Your message dated Wed, 13 Jul 2005 00:44:55 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#317720: udev still breaking silently has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 10 Jul 2005 23:53:50 +0000 >From [EMAIL PROTECTED] Sun Jul 10 16:53:50 2005 Return-path: <[EMAIL PROTECTED]> Received: from dsl-212-135-219-146.dsl.easynet.co.uk (bifrost.altair.nexus) [212.135.219.146] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DrlcL-0006Cj-00; Sun, 10 Jul 2005 16:53:49 -0700 Received: from mordor.altair.nexus (mordor.altair.nexus [192.168.1.64]) by bifrost.altair.nexus (8.11.5/8.11.5) with ESMTP id j6ANrHs18912; Mon, 11 Jul 2005 00:53:17 +0100 Received: from sauron by mordor.altair.nexus with local (Exim 3.36 #1 (Debian)) id 1Drlbp-00012e-00; Mon, 11 Jul 2005 00:53:17 +0100 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Mike Brodbelt <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: udev stops working without warning X-Mailer: reportbug 3.15 Date: Mon, 11 Jul 2005 00:53:17 +0100 Message-Id: <[EMAIL PROTECTED]> Sender: Mike Brodbelt <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: udev Version: 0.062-3 Severity: important After an apt-get upgrade, a new version of udev was installed. This version refuses to start without a kernel version of 2.6.12 or greater. I received no warning that this would happen, and substantial functionality on my system no longer works. In one sense this is trivial, as a kernel upgrade will fix it, but surely the package should warn users that this will happen, or refuse to install unless the running kernel is 2.6.12 or greater? Unwary users may see a lot break if their system is depedent on udev and it gets upgraded while the system's current kernel predates 2.6.12. Mike. -- Package-specific info: -- /etc/udev/rules.d/: /etc/udev/rules.d/: total 4 lrwxrwxrwx 1 root root 20 2005-04-24 18:58 020_permissions.rules -> ../permissions.rules lrwxrwxrwx 1 root root 12 2005-07-02 19:22 050_hal-plugdev.rules -> ../hal.rules lrwxrwxrwx 1 root root 19 2005-03-16 00:59 cd-aliases.rules -> ../cd-aliases.rules -rw-r--r-- 1 root root 1049 2005-03-31 01:26 local.rules lrwxrwxrwx 1 root root 13 2005-03-16 00:59 udev.rules -> ../udev.rules lrwxrwxrwx 1 root root 12 2005-07-04 00:16 z50_run.rules -> ../run.rules lrwxrwxrwx 1 root root 17 2005-07-04 00:16 z70_hotplugd.rules -> ../hotplugd.rules -- /sys/: /sys/block/fd0/dev /sys/block/hdd/dev /sys/block/loop0/dev /sys/block/loop1/dev /sys/block/loop2/dev /sys/block/loop3/dev /sys/block/loop4/dev /sys/block/loop5/dev /sys/block/loop6/dev /sys/block/loop7/dev /sys/block/md0/dev /sys/block/md1/dev /sys/block/md2/dev /sys/block/md3/dev /sys/block/md4/dev /sys/block/md5/dev /sys/block/md6/dev /sys/block/sda/dev /sys/block/sda/sda10/dev /sys/block/sda/sda1/dev /sys/block/sda/sda2/dev /sys/block/sda/sda3/dev /sys/block/sda/sda5/dev /sys/block/sda/sda6/dev /sys/block/sda/sda7/dev /sys/block/sda/sda8/dev /sys/block/sda/sda9/dev /sys/block/sdb/dev /sys/block/sdb/sdb10/dev /sys/block/sdb/sdb1/dev /sys/block/sdb/sdb2/dev /sys/block/sdb/sdb3/dev /sys/block/sdb/sdb5/dev /sys/block/sdb/sdb6/dev /sys/block/sdb/sdb7/dev /sys/block/sdb/sdb8/dev /sys/block/sdb/sdb9/dev /sys/block/sdc/dev /sys/block/sdc/sdc10/dev /sys/block/sdc/sdc1/dev /sys/block/sdc/sdc2/dev /sys/block/sdc/sdc3/dev /sys/block/sdc/sdc5/dev /sys/block/sdc/sdc6/dev /sys/block/sdc/sdc7/dev /sys/block/sdc/sdc8/dev /sys/block/sdc/sdc9/dev /sys/block/sdd/dev /sys/block/sdd/sdd10/dev /sys/block/sdd/sdd1/dev /sys/block/sdd/sdd2/dev /sys/block/sdd/sdd3/dev /sys/block/sdd/sdd5/dev /sys/block/sdd/sdd6/dev /sys/block/sdd/sdd7/dev /sys/block/sdd/sdd8/dev /sys/block/sdd/sdd9/dev /sys/block/sde/dev /sys/block/sdf/dev /sys/block/sdg/dev /sys/block/sdh/dev /sys/block/sdh/sdh1/dev /sys/class/drm/card0/dev /sys/class/input/mice/dev /sys/class/input/mouse0/dev /sys/class/misc/agpgart/dev /sys/class/misc/psaux/dev /sys/class/netlink/arpd/dev /sys/class/netlink/dnrtmsg/dev /sys/class/netlink/fwmonitor/dev /sys/class/netlink/ip6_fw/dev /sys/class/netlink/nflog/dev /sys/class/netlink/route6/dev /sys/class/netlink/route/dev /sys/class/netlink/skip/dev /sys/class/netlink/tap0/dev /sys/class/netlink/tap10/dev /sys/class/netlink/tap11/dev /sys/class/netlink/tap12/dev /sys/class/netlink/tap13/dev /sys/class/netlink/tap14/dev /sys/class/netlink/tap15/dev /sys/class/netlink/tap1/dev /sys/class/netlink/tap2/dev /sys/class/netlink/tap3/dev /sys/class/netlink/tap4/dev /sys/class/netlink/tap5/dev /sys/class/netlink/tap6/dev /sys/class/netlink/tap7/dev /sys/class/netlink/tap8/dev /sys/class/netlink/tap9/dev /sys/class/netlink/tcpdiag/dev /sys/class/netlink/usersock/dev /sys/class/netlink/xfrm/dev /sys/class/printer/lp0/dev /sys/class/scsi_generic/sg0/dev /sys/class/scsi_generic/sg1/dev /sys/class/scsi_generic/sg2/dev /sys/class/scsi_generic/sg3/dev /sys/class/scsi_generic/sg4/dev /sys/class/scsi_generic/sg5/dev /sys/class/scsi_generic/sg6/dev /sys/class/scsi_generic/sg7/dev /sys/class/scsi_generic/sg8/dev /sys/class/scsi_generic/sg9/dev /sys/class/scsi_tape/nst0a/dev /sys/class/scsi_tape/nst0/dev /sys/class/scsi_tape/nst0l/dev /sys/class/scsi_tape/nst0m/dev /sys/class/scsi_tape/st0a/dev /sys/class/scsi_tape/st0/dev /sys/class/scsi_tape/st0l/dev /sys/class/scsi_tape/st0m/dev /sys/class/sound/audio/dev /sys/class/sound/controlC0/dev /sys/class/sound/dmmidi/dev /sys/class/sound/dsp/dev /sys/class/sound/midiC0D0/dev /sys/class/sound/midi/dev /sys/class/sound/mixer/dev /sys/class/sound/pcmC0D0c/dev /sys/class/sound/pcmC0D0p/dev /sys/class/sound/pcmC0D3p/dev /sys/class/sound/seq/dev /sys/class/sound/sequencer2/dev /sys/class/sound/sequencer/dev /sys/class/sound/timer/dev -- Kernel configuration: isapnp_init not present. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11.3 Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1) Versions of packages udev depends on: ii hotplug 0.0.20040329-22 Linux Hotplug Scripts ii initscripts 2.86.ds1-1 Standard scripts needed for bootin ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an ii libselinux1 1.24-1 SELinux shared libraries ii makedev 2.3.1-78 creates device files in /dev ii sed 4.1.4-2 The GNU sed stream editor udev recommends no packages. -- no debconf information --------------------------------------- Received: (at 317720-done) by bugs.debian.org; 12 Jul 2005 22:45:04 +0000 >From [EMAIL PROTECTED] Tue Jul 12 15:45:04 2005 Return-path: <[EMAIL PROTECTED]> Received: from attila.bofh.it [213.92.8.2] (postfix) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DsTUu-0002Dm-00; Tue, 12 Jul 2005 15:45:04 -0700 Received: by attila.bofh.it (Postfix, from userid 10) id 0346A5F805; Wed, 13 Jul 2005 00:45:01 +0200 (CEST) Received: by wonderland.linux.it (Postfix, from userid 1001) id 1DC811C2DF; Wed, 13 Jul 2005 00:44:55 +0200 (CEST) Date: Wed, 13 Jul 2005 00:44:55 +0200 To: Josselin Mouette <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: Re: Bug#317720: udev still breaking silently Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="4SFOXa2GPu3tIq4H" Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> User-Agent: Mutt/1.5.9i From: [EMAIL PROTECTED] (Marco d'Itri) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --4SFOXa2GPu3tIq4H Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Jul 13, Josselin Mouette <[EMAIL PROTECTED]> wrote: > udev 0.062-4 still installs without a warning on my unstable box. You could at least have taken the time to read the changelog entry that closes this bug: "This will only affect upgrades from versions earlier than 0.060." The rationale is that if people already installed a >=3D 060 release then there is no point in delaying the upgrade to this one. > Oh, and please stop this madness. There aren't any 2.6.12 kernels in > unstable, there may not be for a while, and not everyone wants to lose Actually members of the kernel team hinted that they could be available in a couple of days. After fixing #317720 the situation of udev is not really different from libaspell, unstable is not guarantee to be installable the 100% of the time. > time to build his own kernel. Furthermore you're severely breaking > upgrades from sarge, and *that* won't go away with a new kernel. A tentative upgrade strategy from sarge to etch has been designed (first upgrade the kernel, reboot, continue with the upgrade) and will be reviewed at the appropriate time before etch will be frozen. As usual, the release team is being kept up-to-date. > If you're not able to cooperate with other developers - especially the > kernel maintainers - you should give away the maintainership of such > critical packages. There have already been several offers for help. I cooperate all the time with many maintainers, whose ideas and code have been integrated in my packages and vice-versa. If you think you have detailed ideas or code that will improve this package then feel free to share them (but do not blame me if they do not work). Please let me know if you have other concerns about this package. --=20 ciao, Marco --4SFOXa2GPu3tIq4H Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFC1EfnFGfw2OHuP7ERAg4yAKCb1gmyn+lykdELNMpPmYla4HoXKgCaAtHI G6zpmI2qkr+C6yrCCLjNd2g= =PCnt -----END PGP SIGNATURE----- --4SFOXa2GPu3tIq4H-- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]