|
Bugzilla – Full Text Bug Listing |
| Summary: | unbidden fsck on crypto-partition while installation | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE LINUX 10.0 | Reporter: | Christian Boltz <suse-beta> |
| Component: | Installation | Assignee: | Thomas Fehr <fehr> |
| Status: | RESOLVED INVALID | QA Contact: | Klaus Kämpf <kkaempf> |
| Severity: | Normal | ||
| Priority: | P5 - None | ||
| Version: | Beta 3 | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Christian Boltz
2005-08-31 07:12:33 UTC
The fsck should happen if you use YaST2 to integrate the encrypted fs into your system. The fsck is needed to determine which encryption type is used. Yes, it needs some time but it makes the detection process much more reliable. The options used for the fsck calls are so that the fsck does not try to repair anything but only returns if the fs is clean, so there should not be any possible damage by these calls. |