14.04.2: UEFI: linux 3.13.0-45 downloaded during install

Bug #1422864 reported by Jason Gerard DeRose
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubiquity (Ubuntu)
Fix Released
Undecided
Adam Conrad
Trusty
Fix Released
Undecided
Adam Conrad

Bug Description

A UEFI mode install will download and install the latest signed kernel, when there is a newer version available than what's provided on the ISO.

However, the 14.04.2 daily ISO (20150217 deskop amd64) downloads and installs the 3.13.0-45 kernel, even though 3.16.0-30 (lts-utopic) is on the ISO and is what the system will boot to.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: ubiquity 2.18.8.4
ProcVersionSignature: Ubuntu 3.16.0-30.40~14.04.1-generic 3.16.7-ckt3
Uname: Linux 3.16.0-30-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.7
Architecture: amd64
CurrentDesktop: Unity
Date: Tue Feb 17 11:52:00 2015
InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz.efi file=/cdrom/preseed/ubuntu.seed boot=casper only-ubiquity quiet splash oem-config/enable=true --
InstallationDate: Installed on 2015-02-17 (0 days ago)
InstallationMedia: Ubuntu 14.04.2 LTS "Trusty Tahr" - Release amd64 (20150217)
SourcePackage: ubiquity
UpgradeStatus: No upgrade log present (probably fresh install)

Revision history for this message
Jason Gerard DeRose (jderose) wrote :
Revision history for this message
Jason Gerard DeRose (jderose) wrote :

Added a screenshot from during the install.

Adam Conrad (adconrad)
Changed in ubiquity (Ubuntu):
assignee: nobody → Adam Conrad (adconrad)
Changed in ubiquity (Ubuntu Trusty):
assignee: nobody → Adam Conrad (adconrad)
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package ubiquity - 2.18.8.5

---------------
ubiquity (2.18.8.5) trusty; urgency=medium

  * Limit the signed kernel candidates to ones that are already on the
    media to avoid pulling in ALL of the signed kernels (LP: #1422864)
 -- Adam Conrad <email address hidden> Tue, 17 Feb 2015 16:03:02 -0700

Changed in ubiquity (Ubuntu Trusty):
status: New → Fix Released
Revision history for this message
Adam Conrad (adconrad) wrote : Update Released

The verification of the Stable Release Update for ubiquity has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package ubiquity - 2.21.10

---------------
ubiquity (2.21.10) vivid; urgency=medium

  * debian/ubiquity.install-any: Adjust for dropped 94extras in apt-setup
 -- Adam Conrad <email address hidden> Tue, 17 Feb 2015 18:42:54 -0700

Changed in ubiquity (Ubuntu):
status: New → Fix Released
Revision history for this message
Jason Gerard DeRose (jderose) wrote :

Just confirmed that this is indeed fixed in the 20150218 deskop amd64 daily ISO.

Also confirmed this fix works when doing an OEM install, which I didn't test previously for lack of an easy to use live environment.

Revision history for this message
Jason Gerard DeRose (jderose) wrote :

Hmm, possible regression introduced by this fix: after I complete a UEFI mode install, and then run:

$ sudo apt-get update
$ sudo apt-get dist-upgrade

I get a message that that "linux-signed-image-generic-lts-utopic" was automatically installed and is no longer required, can be removed with "apt-get autoremove".

Also, last night I had a situation where it wanted to remove grub-efi... which didn't work out so well on a uefi system :)

This might have been a quirk somehow introduced by doing an OEM install, still tracking that down.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.