Justin Pryzby wrote: > Our host system has /boot mounted readonly; this is checked by > /usr/sbin/update-initramfs. Building live images, this causes:
I'm not sure if I understand that right. The host systems filesystem (including /boot) is not used at all. > |$ grep -C2 -we updating ./binary.log > |P: Begin executing hacks... > |WARNING: /boot is ro mounted. > |update-initramfs: Not updating /boot/initrd.img-2.6.22-qi.foo > |P: Deconfiguring file /etc/kernel-img.conf This is done in the chroot stage, so, why is your chroot read-only? -- Address: Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist Email: [EMAIL PROTECTED] Internet: http://people.panthera-systems.net/~daniel-baumann/ _______________________________________________ debian-live-devel mailing list [email protected] http://lists.alioth.debian.org/mailman/listinfo/debian-live-devel

