kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #13297
[Bug 1222690] [NEW] small /boot partition for full system encryption becomes full after 7 updates and leads to failures
Public bug reported:
During installation with full system encryption, the Ubuntu installer
creates an adequate /boot partition of around 100Mb.
However, after 10 updates to linux-image over the next few months, along
with the running of update-initramfs the /boot partition becomes full.
This causes further linux-image kernel updates to fail. Additionally,
there are (undiagnosed) edge cases where improper handling of out-of-
disk-space conditions in update-initramfs and/or update-grub this leads
to additional failures. (I fixed a computer yesterday where /boot ran
out of space, which caused grub to fail, which ended with "No Operating
System" being displayed by the EFI BIOS. I previously fixed a system
where a trivial upgrade failed on account of historical kernels in /boot
- not a system failure, but a user interface disaster for Aunt Tilly.)
To prevent /boot from filling up, it would help if there was a limit to
the number of historic kernel versions maintained. Older kernel
versions are of interest to many developers, but having multiple
revisions of kernels that are not used is not helpful for regular users.
A possible solution would be to "expire" automatically installed /boot
updates which are not in active use. A wilder approach would be to move
the large kernel files from /boot to some garbage collection point in
/var ... or maybe not. Allocating more space to be wasted in /boot
doesn't seem like a good idea.
The following workaround is published to remove all kernel versions
except the current one:
dpkg --get-selections | \
grep 'linux-image*' | \
awk '{print $1}' | \
egrep -v "linux-image-$(uname -r)|linux-image-generic" | \
while read n
do
apt-get -y remove $n
done
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Tags: boot cryptsetup encryption full system update-grub update-initramfs
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1222690
Title:
small /boot partition for full system encryption becomes full after 7
updates and leads to failures
Status in “linux” package in Ubuntu:
New
Bug description:
During installation with full system encryption, the Ubuntu installer
creates an adequate /boot partition of around 100Mb.
However, after 10 updates to linux-image over the next few months,
along with the running of update-initramfs the /boot partition becomes
full. This causes further linux-image kernel updates to fail.
Additionally, there are (undiagnosed) edge cases where improper
handling of out-of-disk-space conditions in update-initramfs and/or
update-grub this leads to additional failures. (I fixed a computer
yesterday where /boot ran out of space, which caused grub to fail,
which ended with "No Operating System" being displayed by the EFI
BIOS. I previously fixed a system where a trivial upgrade failed on
account of historical kernels in /boot - not a system failure, but a
user interface disaster for Aunt Tilly.)
To prevent /boot from filling up, it would help if there was a limit
to the number of historic kernel versions maintained. Older kernel
versions are of interest to many developers, but having multiple
revisions of kernels that are not used is not helpful for regular
users.
A possible solution would be to "expire" automatically installed /boot
updates which are not in active use. A wilder approach would be to
move the large kernel files from /boot to some garbage collection
point in /var ... or maybe not. Allocating more space to be wasted in
/boot doesn't seem like a good idea.
The following workaround is published to remove all kernel versions
except the current one:
dpkg --get-selections | \
grep 'linux-image*' | \
awk '{print $1}' | \
egrep -v "linux-image-$(uname -r)|linux-image-generic" | \
while read n
do
apt-get -y remove $n
done
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1222690/+subscriptions
Follow ups
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Jarno Suni, 2016-05-27
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Luke Faraone, 2016-05-26
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Jarno Suni, 2016-02-12
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Jarno Suni, 2016-02-12
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: john, 2015-02-05
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Adam Niedling, 2013-10-21
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Adam Niedling, 2013-10-21
-
[Bug 1222690] Re: small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: Joseph Salisbury, 2013-09-09
-
[Bug 1222690] Missing required logs.
From: Brad Figg, 2013-09-09
-
[Bug 1222690] [NEW] small /boot partition for full system encryption becomes full after 7 updates and leads to failures
From: C Filorux, 2013-09-09
References