From: Michael R. <mc...@sa...> - 2003-09-02 16:30:11
|
-----BEGIN PGP SIGNED MESSAGE----- >>>>> "Henrik" == Henrik Nordstrom <hn...@ma...> writes: Henrik> The rw mount option works fine here, but I am not using a full Henrik> system Henrik> image but an image primarily designed for read-only root so mount Henrik> is happy Henrik> in either case here.. I went back to 2.4.19 + patch 47, with the same boot scripts (i.e. rootfs=, not ubd0=) No problem there. Henrik> Verify the permissions again.. also try booting in a emergency Henrik> shell Henrik> (init=/bin/sh) to verify that it is not your system image which Henrik> remounts Henrik> the root read-only while booting.. Hmm. that's possible, but why would 2.4.19 not care? Let me try this hypothesis.... you are partly right. It looks like the only real complaint is that it can't open /etc/mtab~ at boot time, and it complains, and the /etc/mtab file isn't created properly: Mounted devfs on /dev INIT: version 2.78 booting Activating swap... can't open lock file /etc/mtab~: Permission denied (use -n flag to override) can't open lock file /etc/mtab~: Permission denied (use -n flag to override) ... /etc/mtab~ is created with mode 0, and this shows up in the host that way as well. Perhaps this is the real problem. Actually, I don't seem to be able to reproduce the read-only root now! I swear it was complaining that it couldn't write, because the file system was read only before. cassidy-[nightly/testing/klips/east-icmp-01] mcr 1141 %ls -lta /c2/freeswan/sandboxes/nightly/UMLPOOL/east/root/etc/mtab* - -rw-r--r-- 1 mcr mcr 0 Sep 2 12:24 /c2/freeswan/sandboxes/nightly/UMLPOOL/east/root/etc/mtab - ---------- 1 mcr mcr 0 Sep 2 12:24 /c2/freeswan/sandboxes/nightly/UMLPOOL/east/root/etc/mtab~ I tried removing the file in my boot script first, but that doesn't help. ] Out and about in Ottawa. hmmm... beer. | firewalls [ ] Michael Richardson, Sandelman Software Works, Ottawa, ON |net architect[ ] mc...@sa... http://www.sandelman.ottawa.on.ca/ |device driver[ ] panic("Just another Debian/notebook using, kernel hacking, security guy"); [ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) Comment: Finger me for keys - custom hacks make this fully PGP2 compat iQCVAwUBP1TFRIqHRg3pndX9AQEZjAQAxTM87CRMtT3dLR9XWK8kTruB4bITRONS tuPlUVq9Pp1cNUzwycKK2SIJqBfzOvlkNCI9TQ4B3mzsfS8zNQPdBXJk/Iyd6X7F VTmM91KMoPCmCwLihcxxT6Dx86rPo1vu9xc338wnkhjQ9/BkCuhQFZ5YgGKcGqjf /N7s/nDoB+U= =L/3s -----END PGP SIGNATURE----- |