From owner-freebsd-bugs Mon Dec 2 15:50:31 2002 Delivered-To: freebsd-bugs@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0A8EA37B401 for ; Mon, 2 Dec 2002 15:50:31 -0800 (PST) Received: from mailsrv.otenet.gr (mailsrv.otenet.gr [195.170.0.5]) by mx1.FreeBSD.org (Postfix) with ESMTP id EBE3343EE5 for ; Mon, 2 Dec 2002 15:50:29 -0800 (PST) (envelope-from keramida@ceid.upatras.gr) Received: from gothmog.gr (patr530-b125.otenet.gr [212.205.244.133]) by mailsrv.otenet.gr (8.12.6/8.12.6) with ESMTP id gB2NnrNd019020; Tue, 3 Dec 2002 01:50:07 +0200 (EET) Received: from gothmog.gr (gothmog [127.0.0.1]) by gothmog.gr (8.12.6/8.12.6) with ESMTP id gB2NnhBr002476; Tue, 3 Dec 2002 01:49:43 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Received: (from keramida@localhost) by gothmog.gr (8.12.6/8.12.6/Submit) id gB2NmwRD002441; Tue, 3 Dec 2002 01:48:58 +0200 (EET) (envelope-from keramida@ceid.upatras.gr) Date: Tue, 3 Dec 2002 01:48:58 +0200 From: Giorgos Keramidas To: Bruce Evans Cc: shelton@sentry.granch.ru, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/45906: mergemaster stops when kern.securelevel > 1 Message-ID: <20021202234858.GE613@gothmog.gr> References: <200212020838.gB28cjmh087292@freefall.freebsd.org> <20021202201116.L3546-100000@gamplex.bde.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20021202201116.L3546-100000@gamplex.bde.org> Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On 2002-12-02 20:15, Bruce Evans wrote: > On Mon, 2 Dec 2002, Giorgos Keramidas wrote: > > Synopsis: mergemaster stops when kern.securelevel > 1 > > > > This is not a bug. The documented way of upgrading from source > > includes booting into single-user mode before running mergemaster. > > When in single-user mode kern.securelevel hasn't been raised, yet. > > You will have no problems then. > > I disagree that this is not a bug. The emptyness of /var/empty is > mainly cosmetic. It has nothing to do with security. The cosmetic > part should be implemented using uchg if at all. I can reopen the PR, if you think that the problem it describes needs fixing. Or you can do it. I don't mind. I am not sure if /var/empty is the only spot where a multiuser installworld can fail with a raised kern.securelevel, but anyway :) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message