Justin Pryzby wrote:
> Our host system has /boot mounted readonly; this is checked by
> /usr/sbin/update-initramfs.  Building live images, this causes:

I'm not sure if I understand that right. The host systems filesystem
(including /boot) is not used at all.

> |$ grep -C2 -we updating ./binary.log 
> |P: Begin executing hacks...
> |WARNING: /boot is ro mounted.
> |update-initramfs: Not updating /boot/initrd.img-2.6.22-qi.foo
> |P: Deconfiguring file /etc/kernel-img.conf

This is done in the chroot stage, so, why is your chroot read-only?

-- 
Address:        Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email:          [EMAIL PROTECTED]
Internet:       http://people.panthera-systems.net/~daniel-baumann/

_______________________________________________
debian-live-devel mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/debian-live-devel

Reply via email to