tags 339091 - moreinfo
stop
maximilian attems ([EMAIL PROTECTED]) wrote:
> can you please confirem that your manpage was written under "PUBLIC
> DOMAIN" license as the initramfs-tools package?
I hope this is sufficient:
I, the creator of this work, hereby release it into the public domain. This
Package: initramfs-tools
Severity: important
The latest version of initramfs-tools (0.44) calls update-initramfs in
postinst to regenerate the latest initramfs on upgrades (see initramfs-tools
changelog, version 0.40ubuntu6).
This can be potentially very dangerous if the newer initramfs-tools for
This problem is not limited to sparc64, I've encountered it on i386 after
upgrading from initramfs-tools 0.41 to 0.44 (when using a kernel compiled with
modular ide).
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
maximilian attems wrote:
> please retest with latest initramfs-tools in unstable
And when doing so, please take note of merged bugs 332824, 337497 and 342925
(i.e. make sure that ide-disk and possibly ide-generic are added to
/dev/mapper/control before generating the new initramfs image).
It seem
Jonathan Brandmeyer wrote:
> So, what do I need to edit to fix this? Alternatively,
> what command should I try to run after modprobing in
> ide-disk and ide-generic?
The problem is that ide-disk and ide-generic are not loaded when dm-mod is
loaded so when it performs its initial device scan it s
Jonathan Brandmeyer wrote:
> /dev/mapper is empty except for control
Does running "vgscan" and/or "vgchange -ay" from the initramfs shell create
any nodes in /dev/mapper?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: initramfs-tools
Severity: wishlist
Currently the last line in
/usr/share/initramfs-tools/scripts/local-top/lvm only activates the
volume group which seems to contain the root fs.
In order to support features such as root-auto-probing (bug #337682) and
cryptoroot-over-lvm, it would b
Package: initramfs-tools
Severity: wishlist
Currently /usr/share/initramfs-tools/scripts/local checks for the
presence of the root device node after local-top has been run but before
local-premount has been run an panics if it can't find it:
# Get the root filesystem type
if [ ! -e "${ROOT}"
quot; ]; then
panic "Frobnication executable not found"
fi
if [ ! -e "/dev/mapper/frobb" ]; then
panic "Frobnication device not found"
fi
log_begin_msg "Starting frobnication"
/sbin/frobnicate "/dev/mapper/frobb" || panic "Frobnication failed"
log_end_msg
exit 0
.fi
.RE
.SH AUTHOR
The initramfs-tools are written by Jeff Bailey <[EMAIL PROTECTED]>.
.PP
This manual was written by David Härdeman <[EMAIL PROTECTED]>.
Package: initramfs-tools
Severity: minor
Tags: patch
This patch adds a separate function to load a filesystem driver which
first checks if it is already compiled into the kernel which should
remove some superflous modprobe error messages if it is.
Re,
David
Index: initramfs-tools-0.38/scripts
Package: initramfs-tools
Severity: minor
Tags: patch
Currently /usr/share/initramfs-tools/init kills udev after init-premount
scripts have executed. However, more devices might become available as a
result of running the local scripts.
I therefore suggest to kill udev as late as possible (rig
Russel Coker wrote:
The initramfs generated on a LVM IDE system does not create /dev/hda* device
nodes, so vgchange doesn't discover any LVM devices and therefore the
machine can't boot.
That is weird, I have root-on-lvm-on-hda and the devices are created
+ the system boots just fine for me.
This was discussed on debian-devel [1]. As long as the debian kernel is
shipped with CONFIG_LEGACY_PTYS enabled I'd say that the current
behaviour is correct.
The proper fix would be to:
a) change the default kernel config; or
b) change the udev rules
not to do any special changes to initramf
On Fri, Dec 23, 2005 at 02:19:47PM +0100, maximilian attems wrote:
This is wrong and can lead to data loss.
lvm2 will cheerfully activate even incomplete volumes.
I see, feel free to close the bug then, I'll work on a better solution.
Re,
David
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
w
this patch
applied and verified that it does indeed fix the problem and it seems to
have no side effects.
I hope that a fixed version can be included in sarge as soon as possible
since this could potentially be a security issue (e.g. if the account
has been disabled, access would still be gra
Package: initramfs-tools
Severity: important
With the recent udev version (0.074-3), /sbin/udevsynthesize tries to
run /lib/udev/udevsynthesize if the kernel is a recent version. This
fails as /lib/udev/* is not copied to the initramfs image meaning that
the boot fails.
Re,
David
--
To UNS
Package: ketchup
Severity: normal
Ketchup fails to download recent 2.6.x.y kernels:
([EMAIL PROTECTED]:~/kernel)$ mkdir linux-2.6.14.2
([EMAIL PROTECTED]:~/kernel)$ ketchup -G -a /home/david/kernel/tarballs -d
./linux-2.6.14.2 2.6.14.2
None -> 2.6.14.2
Unpacking linux-2.6.14.tar.bz2
rmdir: linu
Package: ketchup
Severity: wishlist
If ketchup is run with the -d command, it would be nice if it created
the target directory (if it doesn't exist) instead of crashing:
([EMAIL PROTECTED]:~/kernel)$ ketchup -G -a /home/david/kernel/tarballs -d
./linux-2.6.14.2 2.6.14.2
Traceback (most recen
y kernels
(see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339374).
Regards,
David Härdeman
[EMAIL PROTECTED]
--- ketchup.orig2005-11-17 22:35:02.0 +0100
+++ ketchup 2005-11-17 22:37:14.0 +0100
@@ -671,6 +671,9 @@
# Process args
+if not os.path.exists(options["
Package: initramfs-tools
Severity: minor
Currently, initramfs-tools relies upon usr/initramfs_list in 2.6 kernels
to create the /dev and /root directories. The attached patch will make
sure that they are created along with the console and null device nodes.
This has two advantages:
1) If usr
I am still seeing this problem in the version of courier included in
sarge. Courier seems to happily ignore the result of the pam check and
continue anyway (when using the pam_tally module).
I would suggest that this warrants the security tag and a security
update as it allows a user to try to
On Sat, Dec 30, 2006 at 04:46:27AM +0100, Jonas Meurer wrote:
Hello,
I need some advice regarding this bug. Unforuntately i don't know
nothing about initramfs, and David Härdeman, the one who usually does
all the cryptsetup initramfs stuff, is unavailable currently.
Could somebody comme
On Mon, January 15, 2007 12:45, Steve Langasek said:
> On Sun, Jan 14, 2007 at 11:08:53PM +0100, David Härdeman wrote:
>> I'll forward the same message to this bug that I forwarded to #406697
>> (which is now closed). Feel free to substitute "cryptsetup" for
>>
quot; was indeed executed.
I'll take a look at this later today if I have time. Meanwhile, could you
add some debugging output to "do_close" in the cryptdisks.functions script
and retry a shutdown?
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> fi
> else
> log_progress_msg "$dst(busy)"
> fi
> else
> log_progress_msg "$dst(stopped)"
> fi
> done
>
> log_action_end_msg 0
> }
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
es the /dev/dm-* devices and also removes them. At the
time the cryptdisks scripts are executed at shutdown, udev is not
running (as FJP said).
The proper "fix" for this seems to be a post-Etch thing (involving
changes in the kernel, udev and libdevmapper), and the issue seems
mostly cosmetical, so I'll mark the bug as such.
--
David Härdeman
tions using the graphical installer.
--
David Härdeman
On Mon, December 11, 2006 18:14, Enrico Gatto said:
> On Mon, 11 Dec 2006 10:59:24 +0100 (CET)
> David Härdeman <[EMAIL PROTECTED]> wrote:
>
>> could you please provide me with
>> ..
>> /etc/fstab,
>
> /dev/mapper/croot / ext3 defaults
On Mon, December 11, 2006 19:40, Frans Pop said:
> I need some help here.
>
> According to the test that David Härdeman introduced recently, a hyphen
> _is_ a valid character for VG and LV names.
>
> So what is the actual bug here:
> - a hyphen is not a valid character aft
;)"
> + device=/dev/mapper/"$VG_dev"-"$LV_dev"
>
> dirname=$(echo "$device" | sed "s:/:=:g")
> dev=$DEVICES/$dirname
>
Yes, that's the right idea. I don't know whether more changes are necessary.
If needed, I c
lates | 28 +
partman-base/choose_partition/partition_tree/do_option | 16 +
5 files changed, 252 insertions(+), 55 deletions(-)
--
David Härdeman
Index: partman-auto/debian/partman-auto.templates
===
--- partman-auto/d
On Tue, Dec 12, 2006 at 09:07:18PM +0100, David Härdeman wrote:
The attached patch is my first stab at allowing a more complete removal
of configured device-mapper devices (crypto / lvm). It will work in a
recursive manner so even crazy setups like
crypto-on-lvm-on-crypto-on-something should
On Tue, Dec 12, 2006 at 11:04:07PM +0100, Enrico Gatto wrote:
Il giorno Tue, 12 Dec 2006 17:35:30 +0100
David Härdeman <[EMAIL PROTECTED]> ha scritto:
How can you know that these modules are included? What adds them
to the initramfs image?
The evms hook includes them in initrd. The pi
Vagrant Cascadian wrote:
> i'm not sure this bug is really fixed, or fixed completely...
>...
> APT policy: (500, 'testing')
The fixed version is not in testing yet.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscr
se:
key slot 0 unlocked.
Command successful.
# ls -al /dev/mapper/footmp
brw-rw 1 root disk 254, 3 2006-12-14 19:14 /dev/mapper/footmp
# cryptsetup remove footmp
# losetup -d /dev/loop0
--
David Härdeman
tput do you get from fstype in the initramfs image? That is, what
output does "fstype < /dev/" give?
--
David Härdeman
cryptsetup that
is currently in unstable?
--
David Härdeman
I'm sorry but I can't reproduce this.
In the initramfs shell during boot after doing "s2disk":
(initramfs) fstype < /dev/mapper/corevg-swaplv
FSTYPE=suspend
FSSIZE=0
(initramfs)
Did you regenerate your initramfs after installing the new klibc-utils
package?
--
David Härdeman
Hi Martin,
the fixed klibc-utils version is in unstable now and it works for me
(i.e. it recognizes suspend images).
Could you please test it and verify that it works for you as well?
(remember to regenerate the initramfs after the updated klibc-utils
1.4.30-2 has been installed)
--
David
FYI, it seems likely that #402511 is due to the same problem as
described in #401393 (with further details)
--
David Härdeman
d you then provide me with the exact steps that you took to
reproduce it cause so far I haven't managed to do so.
--
David Härdeman
onas will have time to add this fix and
release a new version.
Later it would probably be good to add checks too make sure that the
device argument is a block device and not something else, in order to
provide more helpful messages to the user. That can be implemented later
though.
--
David Hä
tion instead of manipulating selinux_mnt).
Thus I'll close the bug as fixed in sysvinit 2.86.ds1-34.
I still suspect that #344471 is a dupe of this bug, but I'll leave that
up to the maintainers to deal with.
--
David Härdeman
1.8-1 Python bindings for SELinux polic
Versions of packages policycoreutils recommends:
ii selinux-policy-refpolicy- 0.0.20061018-1 Targeted variant of the SELinux re
-- no debconf information
--
David Härdeman
1.8-1 Python bindings for SELinux polic
Versions of packages policycoreutils recommends:
ii selinux-policy-refpolicy- 0.0.20061018-1 Targeted variant of the SELinux re
-- no debconf information
--
David Härdeman
to
> warn people about the presence of unsupported file systems.
Ok, seems reasonable. Feel free to close this BR.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
sical volume for several LVM vg's so no additional setup is necessary
for the second device.
I will commit a fix for this later today, updated package should be
included in Etch.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe&quo
, the init.d scripts check for readability of the key and refuses
to try to setup the mapping if it's not readable.
I will commit a fix for this later today, updated package should be
included in Etch.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "u
set (if a initramfs image built using initramfs-tools is
used).
--
David Härdeman
diff -ur ./udev-0.100.orig/extra/initramfs.bottom
./udev-0.100/extra/initramfs.bottom
--- ./udev-0.100.orig/extra/initramfs.bottom2006-11-07 18:06:39.0
+0100
+++ ./udev-0.100/extra/initramfs.bottom
later.
I must admit though that I didn't really understand why the fd9 trick
was used in the first place?
--
David Härdeman
diff -ur ./sysvinit-2.86.ds1.orig/debian/initscripts/etc/init.d/mtab.sh
./sysvinit-2.86.ds1/debian/initscripts/etc/init.d/mtab.sh
--- ./sysvinit-2.86.ds1.orig/debian/in
Package: lvm-common
Version: 1.5.20
Severity: minor
Tags: patch
Hi,
the attached patch changes the lvm-common init.d script(s) to give the
newly created devices (if any) their proper SELinux contexts. On a
non-SELinux system, nothing is changed by the one-line patch.
--
David Härdeman
diff
-boots, there shouldn't be any differences.
--
David Härdeman
diff -ur ./udev-0.100.orig/debian/udev.init ./udev-0.100/debian/udev.init
--- ./udev-0.100.orig/debian/udev.init 2006-11-08 00:05:12.0 +0100
+++ ./udev-0.100/debian/udev.init 2006-11-08 00:09:30.0 +0100
@@ -
some bugs crept in...sorry
about that.
Would you be willing to test the attached patch? It should solve both
bugs you reported today.
--
David Härdeman
Index: initramfs-cryptroot-hook
===
--- initramfs-cryptroot-hook(revi
build/config/common and set "EXTRAFILES" to something like
"EXTRAFILES = /usr/bin/strace" which will also add the extra binary (and
all libraries that it uses)
--
David Härdeman
On Wed, Nov 08, 2006 at 10:33:22PM +0100, Loïc Minier wrote:
On Wed, Nov 08, 2006, David Härdeman wrote:
Would you be willing to test the attached patch? It should solve both
bugs you reported today.
I read the patch, and I believe it resolves the issues. I wonder why
you prefer ignoring all
Perhaps we need to disable crypto-on-md for Etch...(as Max said in #393728)
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
he format of the latter two?
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
stead and
which will work without any further changes)
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Fri, November 10, 2006 12:10, David Härdeman said:
> On Fri, November 10, 2006 10:34, martin f krafft said:
>> As of late, cryptsetup figures out what swap device I need to resume
>> from disk and tells initramfs to also initialise that device even
>> before root is
ke that (can't check the exact naming right now). If you choose that
option, it will automatically partition the harddrive using a regular boot
partition and encrypted LVM devices for the rest.
Is this not what you requested?
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTEC
On Fri, November 10, 2006 15:28, Thomas Hühn said:
> David Härdeman wrote:
>> On Fri, November 10, 2006 12:02, Thomas Hühn said:
>>> - I was surprised to see crypto support in the partitioning phase.
>>> First
>>> I thought Debian now supports encrypted pa
en into a state where major surgery is needed to get it back? :-/
That was based on Max's analysis of the underlying problems, so not
first-hand knowledge. There might be a simpler root cause though.
I'm not sure when I'll have time to investigate this further...
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ill like to see this change applied, I suggest you discuss
it directly with the upstream author - Clemens Fruhwirth
(<[EMAIL PROTECTED]>, http://clemens.endorphin.org/)
--
David Härdeman
ustom built usplash).
--
David Härdeman
On Fri, Nov 10, 2006 at 01:43:05PM +0100, martin f krafft wrote:
also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.10.1331 +0100]:
The hook should warn about these situations though and then skip
adding the resume partition details to the initramfs image...I'll
fix that
Th
On Sat, Nov 11, 2006 at 05:52:35PM +0100, martin f krafft wrote:
also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.11.1239 +0100]:
cryptswap /dev/hda2 cryptroot
keyscript=/root/decrypt_derived,hash=sha256,size=256,cipher=aes-cbc-essiv:sha256
So how do I initialise /dev/hda2 for t
On Sat, Nov 11, 2006 at 05:09:44PM +0100, martin f krafft wrote:
also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.11.1239 +0100]:
Ok, I've committed fixes for both your bugs to the SVN repo. Could you
please test the package? Either by downloading it from:
http://www.hardema
On Sun, Nov 12, 2006 at 09:48:16PM +0100, martin f krafft wrote:
also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.12.1645 +0100]:
Then, provided that the swap entry is configured in /etc/crypttab, run
"/etc/init.d/cryptdisks start" and it'll do the setup for you.
Package: klibc-utils
Version: 1.4.30-1
Severity: normal
Tags: patch
Hi,
the attached patch adds swsusp, suspend2 and uswsusp image detection
to fstype.
Signed-off-by: David Härdeman <[EMAIL PROTECTED]>
--
fstype.c | 15 +++
swap_fs.h |7 +++
2 files chang
On Sun, Nov 12, 2006 at 11:24:53PM +0100, martin f krafft wrote:
also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.12.2308 +0100]:
>created/setup correctly, /bin/fstype returns unknown for FSTYPE,
>and thus the cryptroot script thinks that something went wrong
>and loops
been autodetected but it wasn't due to a variable naming
error in the initramfs hook. I've fixed both issues in SVN. Thanks for
the report.
--
David Härdeman
db_go || return 30
db_get partman-auto-lvm/no_boot || true
[ "$RET" = true ] || return 30
fi
--
David Härdeman
month or two ago, they just say you can't use Grub for
> boot-on-raid, but that Lilo works (that's how I got my system set up).
Don't mix up boot-on-raid and boot-on-device-mapper, they are two
different things using different kernel subsystems (md and dm).
boot-on-raid(1) wor
On Fri, December 8, 2006 10:31, Loïc Minier said:
> On Fri, Dec 08, 2006, David Härdeman wrote:
>> Don't mix up boot-on-raid and boot-on-device-mapper, they are two
>> different things using different kernel subsystems (md and dm).
>
> Err, md is dm based, right?
Package: refpolicy
Severity: normal
qemu needs execmem permissions, so (I guess that) a file_context like the
following is necessary:
/usr/bin/qemu -- system_u:object_r:unconfined_execmem_exec_t
At least that fixed the audit messages for me
--
David Härdeman
I solved this problem (the non-posix command) by replacing:
err = os.system("mv linux*/* linux*/.[^.]* ..; rmdir linux*")
with
err = os.system("find linux* -maxdepth 1 -mindepth 1 -print0 | xargs -0 -iREF mv REF
../; rmdir linux*")
--
David Härdeman
I assume you use a
combination of evms and crypto?)
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
g/398302 to get a copy of the first
128K or so of the decrypted swap device so that I can do some testing
why the image is not recognized?
--
David Härdeman
current Etch release timeframe.
--
David Härdeman
On Sun, Jan 07, 2007 at 01:53:08PM +0100, Marcus Better wrote:
David Härdeman wrote:
That would mean that the fstype binary from klibc-utils doesn't
recognize the decrypted device as a suspend image. Could you please
follow the steps in bugs.debian.org/398302
Ok, I played a little with i
ce
the suspend signature still is there (and it has overwritten the swap
signature, if the resume had succeeded, the swap signature would have
been written back ontop of the suspend signature).
--
David Härdeman
ry, so the hash=ripemd160 line should be included in the
/etc/crypttab setup.
Changing the defaults is not a good solution since that would break the
setup for others, so I'll add a line about this to the documentation and
consider the BR closed with that.
--
David Härdeman
re not supported
as device nodes.
--
David Härdeman
a NEWS entry or debconf notice.
I don't agree that it's very likely. What is likely is that the mapping
is setup during boot and not touched later.
So it seems it would work if we fix the initramfs scripts, and run
update-initramfs in postinst.
--
David Härdeman
ok at it...perhaps I think I'll add both the symlink
target check and the warning message...
--
David Härdeman
can't see that anything needs to be done in cryptsetup
(except making sure that all works when/if this behaviour is changed in
libdevmapper).
--
David Härdeman
ave to wait for the nodes to magically appear
instead).
There is a writeup on this with some more details at:
https://wiki.ubuntu.com/UdevDeviceMapper
However, I can't see that anything needs to be done in cryptsetup
(except making sure that all works when/if this behaviour is changed
On Thu, Nov 23, 2006 at 02:48:13PM +0100, Frans Pop wrote:
On Friday 17 November 2006 11:28, David Härdeman wrote:
On Fri, November 17, 2006 10:21, Frans Pop said:
> Because the method is not a question as such when using preseeding.
> We should handle the situation where partman-auto/d
k together.
Why? If the cryptdisks.functions script is missing even though you haven't
removed the cryptsetup package from your system something is seriously
broken.
--
David Härdeman
unrelated bug which has now been fixed. Could you retry your
installation using a recent daily d-i image?
--
David Härdeman
fbno desc; do
mknod /dev/fb$fbno c 29 $fbno
done < /proc/fb
if [ ! -e /dev/fb0 ]; then
mknod /dev/fb0 c 29 0
fi
for i in 0 1 2 3 4 5 6 7 8; do
mknod /dev/tty$i c 4 $i
done
fi
--
David Härdeman
I've attached a patch which replaces the loops with more direct access
methods. I've done one install run with it and it seems to work as
expected.
The patch is fairly large though, not sure whether it would be a good
idea to apply it before Etch?
--
David Härdeman
Index: aut
ting the stack and leading to
interesting crashes in unrelated places later.
I'm not familiar enough with the LUKS code to suggest a fix...Clemens?
--
David Härdeman
might be a sufficient check...
--
David Härdeman
mehow).
I'd still like to trace down what *is* causing the glibc warnings though,
just to be sure. I'll try to fiddle with the rcS scripts next to see if I
can find the offender.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hmm,
perhaps bugs #344471 and #330592 describe the same issue (i.e. one which
is no longer reproducible)?
Edwin, are you still able to reproduce the init GPF that you reported in
http://bugs.debian.org/344471 ?
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
nux by default (I doubt
> it ever did though).
>
> * SELinux used to try and load a policy even if one has not been
> configured/installed.
* One of the libraries that init depends on had a bug which has been
fixed
--
David Härdeman
--
To UNSUBSCRIBE, emai
and commit it to SVN this evening. Since a new
upload is necessary for d-i RC1, and since it fixes two RC bugs, I'll ask
Frans Pop to do a NMU upload unless you've told me by then that you have
time to do the upload.
--
David Härdeman
--
To UNSUBSCRIBE, email to [EMAIL PROTECTE
On Mon, November 13, 2006 10:39, martin f krafft said:
> also sprach David Härdeman <[EMAIL PROTECTED]> [2006.11.13.0014 +0100]:
>> So that means that suspend2disk actually removes the swap signature from
>> disk when you suspend. I seemed to recall that the suspend solutions
) has been fixed with the changes that'll go into the next
upload. The remainder is of lower severity.
--
David Härdeman
1 - 100 of 625 matches
Mail list logo