Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Fix for kernel bug in Ubuntu 20.04 causing various issues

Fix for kernel bug in Ubuntu 20.04 causing various issues

Scheduled Pinned Locked Moved Solved Support
44 Posts 8 Posters 6.3k Views 9 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • O odie

    @odie part 2:

    Checking: fwupd ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: fwupd=1.3.11-1~focal1
    Checking: fwupd-signed ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: fwupd-signed=1.27.1ubuntu2+1.3.11-1~focal1
    Checking: grub-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: grub-common=2.04-1ubuntu26.12
    Checking: grub2-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: grub2-common=2.04-1ubuntu26.12
    Checking: initramfs-tools ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: initramfs-tools=0.136ubuntu6.6
    Checking: initramfs-tools-bin ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: initramfs-tools-bin=0.136ubuntu6.6
    Checking: initramfs-tools-core ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: initramfs-tools-core=0.136ubuntu6.6
    Checking: ipset ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: ipset=7.5-1~exp1
    Checking: keyutils ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: keyutils=1.6-6ubuntu1
    Checking: kmod ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: kmod=27-1ubuntu2
    Checking: landscape-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: landscape-common=19.12-0ubuntu4.2
    Checking: libapt-pkg6.0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libapt-pkg6.0=2.0.6
    Checking: libasound2 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libasound2=1.2.2-2.1ubuntu2.4
    Checking: libasound2-data ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libasound2-data=1.2.2-2.1ubuntu2.4
    Checking: libc-bin ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libc-bin=2.31-0ubuntu9.7
    Checking: libc-dev-bin ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libc-dev-bin=2.31-0ubuntu9.7
    Checking: libc6 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libc6=2.31-0ubuntu9.7
    Checking: libc6-dev ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libc6-dev=2.31-0ubuntu9.7
    Checking: libfwupd2 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libfwupd2=1.3.11-1~focal1
    Checking: libfwupdplugin1 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libfwupdplugin1=1.3.11-1~focal1
    Checking: libipset13 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libipset13=7.5-1~exp1
    Checking: libkeyutils1 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libkeyutils1=1.6-6ubuntu1
    Checking: libkmod2 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libkmod2=27-1ubuntu2
    Checking: libnetplan0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libnetplan0=0.102-0ubuntu1~20.04.2
    Checking: libnotify4 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libnotify4=0.7.9-1ubuntu2
    Checking: libnss-systemd ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libnss-systemd=245.4-4ubuntu3.15
    Checking: libpam-modules ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libpam-modules=1.3.1-5ubuntu4.2
    Checking: libpam-modules-bin ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libpam-modules-bin=1.3.1-5ubuntu4.2
    Checking: libpam-runtime ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libpam-runtime=1.3.1-5ubuntu4.2
    Checking: libpam-systemd ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libpam-systemd=245.4-4ubuntu3.15
    Checking: libpam0g ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libpam0g=1.3.1-5ubuntu4.2
    Checking: libprocps8 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libprocps8=2:3.3.16-1ubuntu2.2
    Checking: libsystemd0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libsystemd0=245.4-4ubuntu3.15
    Checking: libtss2-esys0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libtss2-esys0=2.3.2-1
    Checking: libudev1 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: libudev1=245.4-4ubuntu3.15
    Checking: linux-base ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: linux-base=4.5ubuntu3.6
    Checking: linux-firmware ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: linux-firmware=1.187.15
    Checking: locales ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: locales=2.31-0ubuntu9.7
    Checking: motd-news-config ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: motd-news-config=11ubuntu5.3
    Checking: mysql-client-8.0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: mysql-client-8.0=8.0.31-0ubuntu0.20.04.1
    Checking: mysql-client-core-8.0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: mysql-client-core-8.0=8.0.31-0ubuntu0.20.04.1
    Checking: mysql-server-8.0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: mysql-server-8.0=8.0.31-0ubuntu0.20.04.1
    Checking: mysql-server-core-8.0 ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: mysql-server-core-8.0=8.0.31-0ubuntu0.20.04.1
    Checking: netplan.io ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: netplan.io=0.102-0ubuntu1~20.04.2
    Checking: openssh-client ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: openssh-client=1:8.2p1-4ubuntu0.2
    Checking: openssh-server ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: openssh-server=1:8.2p1-4ubuntu0.2
    Checking: openssh-sftp-server ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: openssh-sftp-server=1:8.2p1-4ubuntu0.2
    Checking: overlayroot ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: overlayroot=0.45ubuntu1
    Checking: procps ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: procps=2:3.3.16-1ubuntu2.2
    Checking: python-apt-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python-apt-common=2.0.0ubuntu0.20.04.5
    Checking: python3-apport ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-apport=2.20.11-0ubuntu27.24
    Checking: python3-apt ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-apt=2.0.0ubuntu0.20.04.5
    Checking: python3-commandnotfound ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-commandnotfound=20.04.4
    Checking: python3-distupgrade ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-distupgrade=1:20.04.35
    Checking: python3-problem-report ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-problem-report=2.20.11-0ubuntu27.24
    Checking: python3-software-properties ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-software-properties=0.98.9.5
    Checking: python3-update-manager ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: python3-update-manager=1:20.04.10.7
    Checking: sbsigntool ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: sbsigntool=0.9.2-2ubuntu1
    Checking: software-properties-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: software-properties-common=0.98.9.5
    Checking: sosreport ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: sosreport=4.3-1ubuntu0.20.04.2
    Checking: systemd ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: systemd=245.4-4ubuntu3.15
    Checking: systemd-sysv ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: systemd-sysv=245.4-4ubuntu3.15
    Checking: systemd-timesyncd ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: systemd-timesyncd=245.4-4ubuntu3.15
    Checking: thermald ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: thermald=1.9.1-1ubuntu0.4
    Checking: ubuntu-advantage-tools ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: ubuntu-advantage-tools=20.3
    Checking: ubuntu-release-upgrader-core ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: ubuntu-release-upgrader-core=1:20.04.35
    Checking: udev ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: udev=245.4-4ubuntu3.15
    Checking: ufw ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: ufw=0.36-6
    Checking: unattended-upgrades ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: unattended-upgrades=2.3ubuntu0.1
    Checking: update-manager-core ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: update-manager-core=1:20.04.10.7
    Checking: update-notifier-common ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: update-notifier-common=3.192.30.8
    Checking: wget ([<Origin component:'main' archive:'focal-updates' origin:'Ubuntu' label:'Ubuntu' site:'no.archive.ubuntu.com' isTrusted:True>])
    adjusting candidate version: wget=1.20.3-1ubuntu1
    pkgs that look like they should be upgraded:
    Fetched 0 B in 0s (0 B/s)
    fetch.run() result: 0
    Packages blacklist due to conffile prompts: []
    No packages found that can be upgraded unattended and no pending auto-removals
    Package alsa-ucm-conf has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package apport has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package apt has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package apt-utils has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package base-files has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package bolt has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package cloud-init has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package cloud-initramfs-copymods has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package cloud-initramfs-dyn-netconf has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package command-not-found has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package distro-info-data has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package dmeventd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package dmsetup has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package fwupd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package fwupd-signed has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package grub-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package grub2-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package initramfs-tools has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package initramfs-tools-bin has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package initramfs-tools-core has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package ipset has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package keyutils has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package kmod has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package landscape-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libapt-pkg6.0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libasound2 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libasound2-data has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libc-bin has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libc-dev-bin has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libc6 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libc6-dev has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libdevmapper-event1.02.1 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libdevmapper1.02.1 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libfwupd2 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libfwupdplugin1 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libipset13 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libkeyutils1 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libkmod2 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package liblvm2cmd2.03 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libnetplan0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libnotify4 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libnss-systemd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libpam-modules has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libpam-modules-bin has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libpam-runtime has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libpam-systemd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libpam0g has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libprocps8 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libsystemd0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libtss2-esys0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package libudev1 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package linux-base has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package linux-firmware has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package locales has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package lvm2 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package motd-news-config has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package mysql-client-8.0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package mysql-client-core-8.0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package mysql-server-8.0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package mysql-server-core-8.0 has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package netplan.io has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package openssh-client has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package openssh-server has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package openssh-sftp-server has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package overlayroot has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package procps has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python-apt-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-apport has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-apt has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-commandnotfound has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-distupgrade has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-problem-report has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-software-properties has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package python3-update-manager has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package sbsigntool has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package software-properties-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package sosreport has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package systemd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package systemd-sysv has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package systemd-timesyncd has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package thermald has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package ubuntu-advantage-tools has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package ubuntu-release-upgrader-core has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package udev has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package ufw has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package unattended-upgrades has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package update-manager-core has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package update-notifier-common has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Package wget has a higher version available, checking if it is from an allowed origin and is not pinned down.
    Extracting content from /var/log/unattended-upgrades/unattended-upgrades-dpkg.log since 2022-12-07 14:06:57
    
    girishG Offline
    girishG Offline
    girish
    Staff
    wrote on last edited by
    #35

    @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

    O 1 Reply Last reply
    0
    • girishG girish

      @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

      O Offline
      O Offline
      odie
      wrote on last edited by
      #36

      @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

      @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

      Thanks for the quick response.

      When I do the apt-list -a, I get the following output:

      linux-image-5.4.0-135-generic/focal-updates,focal-security,now 5.4.0-135.152 amd64 [installed,automatic]

      When I do the sudo update-grub, I get:

      Sourcing file `/etc/default/grub'
      /usr/sbin/grub-mkconfig: 6: /etc/default/grub: options: not found
      

      Meanwhile, while I went home from work an hour+ ago, my Cloudron updated to 7.3.4, and it's been stuck on "starting services, this might take a while" for more than an hour now, according to logs. (logs stopped updating 1 hour 10 minutes ago)

      O 1 Reply Last reply
      0
      • O odie

        @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

        @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

        Thanks for the quick response.

        When I do the apt-list -a, I get the following output:

        linux-image-5.4.0-135-generic/focal-updates,focal-security,now 5.4.0-135.152 amd64 [installed,automatic]

        When I do the sudo update-grub, I get:

        Sourcing file `/etc/default/grub'
        /usr/sbin/grub-mkconfig: 6: /etc/default/grub: options: not found
        

        Meanwhile, while I went home from work an hour+ ago, my Cloudron updated to 7.3.4, and it's been stuck on "starting services, this might take a while" for more than an hour now, according to logs. (logs stopped updating 1 hour 10 minutes ago)

        O Offline
        O Offline
        odie
        wrote on last edited by
        #37

        @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

        @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

        @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

        Thanks for the quick response.

        When I do the apt-list -a, I get the following output:

        linux-image-5.4.0-135-generic/focal-updates,focal-security,now 5.4.0-135.152 amd64 [installed,automatic]

        When I do the sudo update-grub, I get:

        Sourcing file `/etc/default/grub'
        /usr/sbin/grub-mkconfig: 6: /etc/default/grub: options: not found
        

        Meanwhile, while I went home from work an hour+ ago, my Cloudron updated to 7.3.4, and it's been stuck on "starting services, this might take a while" for more than an hour now, according to logs. (logs stopped updating 1 hour 10 minutes ago)

        I get logs like this on my Cloudron. All services fail to start, except "Cloudron", "docker", "nginx" and "unbound". Only the logs on "Cloudron" update. Logs like this:

        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.956 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 9.478 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 9.101 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.384 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.285 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 575.305 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.920 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 8.970 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 13.121 ms - 89
        GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.917 ms - 89
        Dec 07 17:13:56 box:locker Lock unreleased platform_start
        Dec 07 17:18:56 box:locker Lock unreleased platform_start
        GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 1038.846 ms - 89
        Dec 07 17:23:22 box:shell statusUnbound exec: systemctl is-active unbound
        Dec 07 17:23:22 box:shell statusNginx exec: systemctl is-active nginx
        Dec 07 17:23:22 box:shell statusUnbound (stdout): active
        Dec 07 17:23:22 box:shell statusUnbound (stderr): null
        Dec 07 17:23:22 box:shell statusNginx (stdout): active
        Dec 07 17:23:22 box:shell statusNginx (stderr): null
        Dec 07 17:23:56 box:locker Lock unreleased platform_start
        GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 2381.412 ms - 89
        Dec 07 17:27:38 box:shell statusUnbound exec: systemctl is-active unbound
        Dec 07 17:27:38 box:shell statusUnbound (stdout): active
        Dec 07 17:27:38 box:shell statusUnbound (stderr): null
        Dec 07 17:27:38 box:shell statusNginx exec: systemctl is-active nginx
        Dec 07 17:27:38 box:shell statusNginx (stdout): active
        Dec 07 17:27:38 box:shell statusNginx (stderr): null
        GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 989.596 ms - 89
        Dec 07 17:28:56 box:locker Lock unreleased platform_start
        Dec 07 17:28:57 box:shell statusUnbound exec: systemctl is-active unbound
        Dec 07 17:28:57 box:shell statusUnbound (stdout): active
        Dec 07 17:28:57 box:shell statusUnbound (stderr): null
        Dec 07 17:28:57 box:shell statusNginx exec: systemctl is-active nginx
        Dec 07 17:28:57 box:shell statusNginx (stdout): active
        Dec 07 17:28:57 box:shell statusNginx (stderr): null
        Dec 07 17:29:00 box:cloudron Getting logs for box as json
        
        girishG 1 Reply Last reply
        0
        • O odie

          @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

          @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

          @odie BTW, I had edited my original post on how to reverse the changes. Did you see that? You have to make the grub changes if you haven't done so already.

          Thanks for the quick response.

          When I do the apt-list -a, I get the following output:

          linux-image-5.4.0-135-generic/focal-updates,focal-security,now 5.4.0-135.152 amd64 [installed,automatic]

          When I do the sudo update-grub, I get:

          Sourcing file `/etc/default/grub'
          /usr/sbin/grub-mkconfig: 6: /etc/default/grub: options: not found
          

          Meanwhile, while I went home from work an hour+ ago, my Cloudron updated to 7.3.4, and it's been stuck on "starting services, this might take a while" for more than an hour now, according to logs. (logs stopped updating 1 hour 10 minutes ago)

          I get logs like this on my Cloudron. All services fail to start, except "Cloudron", "docker", "nginx" and "unbound". Only the logs on "Cloudron" update. Logs like this:

          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.956 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 9.478 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 9.101 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.384 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.285 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 575.305 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.920 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 8.970 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 13.121 ms - 89
          GET /api/v1/appstore/apps?repository=core 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 10.917 ms - 89
          Dec 07 17:13:56 box:locker Lock unreleased platform_start
          Dec 07 17:18:56 box:locker Lock unreleased platform_start
          GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 1038.846 ms - 89
          Dec 07 17:23:22 box:shell statusUnbound exec: systemctl is-active unbound
          Dec 07 17:23:22 box:shell statusNginx exec: systemctl is-active nginx
          Dec 07 17:23:22 box:shell statusUnbound (stdout): active
          Dec 07 17:23:22 box:shell statusUnbound (stderr): null
          Dec 07 17:23:22 box:shell statusNginx (stdout): active
          Dec 07 17:23:22 box:shell statusNginx (stderr): null
          Dec 07 17:23:56 box:locker Lock unreleased platform_start
          GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 2381.412 ms - 89
          Dec 07 17:27:38 box:shell statusUnbound exec: systemctl is-active unbound
          Dec 07 17:27:38 box:shell statusUnbound (stdout): active
          Dec 07 17:27:38 box:shell statusUnbound (stderr): null
          Dec 07 17:27:38 box:shell statusNginx exec: systemctl is-active nginx
          Dec 07 17:27:38 box:shell statusNginx (stdout): active
          Dec 07 17:27:38 box:shell statusNginx (stderr): null
          GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 989.596 ms - 89
          Dec 07 17:28:56 box:locker Lock unreleased platform_start
          Dec 07 17:28:57 box:shell statusUnbound exec: systemctl is-active unbound
          Dec 07 17:28:57 box:shell statusUnbound (stdout): active
          Dec 07 17:28:57 box:shell statusUnbound (stderr): null
          Dec 07 17:28:57 box:shell statusNginx exec: systemctl is-active nginx
          Dec 07 17:28:57 box:shell statusNginx (stdout): active
          Dec 07 17:28:57 box:shell statusNginx (stderr): null
          Dec 07 17:29:00 box:cloudron Getting logs for box as json
          
          girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #38

          @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

          GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 2381.412 ms - 89

          The issue seems to be that unbound is down/not working. Does host cloudron.io 127.0.0.1 work on the server?

          O 1 Reply Last reply
          0
          • girishG girish

            @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

            GET /api/v1/appstore/subscription 424 Failed Dependency getaddrinfo EAI_AGAIN api.cloudron.io 2381.412 ms - 89

            The issue seems to be that unbound is down/not working. Does host cloudron.io 127.0.0.1 work on the server?

            O Offline
            O Offline
            odie
            wrote on last edited by
            #39

            @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

            host cloudron.io 127.0.0.1

            No, I get the following output:

            Using domain server:
            Name: 127.0.0.1
            Address: 127.0.0.1#53
            Aliases:
            
            Host cloudron.io not found: 2(SERVFAIL)
            

            Would this be a workaround? https://forum.cloudron.io/post/57804

            If so, and if it works, should I leave the forward-everything.conf file, or delete it aftwerwards?

            Thanks!

            girishG 1 Reply Last reply
            0
            • O odie

              @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

              host cloudron.io 127.0.0.1

              No, I get the following output:

              Using domain server:
              Name: 127.0.0.1
              Address: 127.0.0.1#53
              Aliases:
              
              Host cloudron.io not found: 2(SERVFAIL)
              

              Would this be a workaround? https://forum.cloudron.io/post/57804

              If so, and if it works, should I leave the forward-everything.conf file, or delete it aftwerwards?

              Thanks!

              girishG Offline
              girishG Offline
              girish
              Staff
              wrote on last edited by girish
              #40

              @odie You should leave the conf file. Are you also on a home server?

              Initially, I thought that support request was an exception. Maybe there is some genuine unbound configuration issue. hmmm

              O 1 Reply Last reply
              0
              • girishG girish

                @odie You should leave the conf file. Are you also on a home server?

                Initially, I thought that support request was an exception. Maybe there is some genuine unbound configuration issue. hmmm

                O Offline
                O Offline
                odie
                wrote on last edited by
                #41

                @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                @odie You should leave the conf file. Are you also on a home server?

                Initially, I thought that support request was an exception. Maybe there is some genuine unbound configuration issue. hmmm

                Yes, I am on a home server. Services seem to start

                O 1 Reply Last reply
                1
                • O odie

                  @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                  @odie You should leave the conf file. Are you also on a home server?

                  Initially, I thought that support request was an exception. Maybe there is some genuine unbound configuration issue. hmmm

                  Yes, I am on a home server. Services seem to start

                  O Offline
                  O Offline
                  odie
                  wrote on last edited by
                  #42

                  @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                  @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                  @odie You should leave the conf file. Are you also on a home server?

                  Initially, I thought that support request was an exception. Maybe there is some genuine unbound configuration issue. hmmm

                  Yes, I am on a home server. Services seem to start

                  Yup, all services have started, apps are running and everything seems to work. Thank you.

                  I guess that just leaves the original issue. I suddenly have a house full of family members, so I’ll have to check back later. Sorry about that, and thanks for helping me out!

                  1 Reply Last reply
                  1
                  • girishG girish

                    This fix is not needed anymore. Ubuntu has released 5.4.0-135-generic

                    Cloudron enables automatic ubuntu security updates. Roughly around 2022-11-17, the linux kernel was updated to 5.4.0-132-generic . You can find the automatic updates log in /var/log/apt/history.log. This kernel has a bug causing various things like containerd, prometheus node exporter etc to fail. On Cloudron, this manifests itself as:

                    • automatic updates appear to get stuck in 'cleaning up old install"
                    • cron jobs don't work anymore
                    • file permissions inside containers become incorrect

                    For the moment, it's best to revert to the previous kernel 5.4.0-131-generic. How you do this, depends on your VPS provider. Some VPS providers allow you to change the kernel via their control panels.

                    Please be careful with instructions below. You might have to fine tune it based on your setup/provider.

                    Many of the modern provider will just use Grub 2 as the kernel (digitalocean, linode, to name a few). On such VPS, please change the kernel as follows:

                    • Highly recommend taking a snapshot of the server, in case something goes wrong.
                    • SSH into the server
                    • apt install linux-image-5.4.0-131-generic linux-modules-extra-5.4.0-131-generic
                    • apt-mark hold linux-generic linux-image-generic linux-headers-generic
                    • Edit /etc/default/grub . Find the line GRUB_DEFAULT=0. Change this to GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux 5.4.0-131-generic" . Important you get this line right, otherwise your server may not boot!
                    • update-grub
                    • reboot
                    • After reboot, uname -nar will say 5.4.0-131-generic.

                    To reverse the above changes:

                    • apt-mark unhold linux-generic linux-image-generic linux-headers-generic
                    • unattended-upgrade -d - when running this you will see new kernel 5.4.0-135-generic is getting installed.
                    • Edit /etc/default/grub . Change the line to GRUB_DEFAULT="Advanced options for Ubuntu>Ubuntu, with Linux 5.4.0-135-generic".
                    • update-grub
                    • reboot
                    • After reboot, uname -nar will say 5.4.0-135-generic
                    • apt remove linux-image-5.4.0-131-generic linux-modules-extra-5.4.0-131-generic - to remove the old kernel
                    • Edit /etc/default/grub . Change the line to `GRUB_DEFAULT=0
                    • update-grub

                    Related threads:

                    • https://forum.cloudron.io/topic/8096/docker-needs-to-be-restarted-often-due-to-fail-app-updates
                    • https://forum.cloudron.io/topic/8032/apps-stuck-updating-cleaning-up-old-install-even-after-stopping-restarting-task
                    O Offline
                    O Offline
                    odie
                    wrote on last edited by
                    #43

                    @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                    Edit /etc/default/grub . Change the line to GRUB_DEFAULT=Advanced options for Ubuntu>Ubuntu, with Linux 5.4.0-135-generic.

                    Hello again,
                    Thanks for the help earlier. And apologies for having to run, suddenly 8 family members on my door expecting dinner.... 👻 😂

                    I think I figured out why I didn't manage to make the guide work for me when I tried to update grub. In the quoted line, there should be quotes around the "Advanced options..." line.

                    When doing that, the guide to revers the changes worked.

                    jdaviescoatesJ 1 Reply Last reply
                    3
                    • O odie

                      @girish said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                      Edit /etc/default/grub . Change the line to GRUB_DEFAULT=Advanced options for Ubuntu>Ubuntu, with Linux 5.4.0-135-generic.

                      Hello again,
                      Thanks for the help earlier. And apologies for having to run, suddenly 8 family members on my door expecting dinner.... 👻 😂

                      I think I figured out why I didn't manage to make the guide work for me when I tried to update grub. In the quoted line, there should be quotes around the "Advanced options..." line.

                      When doing that, the guide to revers the changes worked.

                      jdaviescoatesJ Offline
                      jdaviescoatesJ Offline
                      jdaviescoates
                      wrote on last edited by
                      #44

                      @odie said in Fix for kernel bug in Ubuntu 20.04 causing various issues:

                      n the quoted line, there should be quotes around the "Advanced options..." line.

                      @girish sounds like that needs to go in your reverse instructions in the post at the top - your commands there don't have the quotes.

                      I use Cloudron with Gandi & Hetzner

                      1 Reply Last reply
                      3
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Bookmarks
                      • Search