[Bug 1067106] Re: possible to run out of space on /boot partition when installed using auto recipe & full-disk-encryption
Dimitri John Ledkov
launchpad at surgut.co.uk
Sat Oct 11 19:05:13 UTC 2014
On 10 October 2014 11:24, mark johnson <mark at barrenfrozenwasteland.com> wrote:
> This script gets a list of all linux-image-* that have added files to
> /boot except for the latest and (if different) currently running kernel,
> them removes the rest.
>
> If this was part of the post-install script for kernel packages, then
> you'd only have 2 kernels installed at once, and /boot would never fill
> up.
>
> https://gist.github.com/marxjohnson/5f0f0607255951ee0e7a
>
The dpkg database is locked, when a given's package postinst is run,
thus one cannot remove packages as part of installation of another
one.
We already have scripts in place to mark old kernels for auto-removal,
however we do not enable autoremoval by default.
Thus it's easier to enable unattended upgrades and set
Unattended-Upgrade::Remove-Unused-Dependencies to true.
--
Regards,
Dimitri.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to partman-auto-crypto in Ubuntu.
https://bugs.launchpad.net/bugs/1067106
Title:
possible to run out of space on /boot partition when installed using
auto recipe & full-disk-encryption
Status in “partman-auto-crypto” package in Ubuntu:
Confirmed
Status in “partman-auto-crypto” source package in Quantal:
Won't Fix
Status in “partman-auto-crypto” source package in Saucy:
Confirmed
Bug description:
When choosing full disk encryption in the quantal version of Ubiquity,
the resulting /boot partition seems small.
In my test installation /boot came to 228MB.
Assuming that each kernel+initrd comes to about 30MB, that doesn't
leave much space for old kernels/initrds as kernel upgrades pile-up.
Many users do not know how to clear old kernels. A full /boot will
mean that no further apt transactions can occur until older kernels
are removed and the newer kernel installation is completed. Users
will then be missing out on security updates, hardware enablements,
and installing new packages.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/partman-auto-crypto/+bug/1067106/+subscriptions
More information about the foundations-bugs
mailing list