Your message dated Sun, 11 Sep 2005 19:50:29 +0200
with message-id <[EMAIL PROTECTED]>
and subject line This bug is fixed now
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 Jul 2005 13:50:50 +0000
>From [EMAIL PROTECTED] Mon Jul 25 06:50:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.gmx.de (mail.gmx.net) [213.165.64.20] 
        by spohr.debian.org with smtp (Exim 3.36 1 (Debian))
        id 1Dx3M1-00031C-00; Mon, 25 Jul 2005 06:50:50 -0700
Received: (qmail invoked by alias); 25 Jul 2005 13:50:18 -0000
Received: from p5088B503.dip.t-dialin.net (EHLO t-39-7-gs.workserver.net) 
[80.136.181.3]
  by mail.gmx.net (mp002) with SMTP; 25 Jul 2005 15:50:18 +0200
X-Authenticated: #27357251
Received: from root by t-39-7-gs.workserver.net with local (Exim 4.50)
        id 1Dx3LM-0002FL-1R
        for [EMAIL PROTECTED]; Mon, 25 Jul 2005 15:50:08 +0200
Date: Mon, 25 Jul 2005 15:50:07 +0200
From: General Stone <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: /etc/init.d/umountfs
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="UHN/qo2QbUvPLonB"
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Y-GMX-Trusted: 0
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02


--UHN/qo2QbUvPLonB
Content-Type: multipart/mixed; boundary="envbJBWh7q8WU6mo"
Content-Disposition: inline


--envbJBWh7q8WU6mo
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: initscripts
Version: 2.86.ds1-1

Hello,
The '/etc/init.d/umountfs' script mounts the rootfs ("/") readonly, but
there other scripts -- like cryptsetup -- who need write permission to
deactivate the maps.
I modified the script '/etc/init.d/umountfs' and added two new scipts,
'/etc/init.d/umountroot' and /etc/default/umountfs, so that the "/" is
mounted readonly last. Look at the attachment for the modification and
the two scripts.

Thanks, Markus Nass.

--=20
Bill Gates said: "It requires Windows XP or better", so I installed Linux.

--envbJBWh7q8WU6mo
Content-Type: application/octet-stream
Content-Disposition: attachment; filename="umount_scripts.tar.bz2"
Content-Transfer-Encoding: base64
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--envbJBWh7q8WU6mo--

--UHN/qo2QbUvPLonB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC5O4PfBT4BlZld/0RAnmbAJwOow+y4D0DErereD6R1I7uM9RknACgrqxP
tmkKKm+/myMubCgf/DC6Xzk=
=cWjo
-----END PGP SIGNATURE-----

--UHN/qo2QbUvPLonB--

---------------------------------------
Received: (at 252059-done) by bugs.debian.org; 11 Sep 2005 17:50:47 +0000
>From [EMAIL PROTECTED] Sun Sep 11 10:50:47 2005
Return-path: <[EMAIL PROTECTED]>
Received: from pat.uio.no [129.240.130.16] (7411)
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EEVyW-0001Uz-00; Sun, 11 Sep 2005 10:50:44 -0700
Received: from mail-mx1.uio.no ([129.240.10.29])
        by pat.uio.no with esmtp (Exim 4.43)
        id 1EEVyR-0004pw-KJ; Sun, 11 Sep 2005 19:50:39 +0200
Received: from saruman.uio.no ([129.240.201.202])
        by mail-mx1.uio.no with esmtp (Exim 4.43)
        id 1EEVyI-0005v8-Ll; Sun, 11 Sep 2005 19:50:30 +0200
Received: from pre by saruman.uio.no with local (Exim 4.44)
        id 1EEVyH-0002mE-Cw; Sun, 11 Sep 2005 19:50:29 +0200
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: This bug is fixed now
From: Petter Reinholdtsen <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>
Sender: Petter Reinholdtsen <[EMAIL PROTECTED]>
Date: Sun, 11 Sep 2005 19:50:29 +0200
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.616, required 12,
        autolearn=disabled, ALL_TRUSTED -2.82, AWL 2.20,
        UIO_MAIL_IS_INTERNAL -5.00)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 5


Version: 2.86.ds1-2

This bug was fixed with the upload of sysvinit version 2.86.ds1-2.
Not sure why this bug wasn't closed, but as a workaround I close it
no.  This was the changelog of the upload closing this bug.

 sysvinit (2.86.ds1-2) unstable; urgency=low
 .
   * This package is now maintained on Alioth as the pkg-sysvinit project.
   * Add myself as uploader.
   * Add support for linprocfs on kFreeBSD. Patch from Robert
     Millan. (Closes: #300963)
   * Rewrote /etc/mtab handling in mountvirtfs to work with SELinux.
     Based on patch from Luke Kenneth Casson Leighton.
     (Closes: #270919)
   * Add SELinux support to sysvinit on linux.  Add build-depend on
     libselinux1-dev and libsepol1-dev for all linux archs.  Patch from
     Manoj Srivastava, based on patch from Fedora.  (Closes: #242900,
     #249515,#315611)
   * Drop redundant build-depend on essensial package bash.
   * Add version 0.47 of startpar(8) program from SuSe.  Part of
     experimental parallel booting system.  Not included by default
     yet, as it tend to hang during boot.
   * Add support for starting init.d scripts on the same level in
     parallel, to speed up the boot process a bit.  Currently, only a
     simple system is implemented (and enabled by adding
     CONCURRENCY=shell in /etc/default/rcS).  This simple system messes
     up the script output during boot.  Disabled by default.  (Closes:
     #316290)
   * Add 'kdm xdm gdm $syslog' as conditional dependencies of
     rmnologin, to move it further back in the boot process.
   * Make sure bootlogd return non-error exit code after forking off
     the child.  (Closes: #326640)
   * Add more warning flags to list of compiler flags, to get more
     info about problematic code.
   * Avoid race-condition while fork()ing.  Patch from SuSe.
     (Closes: #327612)
   * Improve error message when fork() fail in init.  Patch from SuSe.
   * Avoid hardcoding tty name length in wall, use UT_LINESIZE instead.
     Patch from SuSe.
   * Force kernel to reschedule after killing processes.  Patch from SuSe.
   * Make sure killall never tries to kill init (pid 1).  Patch from SuSe.
   * Acknowledge NMUs.  (Closes: #30659, #85221, #204857, #225476,
     #247102, #248739 #252059, #267935, #269774, #269894, #272588,
     #272916, #273496, #277204, #281782, #284426, #286081, #287243,
     #288098, #289562, #295094, #295335, #296489, #300645, #311741,
     #314351, #316431, #317385, #317704, #318453, #318857, #323749,
     #325933, #326460, #326495, #326647)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to