Your message dated Thu, 20 Mar 2008 21:32:08 +0000 with message-id <E1JcSMq-0007tS-6P@ries.debian.org> and subject line Bug#468739: fixed in partman-crypto 28 has caused the Debian Bug report #468739, regarding partman-crypto: crypto_check_mountpoints: incorrect mount point test to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 468739: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468739 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian BTS Submit <submit@bugs.debian.org>
- Subject: partman-crypto: unsafe_swap: code completely broken
- From: Frans Pop <elendil@planet.nl>
- Date: Sat, 1 Mar 2008 03:08:56 +0100
- Message-id: <[🔎] 200803010308.56806.elendil@planet.nl>
Package: partman-crypto Version: 12 Severity: important The code below from partman-crypto/check.d/crypto_check_mountpoints can result in the following error: Mar 1 01:19:24 main-menu[857]: (process:10661): [: Mar 1 01:19:24 main-menu[857]: (process:10661): /boot: unknown operand # Check 1 - Is cryptoroot possible? if [ $mnt = / ]; then I saw this error only after adding a loop-AES random encrypted swap partition in a test that already had a regular encrypted partition. The problem is probably a bit earlier where the mountpoint is being determined. Seems like it fails to allow for the case where a partition does not have a mount point (as in the case of swap). In general it seems that partman-crypto could do with some preventive quoting of variables used in tests as obviously they _can_ (unexpectedly) be empty. This issue were found after investigating the errors in the log from Tiago: http://lists.debian.org/debian-boot/2008/02/msg00865.html AFAICT it is totally unrelated to the XFS issue that was the cause of partman eventually failing. Cheers, FJPAttachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
- To: 468739-close@bugs.debian.org
- Subject: Bug#468739: fixed in partman-crypto 28
- From: Max Vozeler <xam@debian.org>
- Date: Thu, 20 Mar 2008 21:32:08 +0000
- Message-id: <E1JcSMq-0007tS-6P@ries.debian.org>
Source: partman-crypto Source-Version: 28 We believe that the bug you reported is fixed in the latest version of partman-crypto, which is due to be installed in the Debian FTP archive: partman-crypto-dm_28_all.udeb to pool/main/p/partman-crypto/partman-crypto-dm_28_all.udeb partman-crypto-loop_28_all.udeb to pool/main/p/partman-crypto/partman-crypto-loop_28_all.udeb partman-crypto_28.dsc to pool/main/p/partman-crypto/partman-crypto_28.dsc partman-crypto_28.tar.gz to pool/main/p/partman-crypto/partman-crypto_28.tar.gz partman-crypto_28_i386.udeb to pool/main/p/partman-crypto/partman-crypto_28_i386.udeb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 468739@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Max Vozeler <xam@debian.org> (supplier of updated partman-crypto package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 08 Mar 2008 17:35:48 +0100 Source: partman-crypto Binary: partman-crypto partman-crypto-dm partman-crypto-loop Architecture: source all i386 Version: 28 Distribution: unstable Urgency: low Maintainer: Debian Install System Team <debian-boot@lists.debian.org> Changed-By: Max Vozeler <xam@debian.org> Description: partman-crypto - Add to partman support for block device encryption (udeb) partman-crypto-dm - Add to partman support for dm-crypt encryption (udeb) partman-crypto-loop - Add to partman support for loop-AES encryption (udeb) Closes: 381895 468738 468739 Changes: partman-crypto (28) unstable; urgency=low . [ Max Vozeler ] * Allow install onto loop-AES encrypted root. Closes: #381895 * check.d/crypto_check_mountpoints: quote $mnt as it may be empty. Closes: #468739 * commit.d/unsafe_swap: replace open-coded check for swap on dm-crypt with call to dm_is_safe(). Closes: #468738 * Regenerate the initramfs for root on loop-AES. * Make veto_filesystems/crypto executable so that it actually gets used. . [ Updated translations ] * Bulgarian (bg.po) by Damyan Ivanov * Esperanto (eo.po) by Serge Leblanc * Basque (eu.po) by Piarres Beobide * French (fr.po) by Christian Perrier * Galician (gl.po) by Jacobo Tarrio * Japanese (ja.po) by Kenshi Muto * Korean (ko.po) by Changwoo Ryu * Portuguese (Brazil) (pt_BR.po) by Felipe Augusto van de Wiel (faw) * Portuguese (pt.po) by Miguel Figueiredo * Thai (th.po) by Theppitak Karoonboonyanan Files: 765eaaea68a786ab986bb316888afffd 799 debian-installer optional partman-crypto_28.dsc 11229a33e64a40c39ff602cac5c8cdf2 255228 debian-installer optional partman-crypto_28.tar.gz db8b030dffce499b789026e1092c1d92 1366 debian-installer optional partman-crypto-dm_28_all.udeb 9fd65b64aa90ba131e20c09c9809f850 1240 debian-installer optional partman-crypto-loop_28_all.udeb f818ceefb19bc031e5fd4952fe2c2bcf 220840 debian-installer optional partman-crypto_28_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQCVAwUBR+LToKoJyPlcq6GYAQJo9gP+ITtenNdlRsg8h9B/3TcBNxFuSZi69asU HdBFlZe/1NjD3oeRcRiRX9EDAyeLkNtABLxicMQnpwiVGFK/kyxwzLVSfqwAO2Fg Ktc7XE3V5LA3CF27Kh/KbOd51RzUeIoP6Nm8pMOTU63UAN0L8pMSJznCC4Eo6woh uH8csJMW3UM= =uTUY -----END PGP SIGNATURE-----
--- End Message ---