[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#255135: marked as done (debian-installer: Filesystem flags allow for install snafu)



Your message dated Tue, 20 Jul 2004 11:47:26 -0400
with message-id <E1Bmwpy-00021v-00@newraff.debian.org>
and subject line Bug#249322: fixed in partman-xfs 14
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Jun 2004 23:00:51 +0000
>From stephen@touset.org Fri Jun 18 16:00:51 2004
Return-path: <stephen@touset.org>
Received: from master.debian.org [146.82.138.7] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BbSLq-0000qQ-00; Fri, 18 Jun 2004 16:00:50 -0700
Received: from ikobo.com ([127.0.0.1]) [216.199.70.171] 
	by master.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BbSLp-0004yq-00; Fri, 18 Jun 2004 18:00:50 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stephen Touset <stephen@touset.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: debian-installer: Filesystem flags allow for install snafu
X-Mailer: reportbug 2.61
Date: Fri, 18 Jun 2004 19:00:46 -0400
X-Debbugs-Cc: stephen@touset.org
Message-Id: <E1BbSLp-0004yq-00@master.debian.org>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham 
	version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: debian-installer
Severity: normal

Apparently, setting the noexec, nosuid, and/or nodev flags on the tmp 
partition cause the base installer to fail to execute, upon reboot. 
Either the base install should be fixed (so that it doesn't run out of 
tmp), or those options should be prevented from being selected on /tmp.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.6-1-686
Locale: LANG=C, LC_CTYPE=C

---------------------------------------
Received: (at 249322-close) by bugs.debian.org; 20 Jul 2004 15:49:39 +0000
>From katie@ftp-master.debian.org Tue Jul 20 08:49:39 2004
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Bmws7-0002N6-00; Tue, 20 Jul 2004 08:49:39 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1Bmwpy-00021v-00; Tue, 20 Jul 2004 11:47:26 -0400
From: Anton Zinoviev <zinoviev@debian.org>
To: 249322-close@bugs.debian.org
X-Katie: $Revision: 1.51 $
Subject: Bug#249322: fixed in partman-xfs 14
Message-Id: <E1Bmwpy-00021v-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Tue, 20 Jul 2004 11:47:26 -0400
Delivered-To: 249322-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Source: partman-xfs
Source-Version: 14

We believe that the bug you reported is fixed in the latest version of
partman-xfs, which is due to be installed in the Debian FTP archive:

partman-xfs_14.dsc
  to pool/main/p/partman-xfs/partman-xfs_14.dsc
partman-xfs_14.tar.gz
  to pool/main/p/partman-xfs/partman-xfs_14.tar.gz
partman-xfs_14_all.udeb
  to pool/main/p/partman-xfs/partman-xfs_14_all.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 249322@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anton Zinoviev <zinoviev@debian.org> (supplier of updated partman-xfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 20 Jul 2004 16:01:08 +0300
Source: partman-xfs
Binary: partman-xfs
Architecture: source all
Version: 14
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team <debian-boot@lists.debian.org>
Changed-By: Anton Zinoviev <zinoviev@debian.org>
Description: 
 partman-xfs - Add to partman support for xfs (udeb)
Closes: 249322 255135 258117
Changes: 
 partman-xfs (14) unstable; urgency=low
 .
   * Anton Zinoviev
     - disable the "noexec" mount option for the file system mounted on
       /tmp; thanks to Mika Bostrom, Stephen Touset and Ken Schweigert
       (closes: #249322, #255135, #258117)
     - active_partition/xfs/*, commit.d/format_xfs: support for labels
   * Updated translations:
     - Arabic (ar.po) by Ossama M. Khayat
     - Welsh (cy.po) by Dafydd Harries
     - German (de.po) by Dennis Stampfer
     - Croatian (hr.po) by Kruno
     - Norwegian Nynorsk (nn.po) by HÃ¥vard Korsvoll
Files: 
 1f41245320a30a05d0deebe640ad164e 622 debian-installer standard partman-xfs_14.dsc
 b2261595c6f6504e8d428896ddb8e0ea 125516 debian-installer standard partman-xfs_14.tar.gz
 f095a5fb31c2aead6d3493679aae6c7d 40700 debian-installer standard partman-xfs_14_all.udeb
package-type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA/RyeJP1eZJv0KwcRAtFeAJwPUvO6CDwqskOxPLMwQpOcIniKOACdH3i7
mrIOzEgzCRcfusia+TLCKiM=
=Pwjr
-----END PGP SIGNATURE-----



Reply to: