Your message dated Wed, 25 May 2005 06:47:12 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#310479: fixed in lvm-common 1.5.19
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 25 May 2005 06:47:50 +0000
>From [EMAIL PROTECTED] Tue May 24 23:47:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mail.layline.de [217.31.17.130] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DapgD-0008Fo-00; Tue, 24 May 2005 23:47:49 -0700
Received: from rivendell (unknown [145.228.251.188])
        by mail.layline.de (Postfix) with ESMTP id A2B417CBF
        for <[EMAIL PROTECTED]>; Wed, 25 May 2005 08:47:03 +0200 (CEST)
From: "Michael Setzer" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: latest kernel-image-2.6.8-2-686 left system in unbootable state
Date: Wed, 25 May 2005 08:46:41 +0200
MIME-Version: 1.0
Content-Type: text/plain;
        charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 1 (Highest)
X-MSMail-Priority: High
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2527
Thread-Index: AcVg9YHYWdDOUNWTS4GpNKQh6DTX6w==
Importance: High
Message-Id: <[EMAIL PROTECTED]>
X-layline-MailScanner: Found to be clean
X-MailScanner-From: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_01,HAS_PACKAGE,
        MISSING_OUTLOOK_NAME,X_MSMAIL_PRIORITY_HIGH,X_PRIORITY_HIGH 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-image-2.6.8-2-686
Version: 2.6.8-16
Severity: critical
Justification: cannot boot anymore

After upgrading my Sid with root on LVM with the latest kernel-image this
morning I cannot boot anymore. It gives me messages on the boot console like

[...]
device-mapper: 4.1.0-ioctl (2003-12-10) initialised: [EMAIL PROTECTED]
No program "vgchange" found for your current version of LVM
SGI XFS with ACLs, security attributes, realtime, large block numbers, no
debug enabled
SGI XFS Quota Management subsystem
pivot_root: No such file or directory
/sbin/init: 432: cannot open dev/console: No such file
Kernel panic: Attempted to kill init

If you need more information do not hesitate to contact me.

Regards, Michael


---------------------------------------
Received: (at 310479-close) by bugs.debian.org; 25 May 2005 10:51:26 +0000
>From [EMAIL PROTECTED] Wed May 25 03:51:26 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DatTy-0007YZ-00; Wed, 25 May 2005 03:51:26 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DatPs-0003Cu-00; Wed, 25 May 2005 06:47:12 -0400
From: Patrick Caulfield <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#310479: fixed in lvm-common 1.5.19
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 25 May 2005 06:47:12 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: lvm-common
Source-Version: 1.5.19

We believe that the bug you reported is fixed in the latest version of
lvm-common, which is due to be installed in the Debian FTP archive:

lvm-common_1.5.19.dsc
  to pool/main/l/lvm-common/lvm-common_1.5.19.dsc
lvm-common_1.5.19.tar.gz
  to pool/main/l/lvm-common/lvm-common_1.5.19.tar.gz
lvm-common_1.5.19_i386.deb
  to pool/main/l/lvm-common/lvm-common_1.5.19_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Patrick Caulfield <[EMAIL PROTECTED]> (supplier of updated lvm-common package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 25 May 2005 09:02:08 +0100
Source: lvm-common
Binary: lvm-common
Architecture: source i386
Version: 1.5.19
Distribution: unstable
Urgency: low
Maintainer: Patrick Caulfield <[EMAIL PROTECTED]>
Changed-By: Patrick Caulfield <[EMAIL PROTECTED]>
Description: 
 lvm-common - The Logical Volume Manager for Linux (common files)
Closes: 310479
Changes: 
 lvm-common (1.5.19) unstable; urgency=low
 .
   * look for "vgchange" rather than "vgscan" as initrds only contain the 
former.
     Closes: #310479
Files: 
 505230c99d478289d91170d99943b3ad 470 admin optional lvm-common_1.5.19.dsc
 1e7d57a2b176e39ec6bf9df29b1d9d06 14026 admin optional lvm-common_1.5.19.tar.gz
 b3441243976dd4fc992418f76f7c9fe5 15016 admin optional 
lvm-common_1.5.19_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFClDEfhej7/PCycRMRAmmQAKCgSUwT9QY59RdVv2UP15VkMmET/gCggiH9
nURbqWMCd+M27Afc6C0KMqs=
=nE3H
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to