Your message dated Wed, 25 May 2005 06:47:12 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#310479: fixed in lvm-common 1.5.19 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 25 May 2005 06:47:50 +0000 >From [EMAIL PROTECTED] Tue May 24 23:47:50 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.layline.de [217.31.17.130] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DapgD-0008Fo-00; Tue, 24 May 2005 23:47:49 -0700 Received: from rivendell (unknown [145.228.251.188]) by mail.layline.de (Postfix) with ESMTP id A2B417CBF for <[EMAIL PROTECTED]>; Wed, 25 May 2005 08:47:03 +0200 (CEST) From: "Michael Setzer" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: latest kernel-image-2.6.8-2-686 left system in unbootable state Date: Wed, 25 May 2005 08:46:41 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 1 (Highest) X-MSMail-Priority: High X-Mailer: Microsoft Office Outlook, Build 11.0.6353 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2527 Thread-Index: AcVg9YHYWdDOUNWTS4GpNKQh6DTX6w== Importance: High Message-Id: <[EMAIL PROTECTED]> X-layline-MailScanner: Found to be clean X-MailScanner-From: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_01,HAS_PACKAGE, MISSING_OUTLOOK_NAME,X_MSMAIL_PRIORITY_HIGH,X_PRIORITY_HIGH autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kernel-image-2.6.8-2-686 Version: 2.6.8-16 Severity: critical Justification: cannot boot anymore After upgrading my Sid with root on LVM with the latest kernel-image this morning I cannot boot anymore. It gives me messages on the boot console like [...] device-mapper: 4.1.0-ioctl (2003-12-10) initialised: [EMAIL PROTECTED] No program "vgchange" found for your current version of LVM SGI XFS with ACLs, security attributes, realtime, large block numbers, no debug enabled SGI XFS Quota Management subsystem pivot_root: No such file or directory /sbin/init: 432: cannot open dev/console: No such file Kernel panic: Attempted to kill init If you need more information do not hesitate to contact me. Regards, Michael --------------------------------------- Received: (at 310479-close) by bugs.debian.org; 25 May 2005 10:51:26 +0000 >From [EMAIL PROTECTED] Wed May 25 03:51:26 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DatTy-0007YZ-00; Wed, 25 May 2005 03:51:26 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DatPs-0003Cu-00; Wed, 25 May 2005 06:47:12 -0400 From: Patrick Caulfield <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#310479: fixed in lvm-common 1.5.19 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Wed, 25 May 2005 06:47:12 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: lvm-common Source-Version: 1.5.19 We believe that the bug you reported is fixed in the latest version of lvm-common, which is due to be installed in the Debian FTP archive: lvm-common_1.5.19.dsc to pool/main/l/lvm-common/lvm-common_1.5.19.dsc lvm-common_1.5.19.tar.gz to pool/main/l/lvm-common/lvm-common_1.5.19.tar.gz lvm-common_1.5.19_i386.deb to pool/main/l/lvm-common/lvm-common_1.5.19_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Patrick Caulfield <[EMAIL PROTECTED]> (supplier of updated lvm-common package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 25 May 2005 09:02:08 +0100 Source: lvm-common Binary: lvm-common Architecture: source i386 Version: 1.5.19 Distribution: unstable Urgency: low Maintainer: Patrick Caulfield <[EMAIL PROTECTED]> Changed-By: Patrick Caulfield <[EMAIL PROTECTED]> Description: lvm-common - The Logical Volume Manager for Linux (common files) Closes: 310479 Changes: lvm-common (1.5.19) unstable; urgency=low . * look for "vgchange" rather than "vgscan" as initrds only contain the former. Closes: #310479 Files: 505230c99d478289d91170d99943b3ad 470 admin optional lvm-common_1.5.19.dsc 1e7d57a2b176e39ec6bf9df29b1d9d06 14026 admin optional lvm-common_1.5.19.tar.gz b3441243976dd4fc992418f76f7c9fe5 15016 admin optional lvm-common_1.5.19_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFClDEfhej7/PCycRMRAmmQAKCgSUwT9QY59RdVv2UP15VkMmET/gCggiH9 nURbqWMCd+M27Afc6C0KMqs= =nE3H -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]