[SOLVED] 22.26 update broke my freedom box

Problem Description
I have to reboot my machine (acer laptop running Debian / Freedombox) several times daily just to access Plinth. I am brought (eventually) to a Debian login splash screen today. But previous to the 22.26 update, I just saw status lines (text only).

Steps to Reproduce

  1. power on freedombox / laptop
  2. laptop screen shows various services starting up
  3. I’m brought to a debian login splash screen. (Where is my freedombox software now?)

Expected Results
I expected my freedom box to start up - I only had the debian splash screen the first time I installed freedombox, and I’m too dumb to get it to go to debian through something I did.

Information

  • FreedomBox version: 22.26, I think
  • *AcerOne laptop / netbook AMD64
  • How did you install FreedomBox?: ‘apt install freedombox’

update:
If I reboot and I’m quick enough, I can get it to work, but eventually it reverts to “Debian splash screen”. I can’t access it through the internet either (I’m using the freedombox to host a small blog).

I logged into plinth and looked at the logs:

December 19, 2022

9:28 PM

GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.

pulseaudio

9:27 PM

Failed to receive portal pid: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get PID of name ‘org.freedesktop.portal.Desktop’: no such name

pipewire

9:25 PM

Using interface wlp2s0 with hwaddr 78:e4:00:9e:26:53 and ssid “b’AcerWireless’”

wpa_supplicant

9:25 PM

GetManagedObjects() failed: org.freedesktop.DBus.Error.NoReply: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.

pulseaudio

9:25 PM

Failed to start Synapse Matrix homeserver.

systemd

9:24 PM

Failed to receive portal pid: org.freedesktop.DBus.Error.NameHasNoOwner: Could not get PID of name ‘org.freedesktop.portal.Desktop’: no such name

pipewire

9:23 PM

Using interface wlp2s0 with hwaddr 78:e4:00:9e:26:53 and ssid “b’AcerWireless’”

wpa_supplicant

2

9:23 PM

Failed to start Synapse Matrix homeserver.

systemd

9:23 PM

Failed to start Network Manager Wait Online.

systemd

9:22 PM

Using interface wlp2s0 with hwaddr XX:XX:XX:XX:XX:XX and ssid “b’AcerWireless’” (I replaced actual hex with x’s)

wpa_supplicant

9:22 PM

Failed to start Take snapper snapshot of root on boot.

systemd

This is related to the following change in 22.26:

  • security: Remove restricted access setting and configuration

Previously, FreedomBox had a “restrict access” setting that could be enabled (default option) or disabled. It was enabled on your FreedomBox.

One of the unintended side-effects of the “restrict access” setting was that it would block some display managers such as gdm3 (Gnome display manager) from starting up. This is the software that displays the Debian login splash screen.

So your laptop is running both FreedomBox and a desktop environment (probably Gnome?). FreedomBox is still running in the background, even when the login splash screen is displayed.

Maybe this will help: You can switch to a virtual console by pressing the keys Ctrl-Alt-F1. Press Ctrl-Alt-F7 to get back to the login splash screen.

awesome.
I will try this tomorrow and report back.
Thank you for the quick response!

just want to add that yes, I do see the Debian gnome splash screen, but also, after a while - I can’t reach my freedombox via internet - so it sounds like I have two problems:

  1. the new debian gnome splash screen
  2. my freedom box keeps losing its IP address (or it’s going to sleep?). ← if I reboot the whole machine, I can briefly reach the box via hostname, but then it eventually disappears.

Are you able to login through SSH or Cockpit? If so, you could try running commands:

$ sudo systemctl stop gdm
$ sudo systemctl disable gdm

This should prevent the Gnome splash screen from appearing at all.

Can I do that directly in the laptop while it is running gnome? I can’t get to cockpit anymore.

Ok, on one of the times I rebooted, I was able to go into software updates (Plinth) and grab the logs - does this help:

Status
You are running Debian GNU/Linux 11 (bullseye) and FreedomBox version 22.26. Updating…

==> unattended-upgrades.log
2022-12-01 05:14:16,828 INFO Starting unattended upgrades script
2022-12-01 05:14:16,843 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-01 05:14:16,845 INFO Initial blacklist:
2022-12-01 05:14:16,846 INFO Initial whitelist (not strict):
2022-12-01 06:46:19,353 INFO Starting unattended upgrades script
2022-12-01 06:46:19,365 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-01 06:46:19,367 INFO Initial blacklist:
2022-12-01 06:46:19,369 INFO Initial whitelist (not strict):
2022-12-01 06:52:24,636 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-02 05:01:17,101 INFO Starting unattended upgrades script
2022-12-02 05:01:17,123 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-02 05:01:17,124 INFO Initial blacklist:
2022-12-02 05:01:17,126 INFO Initial whitelist (not strict):
2022-12-02 06:00:17,812 INFO Starting unattended upgrades script
2022-12-02 06:00:17,822 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-02 06:00:17,825 INFO Initial blacklist:
2022-12-02 06:00:17,826 INFO Initial whitelist (not strict):
2022-12-02 06:00:29,647 INFO Packages that will be upgraded: matrix-synapse
2022-12-02 06:00:29,648 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-02 06:01:56,754 INFO All upgrades installed
2022-12-03 01:40:09,271 INFO Starting unattended upgrades script
2022-12-03 01:40:09,283 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-03 01:40:09,289 INFO Initial blacklist:
2022-12-03 01:40:09,298 INFO Initial whitelist (not strict):
2022-12-03 06:03:54,697 INFO Starting unattended upgrades script
2022-12-03 06:03:54,736 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-03 06:03:54,738 INFO Initial blacklist:
2022-12-03 06:03:54,739 INFO Initial whitelist (not strict):
2022-12-03 06:12:02,901 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-04 06:18:27,077 INFO Starting unattended upgrades script
2022-12-04 06:18:27,094 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-04 06:18:27,099 INFO Initial blacklist:
2022-12-04 06:18:27,100 INFO Initial whitelist (not strict):
2022-12-04 06:25:54,920 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-04 07:06:15,417 INFO Starting unattended upgrades script
2022-12-04 07:06:15,434 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-04 07:06:15,435 INFO Initial blacklist:
2022-12-04 07:06:15,439 INFO Initial whitelist (not strict):
2022-12-05 05:05:19,072 INFO Starting unattended upgrades script
2022-12-05 05:05:19,096 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-05 05:05:19,098 INFO Initial blacklist:
2022-12-05 05:05:19,099 INFO Initial whitelist (not strict):
2022-12-05 06:50:40,462 INFO Starting unattended upgrades script
2022-12-05 06:50:40,469 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-05 06:50:40,479 INFO Initial blacklist:
2022-12-05 06:50:40,480 INFO Initial whitelist (not strict):
2022-12-05 06:59:06,904 INFO Packages that will be upgraded: jhead
2022-12-05 06:59:06,943 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-05 07:00:08,926 INFO All upgrades installed
2022-12-06 02:36:35,360 INFO Starting unattended upgrades script
2022-12-06 02:36:35,368 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-06 02:36:35,369 INFO Initial blacklist:
2022-12-06 02:36:35,371 INFO Initial whitelist (not strict):
2022-12-06 06:46:47,389 INFO Starting unattended upgrades script
2022-12-06 06:46:47,398 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-06 06:46:47,399 INFO Initial blacklist:
2022-12-06 06:46:47,401 INFO Initial whitelist (not strict):
2022-12-06 06:46:55,718 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-07 00:09:30,111 INFO Starting unattended upgrades script
2022-12-07 00:09:30,164 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-07 00:09:30,166 INFO Initial blacklist:
2022-12-07 00:09:30,168 INFO Initial whitelist (not strict):
2022-12-07 06:41:34,865 INFO Starting unattended upgrades script
2022-12-07 06:41:34,875 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-07 06:41:34,877 INFO Initial blacklist:
2022-12-07 06:41:34,879 INFO Initial whitelist (not strict):
2022-12-07 06:41:43,346 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-08 06:36:43,061 INFO Starting unattended upgrades script
2022-12-08 06:36:43,072 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-08 06:36:43,074 INFO Initial blacklist:
2022-12-08 06:36:43,076 INFO Initial whitelist (not strict):
2022-12-08 06:36:51,680 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-08 07:42:34,868 INFO Starting unattended upgrades script
2022-12-08 07:42:34,911 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-08 07:42:34,914 INFO Initial blacklist:
2022-12-08 07:42:34,916 INFO Initial whitelist (not strict):
2022-12-09 04:49:34,189 INFO Starting unattended upgrades script
2022-12-09 04:49:34,230 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-09 04:49:34,232 INFO Initial blacklist:
2022-12-09 04:49:34,233 INFO Initial whitelist (not strict):
2022-12-09 06:00:17,503 INFO Starting unattended upgrades script
2022-12-09 06:00:17,513 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-09 06:00:17,515 INFO Initial blacklist:
2022-12-09 06:00:17,517 INFO Initial whitelist (not strict):
2022-12-09 06:00:26,103 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-10 01:23:52,284 INFO Starting unattended upgrades script
2022-12-10 01:23:52,327 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-10 01:23:52,328 INFO Initial blacklist:
2022-12-10 01:23:52,329 INFO Initial whitelist (not strict):
2022-12-10 06:27:53,628 INFO Starting unattended upgrades script
2022-12-10 06:27:53,635 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-10 06:27:53,637 INFO Initial blacklist:
2022-12-10 06:27:53,638 INFO Initial whitelist (not strict):
2022-12-10 06:28:02,721 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-11 01:56:30,008 INFO Starting unattended upgrades script
2022-12-11 01:56:30,016 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-11 01:56:30,017 INFO Initial blacklist:
2022-12-11 01:56:30,018 INFO Initial whitelist (not strict):
2022-12-11 06:19:59,689 INFO Starting unattended upgrades script
2022-12-11 06:19:59,755 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-11 06:19:59,757 INFO Initial blacklist:
2022-12-11 06:19:59,759 INFO Initial whitelist (not strict):
2022-12-11 06:20:16,162 INFO Packages that will be upgraded: freedombox freedombox-doc-en freedombox-doc-es libopenexr25
2022-12-11 06:20:16,164 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-11 06:22:41,168 ERROR Installing the upgrades failed!
2022-12-11 06:22:41,180 ERROR error message: E:Can’t find a source to download version ‘22.26~bpo11+1’ of ‘freedombox-doc-en:amd64’
2022-12-11 06:22:41,183 ERROR dpkg returned a error! See /var/log/unattended-upgrades/unattended-upgrades-dpkg.log for details
2022-12-11 06:22:46,669 INFO Package freedombox-doc-en’s origin is not trusted.
2022-12-11 06:22:48,048 INFO Package libopenexr25 is kept back because a related package is kept back or due to local apt_preferences(5).
2022-12-12 06:55:25,792 INFO Starting unattended upgrades script
2022-12-12 06:55:25,803 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-12 06:55:25,806 INFO Initial blacklist:
2022-12-12 06:55:25,808 INFO Initial whitelist (not strict):
2022-12-12 06:55:38,709 INFO Packages that will be upgraded: freedombox-doc-en libopenexr25
2022-12-12 06:55:38,711 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-12 06:56:54,668 INFO All upgrades installed
2022-12-12 09:58:08,605 INFO Starting unattended upgrades script
2022-12-12 09:58:08,616 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-12 09:58:08,619 INFO Initial blacklist:
2022-12-12 09:58:08,620 INFO Initial whitelist (not strict):
2022-12-13 06:40:42,662 INFO Starting unattended upgrades script
2022-12-13 06:40:42,672 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-13 06:40:42,675 INFO Initial blacklist:
2022-12-13 06:40:42,676 INFO Initial whitelist (not strict):
2022-12-13 06:40:51,158 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-13 11:39:34,559 INFO Starting unattended upgrades script
2022-12-13 11:39:34,567 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-13 11:39:34,568 INFO Initial blacklist:
2022-12-13 11:39:34,570 INFO Initial whitelist (not strict):
2022-12-14 06:31:16,825 INFO Starting unattended upgrades script
2022-12-14 06:31:16,836 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-14 06:31:16,838 INFO Initial blacklist:
2022-12-14 06:31:16,840 INFO Initial whitelist (not strict):
2022-12-14 06:31:25,621 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-14 14:31:17,447 INFO Starting unattended upgrades script
2022-12-14 14:31:17,457 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-14 14:31:17,460 INFO Initial blacklist:
2022-12-14 14:31:17,462 INFO Initial whitelist (not strict):
2022-12-15 03:50:40,359 INFO Starting unattended upgrades script
2022-12-15 03:50:40,401 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-15 03:50:40,403 INFO Initial blacklist:
2022-12-15 03:50:40,405 INFO Initial whitelist (not strict):
2022-12-15 06:18:57,095 INFO Starting unattended upgrades script
2022-12-15 06:18:57,104 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-15 06:18:57,106 INFO Initial blacklist:
2022-12-15 06:18:57,107 INFO Initial whitelist (not strict):
2022-12-15 06:19:08,936 INFO Packages that will be upgraded: firefox-esr
2022-12-15 06:19:08,938 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-15 06:20:47,982 INFO All upgrades installed
2022-12-16 06:03:01,186 INFO Starting unattended upgrades script
2022-12-16 06:03:01,197 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-16 06:03:01,199 INFO Initial blacklist:
2022-12-16 06:03:01,201 INFO Initial whitelist (not strict):
2022-12-16 06:03:10,008 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-16 17:58:03,042 INFO Starting unattended upgrades script
2022-12-16 17:58:03,071 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-16 17:58:03,073 INFO Initial blacklist:
2022-12-16 17:58:03,075 INFO Initial whitelist (not strict):
2022-12-17 06:31:01,907 INFO Starting unattended upgrades script
2022-12-17 06:31:01,916 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-17 06:31:01,919 INFO Initial blacklist:
2022-12-17 06:31:01,921 INFO Initial whitelist (not strict):
2022-12-17 06:31:10,591 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-17 08:00:23,114 INFO Starting unattended upgrades script
2022-12-17 08:00:23,122 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-17 08:00:23,123 INFO Initial blacklist:
2022-12-17 08:00:23,125 INFO Initial whitelist (not strict):
2022-12-18 06:42:15,177 INFO Starting unattended upgrades script
2022-12-18 06:42:15,203 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-18 06:42:15,205 INFO Initial blacklist:
2022-12-18 06:42:15,206 INFO Initial whitelist (not strict):
2022-12-18 06:43:46,023 INFO Packages that will be upgraded: base-files distro-info-data evolution evolution-common evolution-data-server evolution-data-server-common evolution-plugin-bogofilter evolution-plugin-pstimport evolution-plugins grub-common grub-pc grub-pc-bin grub2-common libbluray2 libc-bin libc-dev-bin libc-devtools libc-l10n libc6 libc6-dev libcamel-1.2-62 libdatetime-timezone-perl libebackend-1.2-10 libebook-1.2-20 libebook-contacts-1.2-3 libecal-2.0-1 libedata-book-1.2-26 libedata-cal-2.0-1 libedataserver-1.2-25 libedataserverui-1.2-2 libevolution libjs-dojo-core libjs-dojo-dijit libjs-dojo-dojox libmariadb3 libnftables1 libpq5 libspeechd2 libtasn1-6 libvncserver1 linux-image-amd64 linux-libc-dev locales locales-all mariadb-client-10.5 mariadb-client-core-10.5 mariadb-common mariadb-server-10.5 mariadb-server-core-10.5 nano nftables nscd postgresql-13 postgresql-client-13 python3-nftables python3-speechd speech-dispatcher speech-dispatcher-audio-plugins speech-dispatcher-espeak-ng tzdata
2022-12-18 06:43:46,024 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
2022-12-18 07:10:36,201 INFO All upgrades installed
2022-12-18 07:11:13,339 INFO Packages that were successfully auto-removed: linux-image-5.10.0-18-amd64
2022-12-18 07:11:13,381 INFO Packages that are kept back:
2022-12-18 07:11:17,252 WARNING Found /var/run/reboot-required, rebooting
2022-12-18 07:11:17,335 WARNING Shutdown msg: b"Reboot scheduled for Mon 2022-12-19 02:00:00 CST, use ‘shutdown -c’ to cancel."
2022-12-18 08:39:11,075 INFO Starting unattended upgrades script
2022-12-18 08:39:11,084 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-18 08:39:11,114 INFO Initial blacklist:
2022-12-18 08:39:11,115 INFO Initial whitelist (not strict):
2022-12-19 12:12:25,525 INFO Starting unattended upgrades script
2022-12-19 12:12:25,558 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-19 12:12:25,561 INFO Initial blacklist:
2022-12-19 12:12:25,562 INFO Initial whitelist (not strict):
2022-12-19 12:12:33,197 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-19 20:56:57,313 INFO Starting unattended upgrades script
2022-12-19 20:56:57,391 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-19 20:56:57,393 INFO Initial blacklist:
2022-12-19 20:56:57,395 INFO Initial whitelist (not strict):
2022-12-20 15:16:59,414 INFO Starting unattended upgrades script
2022-12-20 15:16:59,476 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-20 15:16:59,482 INFO Initial blacklist:
2022-12-20 15:16:59,483 INFO Initial whitelist (not strict):
2022-12-20 15:17:16,197 INFO No packages found that can be upgraded unattended and no pending auto-removals
2022-12-20 21:57:16,953 INFO Starting unattended upgrades script
2022-12-20 21:57:16,964 INFO Allowed origins are: origin=Debian,codename=bullseye,label=Debian, origin=Debian,codename=bullseye,label=Debian-Security, origin=Debian,codename=bullseye-security,label=Debian-Security, o=Debian Backports,a=bullseye-backports,l=Debian Backports
2022-12-20 21:57:16,966 INFO Initial blacklist:
2022-12-20 21:57:16,969 INFO Initial whitelist (not strict):

==> unattended-upgrades-dpkg.log
Log started: 2022-12-02 06:00:30
apt-listchanges: Reading changelogs…
Preconfiguring packages …
apt-listchanges: Reading changelogs…
Preconfiguring packages …
(Reading database …
(Reading database … 5%
(Reading database … 10%
(Reading database … 15%
(Reading database … 20%
(Reading database … 25%
(Reading database … 30%
(Reading database … 35%
(Reading database … 40%
(Reading database … 45%
(Reading database … 50%
(Reading database … 55%
(Reading database … 60%
(Reading database … 65%
(Reading database … 70%
(Reading database … 75%
(Reading database … 80%
(Reading database … 85%
(Reading database … 90%
(Reading database … 95%
(Reading database … 100%
(Reading database … 205942 files and directories currently installed.)
Preparing to unpack …/matrix-synapse_1.72.0-1~bpo11+1_amd64.deb …
Unpacking matrix-synapse (1.72.0-1~bpo11+1) over (1.71.0-2~bpo11+1) …
Setting up matrix-synapse (1.72.0-1~bpo11+1) …
Processing triggers for man-db (2.9.4-2) …

Running kernel seems to be up-to-date.

Failed to check for processor microcode upgrades.

Restarting services…
systemctl restart plymouth.service

No containers need to be restarted.

No user sessions are running outdated binaries.
Log ended: 2022-12-02 06:01:55

(it repeats this process for a few days…)

Log started: 2022-12-18 07:10:15
apt-listchanges: Reading changelogs…
apt-listchanges: Reading changelogs…
(Reading database …
(Reading database … 5%
(Reading database … 10%
(Reading database … 15%
(Reading database … 20%
(Reading database … 25%
(Reading database … 30%
(Reading database … 35%
(Reading database … 40%
(Reading database … 45%
(Reading database … 50%
(Reading database … 55%
(Reading database … 60%
(Reading database … 65%
(Reading database … 70%
(Reading database … 75%
(Reading database … 80%
(Reading database … 85%
(Reading database … 90%
(Reading database … 95%
(Reading database … 100%
(Reading database … 210711 files and directories currently installed.)
Preparing to unpack …/linux-libc-dev_5.10.158-2_amd64.deb …
Unpacking linux-libc-dev:amd64 (5.10.158-2) over (5.10.149-2) …
Setting up linux-libc-dev:amd64 (5.10.158-2) …

Pending kernel upgrade!

Running kernel version:
5.10.0-19-amd64

Diagnostics:
The currently running kernel version is not the expected kernel version 5.10.0-20-amd64.

Restarting the system to load the new kernel will not be handled automatically, so you should consider rebooting. [Return]

Failed to check for processor microcode upgrades.

Restarting services…

Service restarts being deferred:
systemctl restart NetworkManager.service
systemctl restart apt-daily-upgrade.service
/etc/needrestart/restart.d/dbus.service
systemctl restart openvpn-server@freedombox.service
systemctl restart systemd-logind.service
systemctl restart unattended-upgrades.service
systemctl restart wpa_supplicant.service

No containers need to be restarted.

No user sessions are running outdated binaries.
Log ended: 2022-12-18 07:10:34

Log started: 2022-12-18 07:10:40
(Reading database …
(Reading database … 5%
(Reading database … 10%
(Reading database … 15%
(Reading database … 20%
(Reading database … 25%
(Reading database … 30%
(Reading database … 35%
(Reading database … 40%
(Reading database … 45%
(Reading database … 50%
(Reading database … 55%
(Reading database … 60%
(Reading database … 65%
(Reading database … 70%
(Reading database … 75%
(Reading database … 80%
(Reading database … 85%
(Reading database … 90%
(Reading database … 95%
(Reading database … 100%
(Reading database … 210710 files and directories currently installed.)
Removing linux-image-5.10.0-18-amd64 (5.10.140-1) …
/etc/kernel/postrm.d/initramfs-tools:
update-initramfs: Deleting /boot/initrd.img-5.10.0-18-amd64
/etc/kernel/postrm.d/zz-update-grub:
Generating grub configuration file …
Found background image: /usr/share/images/desktop-base/desktop-grub.png
Found linux image: /boot/vmlinuz-5.10.0-20-amd64
Found initrd image: /boot/initrd.img-5.10.0-20-amd64
Found linux image: /boot/vmlinuz-5.10.0-19-amd64
Found initrd image: /boot/initrd.img-5.10.0-19-amd64
Warning: os-prober will be executed to detect other bootable partitions.
Its output will be used to detect bootable binaries on them and create new boot entries.
done
Log ended: 2022-12-18 07:11:12

Yes, sure.

Actually, you can skip the “stop” command: if you run “sudo systemctl disable gdm”, then you can just restart the FreedomBox (“sudo reboot”).

Ok, I ran that command and rebooted, and it brought me to a freedombox login screen (all text based) that I’ve not seen before. But the system appears to be working.

I’ve noticed that my network connection seems to go to sleep since the new 22.26 update. I don’t know if stopping the gnome display will fix that, so I’m going to watch it today and see what happens.

All my data seems to be intact, so this is a good sign for now.

Thank you for your help!

I think we can close this issue - server has been up all day, no issues.

Thanks again!