On Monday July 17, [EMAIL PROTECTED] wrote:
also sprach martin f krafft [EMAIL PROTECTED] [2006.07.08.0008 +0200]:
mdadm: --auto=yes requires a 'standard' md device name,
not /dev/.tmp.md0
I just saw an Ubuntu Breezy Live CD with mdadm 1.11.0 use
/dev/.tmp.md0 too... I think this
also sprach Neil Brown [EMAIL PROTECTED] [2006.07.18.0750 +0200]:
Earlier version of mdadm used that sort of name when nothing could be
found in /dev with the right device number. 2.5 and later don't use
that name any longer.
Ah, that fits in perfectly. Thanks, Neil!
So we just move to 2.5
Dear All,
I am having trouble installing Debian on a new system with an
Intel D945GNT motherboard, two Intel processors (3.2 GHz) and 2 SATA
disc drives. I'm using the first CD from a 14-pack I bought from a
distributor here in Australia. The problem is this: the CD boots
fine. The
On Tue, Jul 18, 2006 at 02:51:25AM +0200, Max Vozeler wrote:
3. Documentation: I can confirm that the checkfs-loop script (which
does the passphrase prompting for loop-AES partitions during
boot) now shows a full prompt including the mountpoint, format:
Setting up $loop ($mnt). This is good
On Mon, Jul 17, 2006 at 11:24:37PM -0500, Brent Burton wrote:
Joey Hess wrote:
The problem is that your laptop is not reliably reading the CD and the
Release file cannot be read. This generally results in the code that
snip/
At this point, of the 12 reboots of the netinst CD as well as
Processing commands for [EMAIL PROTECTED]:
clone 378651 -1 -2
Bug#378651: crypto installation report
Bug 378651 cloned as bugs 378687-378688.
retitle -1 Cipher modules for loop-AES need to be in /target/etc/modules
Bug#378687: crypto installation report
Changed Bug title.
reassign -1
Package: debian-installer
Severity: normal
Happens with the snapshot downloaded today from
http://cdimage.debian.org/cdimage/daily-builds/daily/arch-latest/i386/iso-cd/debian-testing-i386-netinst.iso
dated 20060716.
I partitioned with / being on an encrypted volume. base-installer then tries
to
On Tuesday 18 July 2006 02:51, Max Vozeler wrote:
1. The kernel module that provides the serpent cipher for
loop-AES was not automatically loaded during boot (loop_serpent).
As a result, the system booted up without interruption but also
without encrypted /tmp. Something in partman-crypto
On Tuesday 18 July 2006 02:51, Max Vozeler wrote:
We have a mechanism for that. See the 'register-module' script in
d-i-utils.
If the module needs to be available when the initrd is created, use:
Correction, this should read: if the module needs to be included in the
initrd.
On Tue, Jul 18, 2006 at 03:19:57PM +0200, Frans Pop wrote:
On Tuesday 18 July 2006 02:51, Max Vozeler wrote:
Something in partman-crypto needs to add the required modules to
/target/etc/modules; This applies to modules loop_twofish and
loop_serpent. I'm currently testing a change that adds
On Tuesday 18 July 2006 02:51, Max Vozeler wrote:
3. Documentation: I can confirm that the checkfs-loop script (which
does the passphrase prompting for loop-AES partitions during
boot) now shows a full prompt including the mountpoint, format:
Setting up $loop ($mnt). This is good on the one
Your message dated Tue, 18 Jul 2006 15:33:10 +0200
with message-id [EMAIL PROTECTED]
and subject line Bug#378697: debian-installer: netinst image misses cryptsetup
package
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If
On Tuesday 18 July 2006 15:29, Max Vozeler wrote:
Thanks for pointing this out. I've already commited the change,
but I will look into changing it to register-module. Does
register-module also work from scripts in finish-install.d? If
not we'd need to change the script in partman-crypto do
On 18/07/06, Debian Bug Tracking System [EMAIL PROTECTED] wrote:
Of course, the installation was done yesterday with an image built on
20060716 (July not June).
--
Regards,
EddyP
=
Imagination is more important than knowledge A.Einstein
--
To
Welcome visit our website:www.nikesaler.com
There are some details about it :
1,The shoes with top quality and good price , the price is including the
shipping cost .
2 , we send the products within 48 hours , and the delivery time is about 5 to
7 days.
3 , if you make big order.(the more the
Frans Pop [EMAIL PROTECTED] writes:
This was fixed on the 16th, so daily images later than that should have
the package included.
Ah, thanks!
FWIW, the businesscard image from the same day worked, as it did not
expect the cryptsetup package on the CD but downloaded it from the
net.
The
Accepted:
cdrom-core-modules-2.6.16-2-parisc-di_1.10_hppa.udeb
to
pool/main/l/linux-kernel-di-hppa-2.6/cdrom-core-modules-2.6.16-2-parisc-di_1.10_hppa.udeb
cdrom-core-modules-2.6.16-2-parisc64-di_1.10_hppa.udeb
to
Accepted:
acpi-modules-2.6.16-2-486-di_1.33_i386.udeb
to
pool/main/l/linux-kernel-di-i386-2.6/acpi-modules-2.6.16-2-486-di_1.33_i386.udeb
cdrom-core-modules-2.6.16-2-486-di_1.33_i386.udeb
to
pool/main/l/linux-kernel-di-i386-2.6/cdrom-core-modules-2.6.16-2-486-di_1.33_i386.udeb
linux-kernel-di-hppa-2.6_1.10_hppa.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-hppa-2.6_1.10.dsc
linux-kernel-di-hppa-2.6_1.10.tar.gz
kernel-image-2.6.16-2-parisc-di_1.10_hppa.udeb
nic-modules-2.6.16-2-parisc-di_1.10_hppa.udeb
linux-kernel-di-i386-2.6_1.33_i386.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-i386-2.6_1.33.dsc
linux-kernel-di-i386-2.6_1.33.tar.gz
kernel-image-2.6.16-2-486-di_1.33_i386.udeb
nic-modules-2.6.16-2-486-di_1.33_i386.udeb
Rejected: sata-modules-2.6.16-2-sparc64-di_1.12_sparc.udeb: has 9 file(s) with
a time stamp too far into the future (e.g. control [Tue Jul 18 20:40:21 2006]).
Rejected: plip-modules-2.6.16-2-sparc32-di_1.12_sparc.udeb: has 9 file(s) with
a time stamp too far into the future (e.g. control [Tue
linux-kernel-di-sparc-2.6_1.12_sparc.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-sparc-2.6_1.12.dsc
linux-kernel-di-sparc-2.6_1.12.tar.gz
kernel-image-2.6.16-2-sparc64-di_1.12_sparc.udeb
nic-modules-2.6.16-2-sparc64-di_1.12_sparc.udeb
linux-kernel-di-amd64-2.6_1.11_amd64.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-amd64-2.6_1.11.dsc
linux-kernel-di-amd64-2.6_1.11.tar.gz
kernel-image-2.6.16-2-amd64-generic-di_1.11_amd64.udeb
nic-modules-2.6.16-2-amd64-generic-di_1.11_amd64.udeb
Accepted:
acpi-modules-2.6.16-2-amd64-generic-di_1.11_amd64.udeb
to
pool/main/l/linux-kernel-di-amd64-2.6/acpi-modules-2.6.16-2-amd64-generic-di_1.11_amd64.udeb
cdrom-core-modules-2.6.16-2-amd64-generic-di_1.11_amd64.udeb
to
Accepted:
crypto-modules-2.6.16-2-s390-di_0.05_s390.udeb
to
pool/main/l/linux-kernel-di-s390-2.6/crypto-modules-2.6.16-2-s390-di_0.05_s390.udeb
dasd-modules-2.6.16-2-s390-di_0.05_s390.udeb
to
pool/main/l/linux-kernel-di-s390-2.6/dasd-modules-2.6.16-2-s390-di_0.05_s390.udeb
linux-kernel-di-s390-2.6_0.05_s390.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-s390-2.6_0.05.dsc
linux-kernel-di-s390-2.6_0.05.tar.gz
kernel-image-2.6.16-2-s390-di_0.05_s390.udeb
nic-modules-2.6.16-2-s390-di_0.05_s390.udeb
Accepted:
partman-crypto-dm_8_all.udeb
to pool/main/p/partman-crypto/partman-crypto-dm_8_all.udeb
partman-crypto-loop_8_all.udeb
to pool/main/p/partman-crypto/partman-crypto-loop_8_all.udeb
partman-crypto_8.dsc
to pool/main/p/partman-crypto/partman-crypto_8.dsc
partman-crypto_8.tar.gz
to
Accepted:
cdrom-core-modules-2.6.16-2-sparc32-di_1.12_sparc.udeb
to
pool/main/l/linux-kernel-di-sparc-2.6/cdrom-core-modules-2.6.16-2-sparc32-di_1.12_sparc.udeb
cdrom-core-modules-2.6.16-2-sparc64-di_1.12_sparc.udeb
to
linux-kernel-di-sparc-2.6_1.12_sparc.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-sparc-2.6_1.12.dsc
linux-kernel-di-sparc-2.6_1.12.tar.gz
kernel-image-2.6.16-2-sparc64-di_1.12_sparc.udeb
nic-modules-2.6.16-2-sparc64-di_1.12_sparc.udeb
partman-crypto_8_i386.changes uploaded successfully to localhost
along with the files:
partman-crypto_8.dsc
partman-crypto_8.tar.gz
partman-crypto-dm_8_all.udeb
partman-crypto-loop_8_all.udeb
partman-crypto_8_i386.udeb
Greetings,
Your Debian queue daemon
--
To UNSUBSCRIBE,
Accepted:
crypto-modules-2.6.16-2-amiga-di_0.76_m68k.udeb
to
pool/main/l/linux-kernel-di-m68k-2.6/crypto-modules-2.6.16-2-amiga-di_0.76_m68k.udeb
crypto-modules-2.6.16-2-atari-di_0.76_m68k.udeb
to
pool/main/l/linux-kernel-di-m68k-2.6/crypto-modules-2.6.16-2-atari-di_0.76_m68k.udeb
Your message dated Tue, 18 Jul 2006 10:32:21 -0700
with message-id [EMAIL PROTECTED]
and subject line Bug#378687: fixed in partman-crypto 8
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now
Package: installation-reports
Boot method: netinst CD
Image version:
http://cdimage.debian.org/cdimage/etch_di_beta2/i386/iso-cd/debian-testing-i386-netinst.iso
Date: July 18 2006
Machine: custom built by myself, MSI MS-7025 / K8N Neo2 Platinum,
Nforce3 250Gb chipset
Processor: Athlon64 3200
linux-kernel-di-m68k-2.6_0.76_m68k.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-m68k-2.6_0.76.dsc
linux-kernel-di-m68k-2.6_0.76.tar.gz
kernel-image-2.6.16-2-amiga-di_0.76_m68k.udeb
nic-shared-modules-2.6.16-2-amiga-di_0.76_m68k.udeb
Accepted:
affs-modules-2.6.16-2-powerpc-di_1.19_powerpc.udeb
to
pool/main/l/linux-kernel-di-powerpc-2.6/affs-modules-2.6.16-2-powerpc-di_1.19_powerpc.udeb
affs-modules-2.6.16-2-powerpc-miboot-di_1.19_powerpc.udeb
to
linux-kernel-di-powerpc-2.6_1.19_powerpc.changes uploaded successfully to
localhost
along with the files:
linux-kernel-di-powerpc-2.6_1.19.dsc
linux-kernel-di-powerpc-2.6_1.19.tar.gz
kernel-image-2.6.16-2-powerpc-di_1.19_powerpc.udeb
nic-modules-2.6.16-2-powerpc-di_1.19_powerpc.udeb
FYI: The status of the tasksel source package
in Debian's testing distribution has changed.
Previous version: 2.48
Current version: 2.50
--
This email is automatically generated; [EMAIL PROTECTED] is responsible.
See http://people.debian.org/~henning/trille/ for more information.
--
To
Package: debian-installer
Version: Etch daily build 17 July 2006
I am the person who had trouble with the 2.4.27 kernel in bugs 258500 (now
closed) and 286939. This is a new (but related) bug - I'm reinstalling to
the same machine after a big repartioning exercise.
The latest installer boots
retitle 378790
severity 378790 Please add dmraid support
thanks
On Tuesday 18 July 2006 23:13, Chris Carr wrote:
Unfortunately sda and sdb are striped into a medley ataraid array -
the medley.o driver was required in 2.4 kernels, but now the device
mapper is used instead. The CD contains the
--- partman-crypto.xml 2006-07-09 21:21:07.0 +0200
+++ partman-crypto.xml.workingcopy 2006-07-18
16:29:09.0 +0200
@@ -62,7 +62,7 @@
/parapara
-First, let's have a look at available options available when you
+First, let's have a look at the options available when you
Your message dated Wed, 19 Jul 2006 00:08:50 +0200
with message-id [EMAIL PROTECTED]
and subject line Bug#378790: Latest Etch installer fails to load device mapper
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is
linux-kernel-di-ia64-2.6_1.8_ia64.changes uploaded successfully to localhost
along with the files:
linux-kernel-di-ia64-2.6_1.8.dsc
linux-kernel-di-ia64-2.6_1.8.tar.gz
kernel-image-2.6.16-2-itanium-smp-di_1.8_ia64.udeb
nic-modules-2.6.16-2-itanium-smp-di_1.8_ia64.udeb
Accepted:
acpi-modules-2.6.16-2-itanium-smp-di_1.8_ia64.udeb
to
pool/main/l/linux-kernel-di-ia64-2.6/acpi-modules-2.6.16-2-itanium-smp-di_1.8_ia64.udeb
cdrom-core-modules-2.6.16-2-itanium-smp-di_1.8_ia64.udeb
to
43 matches
Mail list logo