Debian Bug report logs -
#762018
systemd: v215 - rootfs left in read-only - not everytime
Reported by: Vaclav Ovsik <vaclav.ovsik@gmail.com>
Date: Wed, 17 Sep 2014 19:39:02 UTC
Severity: important
Merged with 762037
Found in version systemd/215-4
Fixed in version systemd/215-5
Done: Michael Biebl <biebl@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Wed, 17 Sep 2014 19:39:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Vaclav Ovsik <vaclav.ovsik@gmail.com>:
New Bug report received and forwarded. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Wed, 17 Sep 2014 19:39:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: systemd
Version: 215-4
Severity: normal
Dear Maintainer,
after update of systemd yesterday I'm getting non-deterministic problem
with startup. Root filesystem is probably left in the read-only state
and many services can't start (wicd, slim...).
Strange thing: when I try reboot (Windoze-like practice) - sometimes the
successful startup happen.
I found a workaround for me:
# login on the text console
mount -oremount,rw /
telinit 1
# and I simply hit <ENTER> to the question to enter rescue mode
bobek:~# journalctl -p err | head
-- Logs begin at Wed 2014-09-17 20:08:51 CEST, end at Wed 2014-09-17 21:22:09 CEST. --
Sep 17 20:08:51 bobek systemd-modules-load[293]: Failed to insert 'ipmi_si': No such device
Sep 17 20:08:51 bobek systemd[1]: Failed to start Load Kernel Modules.
Sep 17 20:08:53 bobek systemd-modules-load[1503]: Failed to insert 'ipmi_si': No such device
Sep 17 20:08:53 bobek systemd[1]: Failed to start Load Kernel Modules.
Sep 17 20:08:53 bobek systemd-udevd[353]: Error calling EVIOCSKEYCODE on device node '/dev/input/event16' (scan code 0x150, key code 190): Invalid argument
Sep 17 20:08:54 bobek systemd-tmpfiles[1964]: chmod(/var) failed: Read-only file system
Sep 17 20:08:54 bobek systemd-tmpfiles[1964]: chmod(/var/log) failed: Read-only file system
Sep 17 20:08:54 bobek systemd-tmpfiles[1964]: chmod(/var/lib) failed: Read-only file system
Sep 17 20:08:54 bobek systemd-tmpfiles[1964]: chmod(/var/lib/systemd) failed: Read-only file system
I have encrypted partitions with luks
bobek:~# cat /etc/crypttab
# <target device> <source device> <key file> <options>
root /dev/mapper/ssd-Eroot none discard,luks
swap /dev/mapper/ssd-Eswap /etc/keys/mykey discard,luks
home /dev/mapper/ssd-Ehome /etc/keys/mykey discard,luks
data /dev/mapper/ssd-Edata /etc/keys/mykey discard,luks
Any idea what should I try?
Thanks
--
Zito
-- Package-specific info:
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.16-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=cs_CZ.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages systemd depends on:
ii acl 2.2.52-2
ii adduser 3.113+nmu3
ii initscripts 2.88dsf-53.4
ii libacl1 2.2.52-2
ii libaudit1 1:2.4-1
ii libblkid1 2.20.1-5.8
ii libc6 2.19-11
ii libcap2 1:2.24-4
ii libcap2-bin 1:2.24-4
ii libcryptsetup4 2:1.6.6-1
ii libgcrypt11 1.5.4-3
ii libkmod2 18-1
ii liblzma5 5.1.1alpha+20120614-2
ii libpam0g 1.1.8-3.1
ii libselinux1 2.3-2
ii libsystemd0 215-4
ii sysv-rc 2.88dsf-53.4
ii udev 215-4
ii util-linux 2.20.1-5.8
Versions of packages systemd recommends:
ii dbus 1.8.6-2
ii libpam-systemd 215-4
Versions of packages systemd suggests:
pn systemd-ui <none>
-- no debconf information
[systemd-delta.txt (text/plain, attachment)]
[systemd-analyze-dump.txt (text/plain, attachment)]
[dsh-enabled.txt (text/plain, attachment)]
[fstab (text/plain, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Thu, 18 Sep 2014 18:21:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Sjoerd Simons <sjoerd@luon.net>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Thu, 18 Sep 2014 18:21:04 GMT) (full text, mbox, link).
Message #10 received at submit@bugs.debian.org (full text, mbox, reply):
On Wed, Sep 17, 2014 at 09:35:45PM +0200, Vaclav Ovsik wrote:
> Package: systemd
> Version: 215-4
> Severity: normal
>
> Dear Maintainer,
> after update of systemd yesterday I'm getting non-deterministic problem
> with startup. Root filesystem is probably left in the read-only state
> and many services can't start (wicd, slim...).
Are you using laptop-mode-tools ?
Sjoerd
--
If you have to hate, hate gently.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Thu, 18 Sep 2014 18:21:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Sjoerd Simons <sjoerd@luon.net>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Thu, 18 Sep 2014 18:21:12 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Fri, 19 Sep 2014 08:36:13 GMT) (full text, mbox, link).
Acknowledgement sent
to Václav Ovsík <vaclav.ovsik@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Fri, 19 Sep 2014 08:36:13 GMT) (full text, mbox, link).
Message #20 received at 762018@bugs.debian.org (full text, mbox, reply):
Hi,
On Thu, Sep 18, 2014 at 08:08:48PM +0200, Sjoerd Simons wrote:
>...
> Are you using laptop-mode-tools ?
Yes, I use laptop-mode-tools 1.65-2
I'm running on Dell Latitude E6520 with SSD 256GB.
I tried five reboots today, and one time the startup was successful
(read-write root). The rest startups was with read-only root.
bobek:~# lvs
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
Edata ssd -wi-ao---- 128.00g
Ehome ssd -wi-ao---- 20.00g
Eroot ssd -wi-ao---- 36.00g
Eswap ssd -wi-ao---- 8.00g
boot ssd -wi-ao---- 256.00m
LVs with `E' prefix uses LUKS
bobek:~# cat /etc/crypttab
# <target device> <source device> <key file> <options>
root /dev/mapper/ssd-Eroot none discard,luks
swap /dev/mapper/ssd-Eswap /etc/keys/mykey discard,luks
home /dev/mapper/ssd-Ehome /etc/keys/mykey discard,luks
data /dev/mapper/ssd-Edata /etc/keys/mykey discard,luks
I have removed ipmitool, so the service ipmievd is away (there was errors about
inserting ipmi_si module).
The log is now shorter, error messages at start are:
bobek:~# journalctl -p err|head
-- Logs begin at Fri 2014-09-19 09:44:06 CEST, end at Fri 2014-09-19 10:18:04 CEST. --
Sep 19 09:44:07 bobek systemd-udevd[358]: Error calling EVIOCSKEYCODE on device node '/dev/input/event16' (scan code 0x150, key code 190): Invalid argument
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var) failed: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/log) failed: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib) failed: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib/systemd) failed: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib/systemd/coredump) failed: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: Failed to create file /var/log/wtmp: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: Failed to create file /var/log/btmp: Read-only file system
Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/cache) failed: Read-only file system
Maybe the problem is about some race condition?
--
Zito
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Fri, 19 Sep 2014 12:03:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Sjoerd Simons <sjoerd@luon.net>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Fri, 19 Sep 2014 12:03:12 GMT) (full text, mbox, link).
Message #25 received at 762018@bugs.debian.org (full text, mbox, reply):
On Fri, 2014-09-19 at 10:33 +0200, Václav Ovsík wrote:
> Hi,
>
> On Thu, Sep 18, 2014 at 08:08:48PM +0200, Sjoerd Simons wrote:
> >...
> > Are you using laptop-mode-tools ?
>
> Yes, I use laptop-mode-tools 1.65-2
I'ts most likely laptop-mode-tools, can you remove it and let me know if
that helps?
> I'm running on Dell Latitude E6520 with SSD 256GB.
>
> I tried five reboots today, and one time the startup was successful
> (read-write root). The rest startups was with read-only root.
>
> bobek:~# lvs
> LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
> Edata ssd -wi-ao---- 128.00g
> Ehome ssd -wi-ao---- 20.00g
> Eroot ssd -wi-ao---- 36.00g
> Eswap ssd -wi-ao---- 8.00g
> boot ssd -wi-ao---- 256.00m
>
> LVs with `E' prefix uses LUKS
>
> bobek:~# cat /etc/crypttab
> # <target device> <source device> <key file> <options>
> root /dev/mapper/ssd-Eroot none discard,luks
> swap /dev/mapper/ssd-Eswap /etc/keys/mykey discard,luks
> home /dev/mapper/ssd-Ehome /etc/keys/mykey discard,luks
> data /dev/mapper/ssd-Edata /etc/keys/mykey discard,luks
>
>
> I have removed ipmitool, so the service ipmievd is away (there was errors about
> inserting ipmi_si module).
> The log is now shorter, error messages at start are:
>
> bobek:~# journalctl -p err|head
> -- Logs begin at Fri 2014-09-19 09:44:06 CEST, end at Fri 2014-09-19 10:18:04 CEST. --
> Sep 19 09:44:07 bobek systemd-udevd[358]: Error calling EVIOCSKEYCODE on device node '/dev/input/event16' (scan code 0x150, key code 190): Invalid argument
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var) failed: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/log) failed: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib) failed: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib/systemd) failed: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/lib/systemd/coredump) failed: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: Failed to create file /var/log/wtmp: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: Failed to create file /var/log/btmp: Read-only file system
> Sep 19 09:44:09 bobek systemd-tmpfiles[3284]: chmod(/var/cache) failed: Read-only file system
>
>
> Maybe the problem is about some race condition?
>
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>:
Bug#762018; Package systemd.
(Fri, 19 Sep 2014 13:33:19 GMT) (full text, mbox, link).
Acknowledgement sent
to Václav Ovsík <vaclav.ovsik@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>.
(Fri, 19 Sep 2014 13:33:19 GMT) (full text, mbox, link).
Message #30 received at 762018@bugs.debian.org (full text, mbox, reply):
On Fri, Sep 19, 2014 at 01:58:06PM +0200, Sjoerd Simons wrote:
>...
> I'ts most likely laptop-mode-tools, can you remove it and let me know if
> that helps?
I removed it and tried startup 3 times. All startups were successful.
I install laptop-mode-tools back and tried:
1. fail
2. ok
3. ok
4. fail
I removed it again and did a reboot. Startup was successful.
I will leave laptop-mode-tools removed now.
It really looks like there is some problem with it.
Thanks
--
Zito
Severity set to 'important' from 'normal'
Request was from Michael Biebl <biebl@debian.org>
to control@bugs.debian.org.
(Sun, 21 Sep 2014 20:21:19 GMT) (full text, mbox, link).
Merged 762018 762037
Request was from Michael Biebl <biebl@debian.org>
to control@bugs.debian.org.
(Sun, 21 Sep 2014 20:21:20 GMT) (full text, mbox, link).
Reply sent
to Michael Biebl <biebl@debian.org>:
You have taken responsibility.
(Sat, 27 Sep 2014 16:57:13 GMT) (full text, mbox, link).
Notification sent
to Vaclav Ovsik <vaclav.ovsik@gmail.com>:
Bug acknowledged by developer.
(Sat, 27 Sep 2014 16:57:14 GMT) (full text, mbox, link).
Message #39 received at 762018-close@bugs.debian.org (full text, mbox, reply):
Source: systemd
Source-Version: 215-5
We believe that the bug you reported is fixed in the latest version of
systemd, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 762018@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Biebl <biebl@debian.org> (supplier of updated systemd package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 27 Sep 2014 17:49:47 +0200
Source: systemd
Binary: systemd systemd-sysv libpam-systemd libsystemd0 libsystemd-dev libsystemd-login0 libsystemd-login-dev libsystemd-daemon0 libsystemd-daemon-dev libsystemd-journal0 libsystemd-journal-dev libsystemd-id128-0 libsystemd-id128-dev udev libudev1 libudev-dev udev-udeb libudev1-udeb libgudev-1.0-0 gir1.2-gudev-1.0 libgudev-1.0-dev python3-systemd systemd-dbg
Architecture: source amd64
Version: 215-5
Distribution: unstable
Urgency: medium
Maintainer: Debian systemd Maintainers <pkg-systemd-maintainers@lists.alioth.debian.org>
Changed-By: Michael Biebl <biebl@debian.org>
Description:
gir1.2-gudev-1.0 - libgudev-1.0 introspection data
libgudev-1.0-0 - GObject-based wrapper library for libudev
libgudev-1.0-dev - libgudev-1.0 development files
libpam-systemd - system and service manager - PAM module
libsystemd-daemon-dev - systemd utility library (transitional package)
libsystemd-daemon0 - systemd utility library (deprecated)
libsystemd-dev - systemd utility library - development files
libsystemd-id128-0 - systemd 128 bit ID utility library (deprecated)
libsystemd-id128-dev - systemd 128 bit ID utility library (transitional package)
libsystemd-journal-dev - systemd journal utility library (transitional package)
libsystemd-journal0 - systemd journal utility library (deprecated)
libsystemd-login-dev - systemd login utility library (transitional package)
libsystemd-login0 - systemd login utility library (deprecated)
libsystemd0 - systemd utility library
libudev-dev - libudev development files
libudev1 - libudev shared library
libudev1-udeb - libudev shared library (udeb)
python3-systemd - Python 3 bindings for systemd
systemd - system and service manager
systemd-dbg - system and service manager (debug symbols)
systemd-sysv - system and service manager - SysV links
udev - /dev/ and hotplug management daemon
udev-udeb - /dev/ and hotplug management daemon (udeb)
Closes: 761947 762018 762041 762146
Changes:
systemd (215-5) unstable; urgency=medium
.
[ Martin Pitt ]
* Unblacklist hyperv_fb again, it is needed for graphical support on Hyper-V
platforms. Thanks Andy Whitcroft! (LP: #1359933)
* Bump systemd-shim Depends/Breaks to 8-2 to ensure a lockstep upgrade.
(Closes: #761947)
.
[ Sjoerd Simons ]
* d/p/sd-bus-Accept-no-sender-as-the-destination-field.patch
+ Fix compatibility between systemctl v215 and v208. Resolves issue when
reloads of services is requested before systemd is re-execed
(Closes: #762146)
.
[ Michael Biebl ]
* Don't overmount existing /run/user/<UID> directories with a per-user tmpfs
on upgrades. (Closes: #762041)
* Re-enable mount propagation for udevd. This avoids that broken software
like laptop-mode-tools, which runs mount from within udev rules, causes
the root file system to end up read-only. (Closes: #762018)
Checksums-Sha1:
4cf62793d936a8a1e6be29f3110410fd090984c6 4108 systemd_215-5.dsc
d2085b0057c4d0df747d610da7454d18ae904f49 169532 systemd_215-5.debian.tar.xz
eb241193f2dbd4f64f116113f46eee0e44ce4a28 2527144 systemd_215-5_amd64.deb
b6630cb70494ae7e17c38b33a28031f7728ba8f9 28882 systemd-sysv_215-5_amd64.deb
eb377af217cc5cdc1d103e883875ec46a94b249e 118048 libpam-systemd_215-5_amd64.deb
79d2a30de7a8b7118cb2fcbd8a7f5c05331aacda 81850 libsystemd0_215-5_amd64.deb
722598f9226a5622cde43e1b7e4d2bffd1f5ea83 87870 libsystemd-dev_215-5_amd64.deb
657bd771e7b0006b7b6776a599013e04e86a36cc 41952 libsystemd-login0_215-5_amd64.deb
09eac02469870d658c1eff02caadecc64b119843 24562 libsystemd-login-dev_215-5_amd64.deb
665f6fafb22a31e454e93659ce16929e6c9a85c6 31146 libsystemd-daemon0_215-5_amd64.deb
fccce569aa6c8b28f7ab7a3f6ebcc0c990417e69 24574 libsystemd-daemon-dev_215-5_amd64.deb
b74775c26b7dc9780a42c8f992df295878a7529d 66992 libsystemd-journal0_215-5_amd64.deb
643c88089cbfcdaf78281ee5329abb1c81493579 24552 libsystemd-journal-dev_215-5_amd64.deb
8355acc7398fb25b419edf3decb6125efb2724ef 30044 libsystemd-id128-0_215-5_amd64.deb
831b38a90a138223c51bd23a031aa36ba9dacb1c 24552 libsystemd-id128-dev_215-5_amd64.deb
3760c145cafcb9c0fbedc27f9513a5e2298a4629 875788 udev_215-5_amd64.deb
7d00104cdfa4a4537b60565e840b7d8480db47c3 48968 libudev1_215-5_amd64.deb
ecd0c8394cd494774fa595d2f5e74c81cb0a69fd 23272 libudev-dev_215-5_amd64.deb
f0d21f8dbb150d73ebf0d3e6b5383b2ed8380e28 195512 udev-udeb_215-5_amd64.udeb
f6f756ea9cc3ba4d54046a1881d441c70b441e16 24614 libudev1-udeb_215-5_amd64.udeb
6e2117a39c145577d1c6ca4478848cdeb1be2500 34862 libgudev-1.0-0_215-5_amd64.deb
46bab30c7feb75d7236566878d9ba03c1456a5e5 2836 gir1.2-gudev-1.0_215-5_amd64.deb
3c440c6b18e94c4e71c539f4731cc216ed14beba 24530 libgudev-1.0-dev_215-5_amd64.deb
0736d8e282d01d8d314cec0ec331927e6dbdf56c 54372 python3-systemd_215-5_amd64.deb
3fcab52cc2000126ec7e831c017f1696c6efab40 15886768 systemd-dbg_215-5_amd64.deb
Checksums-Sha256:
77fa03cf7658fcf4686b60b8c9c76ca9f2c550a5c1d6110c9360f6b297eced47 4108 systemd_215-5.dsc
df4f8d4dafe8e0510b0dc16f31b50dc33b04863ccdd4f1111155038a3908066b 169532 systemd_215-5.debian.tar.xz
3ba4f79142044f1349ce036e225c9fba9dc3850d905b3be823b4fbe6760291ce 2527144 systemd_215-5_amd64.deb
c291034683a2ef5683101406cb0c54cd1bfdc5cbea1b4515649a9b68cfc91984 28882 systemd-sysv_215-5_amd64.deb
5b1df029296f67853422b3ee7fc1ebc2ce027dea6f9d77e3efcaa89d2d96763d 118048 libpam-systemd_215-5_amd64.deb
1100c61a1f24d2c7e3092fbdacc9b7072b7c8fceed6477d5a156c04baf09def1 81850 libsystemd0_215-5_amd64.deb
916b659ea37051f252c958b1737e7f0f0e1581d261947072d349fb4cc7e87386 87870 libsystemd-dev_215-5_amd64.deb
9a98110f7d425a3954b1d1219bbde17d5275d49cd48f2f92fcf4701729830fde 41952 libsystemd-login0_215-5_amd64.deb
ae76b6accc43ad9be1d7908bb8e55a63c30ea9560d23074b2e5147abd139ce05 24562 libsystemd-login-dev_215-5_amd64.deb
e9aed0c656bd330ffd6bd833125cfff01ad63fc8b457437e93c37db7714aebd6 31146 libsystemd-daemon0_215-5_amd64.deb
4eb42c7c8a5be1a66faf4ee126279945e0c1f32a61848d8e751c3dd6a373b7b9 24574 libsystemd-daemon-dev_215-5_amd64.deb
3b752cd21928a52d36e9d79519b8a698de2b164dd2529a4f6d0b017e47f45d47 66992 libsystemd-journal0_215-5_amd64.deb
f2aafe3418801caf64b01f2c324d8933c139a85d25c0fae683a3f45839daadc8 24552 libsystemd-journal-dev_215-5_amd64.deb
c926be831bf7490c7782a82b77631563487d7851433b3c029d14ec63d396e7a4 30044 libsystemd-id128-0_215-5_amd64.deb
b8720f659b301611fbef05e130aaa0a21cbcce3a15aec7dcd8b030c24c62dab7 24552 libsystemd-id128-dev_215-5_amd64.deb
261b77f272c10f47ad54fc99eac21e60561fb887a2b1fd9346971d466b58cd3a 875788 udev_215-5_amd64.deb
eb62cdd82997a1ad8c379dc0baf740b5d34228c8def58de7c6ea34a1fed1c115 48968 libudev1_215-5_amd64.deb
2ad417fb0f9f3f1907de5461a3b370b8aa4e7a31748653410c736f6a50064438 23272 libudev-dev_215-5_amd64.deb
35990222d85d59656c96f94d77f7f0f50bd70cb9cd4837949ad1884f203de0c0 195512 udev-udeb_215-5_amd64.udeb
4d722f64bf186cf8d3978d63c136e8bee9eb07722e3fd925aec1a248bea1b66a 24614 libudev1-udeb_215-5_amd64.udeb
998790bb0c78ae8d2427e82d7e1446894843194ce5855e82bd47e0830869f764 34862 libgudev-1.0-0_215-5_amd64.deb
17f6826501dd8d4320921abd081015e4a6fde58d2365f1fd4754a16fa4b80a20 2836 gir1.2-gudev-1.0_215-5_amd64.deb
2d84796e57a94a71332d76111b26df511271856a4146eb446db0b175dd8a5061 24530 libgudev-1.0-dev_215-5_amd64.deb
2a9c997a07f9445311296d7cd2969feb2da2f7987475bbbfdfae88c57d212255 54372 python3-systemd_215-5_amd64.deb
cfd22403bfb833a6d10c76925b3a774fd8cfb891af9482dd64dcce4bb1945c29 15886768 systemd-dbg_215-5_amd64.deb
Files:
2af0635754f249fb96307c274e8bfbd9 2527144 admin optional systemd_215-5_amd64.deb
44f01fd3aebcd1956019cccdfc3d6090 28882 admin extra systemd-sysv_215-5_amd64.deb
eec39333a3cda34a79fc0160033cfc9f 118048 admin optional libpam-systemd_215-5_amd64.deb
c99670acfff766955a05df987f5d2ece 81850 libs optional libsystemd0_215-5_amd64.deb
09279ecf40979e56167aa04afe47b947 87870 libdevel optional libsystemd-dev_215-5_amd64.deb
67c47b94fe9bf9a6697d181fcc32a228 41952 oldlibs extra libsystemd-login0_215-5_amd64.deb
6014f10b66eb89b57406eb6f0e3dbd3d 24562 oldlibs extra libsystemd-login-dev_215-5_amd64.deb
89f744d918fa53f60dd2beeb9c6c9260 31146 oldlibs extra libsystemd-daemon0_215-5_amd64.deb
86cc3cfdf0faca84025b9dc7063aa0b2 24574 oldlibs extra libsystemd-daemon-dev_215-5_amd64.deb
ffe75004d9a9eabd60548ed2aa249fc8 66992 oldlibs extra libsystemd-journal0_215-5_amd64.deb
f2dd797788a5678d109f9ae238d71aac 24552 oldlibs extra libsystemd-journal-dev_215-5_amd64.deb
559e727b9a56b9258a615182fbee39b4 30044 oldlibs extra libsystemd-id128-0_215-5_amd64.deb
47ed66dba44f5c414098dd701d741c66 24552 oldlibs extra libsystemd-id128-dev_215-5_amd64.deb
b816f16e78b5bed826924910961e36a8 875788 admin important udev_215-5_amd64.deb
dac06314cfef269042d394a246a64df8 48968 libs important libudev1_215-5_amd64.deb
35b34f474bf028a034e15e784d4905e5 23272 libdevel optional libudev-dev_215-5_amd64.deb
bd4c6d4f50980126abc802b078d07d27 195512 debian-installer optional udev-udeb_215-5_amd64.udeb
fba0bbc7bca38a4a1f274228b15d8ec6 24614 debian-installer optional libudev1-udeb_215-5_amd64.udeb
82b19faf26138fd25552ad3aa970c00b 34862 libs optional libgudev-1.0-0_215-5_amd64.deb
ac4d49b63c8cde04d937d6828c9b193a 2836 introspection optional gir1.2-gudev-1.0_215-5_amd64.deb
6f3697c4849be9fb152c53f587f50d50 24530 libdevel optional libgudev-1.0-dev_215-5_amd64.deb
5c86b04056485b0d66c589d6e4712b58 54372 python optional python3-systemd_215-5_amd64.deb
c93227db098c7c65f797eb760a6c23c7 15886768 debug extra systemd-dbg_215-5_amd64.deb
ae26bd2929c0e5b2039c46da71e33173 4108 admin optional systemd_215-5.dsc
5a8e8f2ab710b1159f8c58a9df3e24f6 169532 admin optional systemd_215-5.debian.tar.xz
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=/Eh1
-----END PGP SIGNATURE-----
Reply sent
to Michael Biebl <biebl@debian.org>:
You have taken responsibility.
(Sat, 27 Sep 2014 16:57:15 GMT) (full text, mbox, link).
Notification sent
to Gianluigi Tiesi <sherpya@netfarm.it>:
Bug acknowledged by developer.
(Sat, 27 Sep 2014 16:57:15 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 27 Oct 2014 07:28:20 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jan 10 01:27:11 2018;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.