fsprotect fails to install on 16.04 server

Bug #1646364 reported by David Haddon
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
fsprotect (Ubuntu)
Confirmed
Undecided
Unassigned
initramfs-tools (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

After an apt-get install on a clean 16.04 server install, fsprotect fails like so:

(This is from the second try, but it is exactly the same)

user@computer:~$ sudo apt-get install fsprotect
[sudo] password for user:
Reading package lists... Done
Building dependency tree
Reading state information... Done
fsprotect is already the newest version (1.0.6).
0 to upgrade, 0 to newly install, 0 to remove and 9 not to upgrade.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Setting up initramfs-tools (0.122ubuntu8.5) ...
update-initramfs: deferring update (trigger activated)
Processing triggers for initramfs-tools (0.122ubuntu8.5) ...
update-initramfs: Generating /boot/initrd.img-4.4.0-21-generic
cp: failed to access '/var/tmp/mkinitramfs_ewwYu8//bin/touch': Too many levels of symbolic links
E: /usr/share/initramfs-tools/hooks/fsprotect failed with return 1.
update-initramfs: failed for /boot/initrd.img-4.4.0-21-generic with 1.
dpkg: error processing package initramfs-tools (--configure):
 subprocess installed post-installation script returned error exit status 1
Errors were encountered while processing:
 initramfs-tools
E: Sub-process /usr/bin/dpkg returned an error code (1)
user@computer:~$

If I comment out the last line of /usr/share/initramfs-tools/hooks/fsprotect
#copy_exec /usr/bin/touch "/bin"

This will happen....

user@computer:~$sudo apt-get install fsprotect
Reading package lists... Done
Building dependency tree
Reading state information... Done
fsprotect is already the newest version (1.0.6).
0 to upgrade, 0 to newly install, 0 to remove and 9 not to upgrade.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Setting up initramfs-tools (0.122ubuntu8.5) ...
update-initramfs: deferring update (trigger activated)
Processing triggers for initramfs-tools (0.122ubuntu8.5) ...
update-initramfs: Generating /boot/initrd.img-4.4.0-21-generic
W: mdadm: /etc/mdadm/mdadm.conf defines no arrays.
user@computer:~$

I modified /etc/default/grub to make fsprotect active "fsprotect=1G"

Reboot, and fixed!!!

uname -a: Linux computer 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016
                  x86_64 x86_64 x86_64 GNU/Linux
lsb_release -rd: Description: Ubuntu 16.04.1 LTS
                  Release: 16.04
apt-cache policy fsprotect:
  fsprotect:
    Installed: 1.0.6
    Candidate: 1.0.6
    Version table:
   *** 1.0.6 500
          500 http://au.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages
          500 http://au.archive.ubuntu.com/ubuntu xenial/universe i386 Packages
          100 /var/lib/dpkg/status

ubuntu-bug report:
ProblemType: Bug
ApportVersion: 2.20.1-0ubuntu2.1
Architecture: amd64
Date: Thu Dec 1 16:11:14 2016
Dependencies:
 adduser 3.113+nmu3ubuntu4
 apt 1.2.15
 apt-utils 1.2.15
 busybox-initramfs 1:1.22.0-15ubuntu1
 coreutils 8.25-2ubuntu2
 cpio 2.11+dfsg-5ubuntu1
 debconf 1.5.58ubuntu1
 debconf-i18n 1.5.58ubuntu1
 debianutils 4.7
 dpkg 1.18.4ubuntu1.1
 e2fslibs 1.42.13-1ubuntu1
 e2fsprogs 1.42.13-1ubuntu1
 gcc-5-base 5.4.0-6ubuntu1~16.04.4
 gcc-6-base 6.0.1-0ubuntu1
 gnupg 1.4.20-1ubuntu3.1
 gpgv 1.4.20-1ubuntu3.1
 init-system-helpers 1.29ubuntu3
 initramfs-tools 0.122ubuntu8.5
 initramfs-tools-bin 0.122ubuntu8.5
 initramfs-tools-core 0.122ubuntu8.5
 initscripts 2.88dsf-59.3ubuntu2
 insserv 1.14.0-5ubuntu3
 klibc-utils 2.0.4-8ubuntu1.16.04.2
 kmod 22-1ubuntu4
 libacl1 2.2.52-3
 libapt-inst2.0 1.2.15
 libapt-pkg5.0 1.2.15
 libattr1 1:2.4.47-2
 libaudit-common 1:2.4.5-1ubuntu2
 libaudit1 1:2.4.5-1ubuntu2
 libblkid1 2.27.1-6ubuntu3.1
 libbz2-1.0 1.0.6-8
 libc6 2.23-0ubuntu4
 libcomerr2 1.42.13-1ubuntu1
 libdb5.3 5.3.28-11
 libfdisk1 2.27.1-6ubuntu3.1
 libgcc1 1:6.0.1-0ubuntu1
 libgcrypt20 1.6.5-2ubuntu0.2
 libgpg-error0 1.21-2ubuntu1
 libgpm2 1.20.4-6.1
 libklibc 2.0.4-8ubuntu1.16.04.2
 libkmod2 22-1ubuntu4
 liblocale-gettext-perl 1.07-1build1
 liblz4-1 0.0~r131-2ubuntu2
 liblzma5 5.1.1alpha+20120614-2ubuntu2
 libmount1 2.27.1-6ubuntu3.1
 libncurses5 6.0+20160213-1ubuntu1
 libncursesw5 6.0+20160213-1ubuntu1
 libpam-modules 1.1.8-3.2ubuntu2
 libpam-modules-bin 1.1.8-3.2ubuntu2
 libpam0g 1.1.8-3.2ubuntu2
 libpcre3 2:8.38-3.1
 libprocps4 2:3.3.10-4ubuntu2.2
 libreadline6 6.3-8ubuntu2
 libselinux1 2.4-3build2
 libsemanage-common 2.3-1build3
 libsemanage1 2.3-1build3
 libsepol1 2.4-2
 libsmartcols1 2.27.1-6ubuntu3.1
 libss2 1.42.13-1ubuntu1
 libstdc++6 5.4.0-6ubuntu1~16.04.4
 libsystemd0 229-4ubuntu12
 libtext-charwidth-perl 0.04-7build5
 libtext-iconv-perl 1.7-5build4
 libtext-wrapi18n-perl 0.06-7.1
 libtinfo5 6.0+20160213-1ubuntu1
 libudev1 229-4ubuntu12
 libusb-0.1-4 2:0.1.12-28
 libustr-1.0-1 1.0.4-5
 libuuid1 2.27.1-6ubuntu3.1
 linux-base 4.0ubuntu1
 lsb-base 9.20160110ubuntu0.2
 mount 2.27.1-6ubuntu3.1
 multiarch-support 2.23-0ubuntu4
 passwd 1:4.2-3.1ubuntu5
 perl-base 5.22.1-9
 procps 2:3.3.10-4ubuntu2.2
 psmisc 22.21-2.1build1
 readline-common 6.3-8ubuntu2
 sensible-utils 0.0.9
 sysv-rc 2.88dsf-59.3ubuntu2
 sysvinit-utils 2.88dsf-59.3ubuntu2
 tar 1.28-2.1ubuntu0.1
 ubuntu-keyring 2012.05.19
 udev 229-4ubuntu12
 util-linux 2.27.1-6ubuntu3.1
 uuid-runtime 2.27.1-6ubuntu3.1
 zlib1g 1:1.2.8.dfsg-2ubuntu4
DistroRelease: Ubuntu 16.04
InstallationDate: Installed on 2016-12-01 (0 days ago)
InstallationMedia: Ubuntu-Server 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.3)
JournalErrors:
 -- Logs begin at Thu 2016-12-01 15:53:30 AEST, end at Thu 2016-12-01 16:09:08 AEST. --
 Dec 01 15:53:30 hostname kernel: ACPI: RSDP 0x00000000A2342000 000024 (v02 INTEL )
 Dec 01 15:53:30 hostname kernel: ACPI: XSDT 0x00000000A2342090 0000A4 (v01 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: FACP 0x00000000A2358050 00010C (v05 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: DSDT 0x00000000A23421C8 015E82 (v02 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: FACS 0x00000000A2C8FF80 000040
 Dec 01 15:53:30 hostname kernel: ACPI: APIC 0x00000000A2358160 000084 (v03 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: FPDT 0x00000000A23581E8 000044 (v01 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: FIDT 0x00000000A2358230 00009C (v01 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: MCFG 0x00000000A23582D0 00003C (v01 INTEL NUC5i7RY 0000015E MSFT 00000097)
 Dec 01 15:53:30 hostname kernel: ACPI: HPET 0x00000000A2358310 000038 (v01 INTEL NUC5i7RY 0000015E AMI. 0005000B)
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0x00000000A2358348 000495 (v01 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: UEFI 0x00000000A23587E0 000042 (v01 INTEL NUC5i7RY 0000015E 00000000)
 Dec 01 15:53:30 hostname kernel: ACPI: LPIT 0x00000000A2358828 000094 (v01 INTEL NUC5i7RY 0000015E 00000000)
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0x00000000A23588C0 000C7D (v02 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: ASF! 0x00000000A2359540 0000A0 (v32 INTEL NUC5i7RY 0000015E TFSM 000F4240)
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0x00000000A23595E0 000539 (v02 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0x00000000A2359B20 000B74 (v02 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0x00000000A235A698 005AFE (v02 INTEL NUC5i7RY 0000015E INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: DMAR 0x00000000A2360198 0000D4 (v01 INTEL NUC5i7RY 0000015E INTL 00000001)
 Dec 01 15:53:30 hostname kernel: ACPI: BGRT 0x00000000A2360270 000038 (v01 INTEL NUC5i7RY 0000015E AMI 00010013)
 Dec 01 15:53:30 hostname kernel: ACPI: NMI not connected to LINT 1!
 Dec 01 15:53:30 hostname kernel: ACPI: NMI not connected to LINT 1!
 Dec 01 15:53:30 hostname kernel: ACPI: NMI not connected to LINT 1!
 Dec 01 15:53:30 hostname kernel: ACPI: NMI not connected to LINT 1!
 Dec 01 15:53:30 hostname kernel: ACPI: 6 ACPI AML tables successfully acquired and loaded
 Dec 01 15:53:30 hostname kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
 Dec 01 15:53:30 hostname kernel: ENERGY_PERF_BIAS: View and update with x86_energy_perf_policy(8)
 Dec 01 15:53:30 hostname kernel: #2 #3
 Dec 01 15:53:30 hostname kernel: PCCT header not found.
 Dec 01 15:53:30 hostname kernel: ACPI: Executed 18 blocks of module-level executable AML code
 Dec 01 15:53:30 hostname kernel: ACPI: Dynamic OEM Table Load:
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0xFFFF880443D5B800 0003D3 (v02 PmRef Cpu0Cst 00003001 INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: Dynamic OEM Table Load:
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0xFFFF8804442BA000 0005AA (v02 PmRef ApIst 00003000 INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI: Dynamic OEM Table Load:
 Dec 01 15:53:30 hostname kernel: ACPI: SSDT 0xFFFF880443D99C00 000119 (v02 PmRef ApCst 00003000 INTL 20120913)
 Dec 01 15:53:30 hostname kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20150930/hwxface-580)
 Dec 01 15:53:30 hostname kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20150930/hwxface-580)
 Dec 01 15:53:30 hostname kernel: ACPI: Enabled 4 GPEs in block 00 to 7F
 Dec 01 15:53:30 hostname kernel: iwlwifi 0000:02:00.0: Unsupported splx structure
 Dec 01 15:53:30 hostname kernel: iwlwifi 0000:02:00.0: Direct firmware load for iwlwifi-7265D-19.ucode failed with error -2
 Dec 01 15:53:30 hostname kernel: iwlwifi 0000:02:00.0: Direct firmware load for iwlwifi-7265D-18.ucode failed with error -2
 Dec 01 15:53:30 hostname kernel: iwlwifi 0000:02:00.0: Direct firmware load for iwlwifi-7265D-17.ucode failed with error -2
 Dec 01 15:53:31 hostname systemd-tmpfiles[682]: [/usr/lib/tmpfiles.d/var.conf:14] Duplicate line for path "/var/log", ignoring.
 Dec 01 15:53:31 hostname kernel: cgroup: new mount options do not match the existing superblock, will be ignored
 Dec 01 15:53:31 hostname iscsid[938]: iSCSI logger with pid=940 started!
 Dec 01 15:53:31 hostname iscsid[940]: iSCSI daemon with pid=941 started!
 Dec 01 15:55:09 hostname kernel: audit_printk_skb: 9 callbacks suppressed
 Dec 01 15:55:10 hostname iscsid[940]: iscsid shutting down.
 Dec 01 15:55:10 hostname iscsid[32618]: iSCSI logger with pid=32619 started!
 Dec 01 15:55:11 hostname iscsid[32619]: iSCSI daemon with pid=32620 started!
 Dec 01 15:55:14 hostname kernel: audit_printk_skb: 18 callbacks suppressed
 Dec 01 16:09:08 hostname systemd-tmpfiles[14483]: [/usr/lib/tmpfiles.d/var.conf:14] Duplicate line for path "/var/log", ignoring.
Package: fsprotect 1.0.6
PackageArchitecture: all
ProcEnviron:
 TERM=xterm
 SHELL=/bin/bash
 PATH=(custom, no user)
 LANG=en_AU.UTF-8
 LANGUAGE=en_AU:en
 XDG_RUNTIME_DIR=<set>
ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6
SourcePackage: fsprotect
Tags: xenial
Uname: Linux 4.4.0-21-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
_MarkForUpload: True

Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in fsprotect (Ubuntu):
status: New → Confirmed
Revision history for this message
Steffen Hemer (s-hemer) wrote :

Applying the patch suggested in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812404#12 works for me most of the times at our chroot install on server for pxe boot. Never experienced the problem on a main installation.

Revision history for this message
Steffen Hemer (s-hemer) wrote :

Today again stumbled over this problem after initramfs-tools had an upgrade and nvidia dkms driver wanted to be configured. I have to apply the mentioned fix every time again since Xenial was released. This is annoying: can some one backport the mentioned fix from 0.122 ???

Changed in initramfs-tools (Ubuntu):
status: New → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.