse
3
4 deb http://fr.archive.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse
5
6 deb http://archive.canonical.com/ubuntu focal partner
7 deb http://security.ubuntu.com/ubuntu/ focal-security main restricted universe multiverse
8 deb http://fr.archive.ubuntu.com/ubuntu/ focal-updates multiverse main restricted universe
9 deb http://fr.archive.ubuntu.com/ubuntu/ focal-backports multiverse main restricted universe
kiki@kiki-Aspire-F5-573G:~$
Hors ligne
#47 Le 24/01/2021, à 20:31
- lepolau
Re : [Résolu] livepatch
fais :
cd /var/snap/canonical-livepatch/common/locks
puis
ls
et donne le retour stp
Hors ligne
#48 Le 24/01/2021, à 20:34
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ cd /var/snap/canonical-livepatch/common/locks
bash: cd: /var/snap/canonical-livepatch/common/locks: Permission non accordée
kiki@kiki-Aspire-F5-573G:~$
Dernière modification par kiki620 (Le 24/01/2021, à 20:34)
Hors ligne
#49 Le 24/01/2021, à 20:42
- lepolau
Re : [Résolu] livepatch
essais :
sudo rm -r /var/snap/canonical-livepatch/common/locks
Hors ligne
#50 Le 24/01/2021, à 20:47
- kiki620
Re : [Résolu] livepatch
kiki@kiki-Aspire-F5-573G:~$ sudo rm -r /var/snap/canonical-livepatch/common/locks
[sudo] Mot de passe de kiki :
rm: impossible de supprimer '/var/snap/canonical-livepatch/common/locks': Aucun fichier ou dossier de ce type
kiki@kiki-Aspire-F5-573G:~$
Hors ligne