Package: libpam-mount Version: 2.3-1 Severity: normal Hi,
I'm not really sure if it's still an issue, but the last time the fsck, started by mount.crypt, did a check of the filesystem I hit ctrl-c to stop it, but this killed only mount.crypt, not fsck. You should check if sigint is handled by mount.crypt and passed to fsck. Because it's allowed to interrupt fsck (see allow_cancellation in e2fsck.conf(5)), mount.crypt should not stop if it get sigint during fsck run. It should only stop if fsck fails and before and after fsck run. Bye, Jörg. -- System Information: Debian Release: unstable/experimental APT prefers unstable APT policy: (900, 'unstable'), (700, 'experimental') Architecture: powerpc (ppc) Kernel: Linux 2.6.34 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libpam-mount depends on: ii libc6 2.10.2-9 Embedded GNU C Library: Shared lib ii libcryptsetup1 2:1.1.0-2.1 libcryptsetup shared library ii libhx22 3.4-1 A library providing queue, tree, I ii libpam-runtime 1.1.1-3 Runtime support for the PAM librar ii libpam0g 1.1.1-3 Pluggable Authentication Modules l ii libssl0.9.8 0.9.8n-1 SSL shared libraries ii libxml2 2.7.7.dfsg-2 GNOME XML library ii mount 2.17.2-2 Tools for mounting and manipulatin libpam-mount recommends no packages. Versions of packages libpam-mount suggests: pn davfs2 <none> (no description available) ii fuse-utils 2.8.1-1.2 Filesystem in USErspace (utilities ii lsof 4.81.dfsg.1-1 List open files pn ncpfs <none> (no description available) ii openssl 0.9.8n-1 Secure Socket Layer (SSL) binary a ii psmisc 22.11-1 utilities that use the proc file s ii smbfs 2:4.1-1 Common Internet File System utilit pn sshfs <none> (no description available) pn tc-utils <none> (no description available) pn xfsprogs <none> (no description available) -- Configuration Files: /etc/security/pam_mount.conf.xml changed [not included] -- debconf information excluded
signature.asc
Description: Digital signature http://en.wikipedia.org/wiki/OpenPGP