[Gutsy] Kernel panic on boot, "run-init: nuking initramfs contents: Directory not empty"

Bug #177457 reported by Yan Li
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
initramfs-tools (Ubuntu)
New
Undecided
Unassigned
linux (Ubuntu)
New
Undecided
Unassigned
linux-source-2.6.22 (Ubuntu)
New
Undecided
Unassigned

Bug Description

Binary package hint: initramfs-tools

Overview Description:
Occasionally (about 2 out of 5), my Gutsy system got panic on boot. I've installed my Gutsy system using alternative CD with encrypted root partition (no encryption of swap nor /boot). The panic occurred soon after I enter the correct root partition password in the splash screen.

Steps to Reproduce:
1) Boot the system
2) Input correct encrypt filesystem password in GUI splash screen

Actual Results:
Kernel panic in about 2 out of 5 boots

Expected Results:
Always good boot

Reproducibility:
About 2 out of 5 boots.

Build Date & Platform Bug Found:
Gutsy on an i686 ThinkPad T43p with encrypted root partition. Swap nor /boot not encrypted. All updates installed (no pre-release updates)

Additional info:
# fdisk -l

Disk /dev/sda: 60.0 GB, 60011642880 bytes
255 heads, 63 sectors/track, 7296 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xcccdcccd

   Device Boot Start End Blocks Id System
/dev/sda1 * 1 1913 15361888+ 7 HPFS/NTFS
Partition 1 does not end on cylinder boundary.
/dev/sda2 7054 7296 1951897+ 82 Linux swap / Solaris
/dev/sda3 1914 1943 240975 83 Linux
/dev/sda4 1944 7053 41046075 83 Linux

Partition table entries are not in disk order
root@yantp:~# mount
/dev/mapper/yantp-root on / type ext3 (rw,errors=remount-ro)
proc on /proc type proc (rw,noexec,nosuid,nodev)
/sys on /sys type sysfs (rw,noexec,nosuid,nodev)
varrun on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=0755)
varlock on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=1777)
udev on /dev type tmpfs (rw,mode=0755)
devshm on /dev/shm type tmpfs (rw)
devpts on /dev/pts type devpts (rw,gid=5,mode=620)
lrm on /lib/modules/2.6.22-14-generic/volatile type tmpfs (rw)
/dev/sda3 on /boot type ext3 (rw)
/dev/mapper/yantp-home on /home type ext3 (rw)
securityfs on /sys/kernel/security type securityfs (rw)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,noexec,nosuid,nodev)

Revision history for this message
Yan Li (yanli) wrote :

Okay, that helps explain why the rc.0 one alone did nothing for me -- I'm usually rebooting! ;-/

So the workaround is to do both --
sudo ln -s /etc/init.d/NetworkManager /etc/rc0.d/K40NetworkManager
sudo ln -s /etc/init.d/NetworkManager /etc/rc6.d/K40NetworkManager

Great job! That's a temporary work-around, and work-arounds are very good -- but when a request to test a patch or a fix comes out, you'll want to
 return to the previous state and delete those symlinks so you can cleanly test.

sudo rm /etc/rc0.d/K40NetworkManager
sudo rm /etc/rc6.d/K40NetworkManager

For those who'd rather not edit, another work-around is to disconnect network cables, disable networking in nm-applet, or hit the Wi-Fi kill switc
h either before or during shutdown. If done before choosing shut-down or reboot, the hang is avoided. If done during the hang, then the remaining shutdown ha
ng at the alsa step is shortened from over 2 minutes to under 15 seconds.

@Daniel T. Chen -- are you still asking for help or information on this?

Revision history for this message
Yan Li (yanli) wrote :

After entered my encrypt filesystem password, I press "Alt-F1" swiftly to switch to console, and got this screenshot of panic.

It's a rather annoying bug. For several times I wanna show my Ubuntu Gutsy to my friends and met this problem in the field, embarrassed me! Hope this would be fixed soon.

Revision history for this message
iLugo (isra) wrote :

The duplicate status of this bug is wrong: bug #155689 is different because it affects much newer versions of Ubuntu than "Gutsy", which this bug refers to, and this was ages ago. Please have a look to bug #155689 which is still hitting in as recently as July 25 2011 and Ubuntu 10.10 (Maverick).

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.