Devuan bug report logs -
#527
udev rule for btrfs is not built correctly (fwd)
Reported by: Bodo Eggert <7eggert@online.de>
Date: Thu, 3 Dec 2020 22:03:01 UTC
Severity: normal
Found in version 3.2.7-6
Fixed in version 3.2.9-9
Done: dak@devuan.org
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to devuan-bugs@lists.dyne.org, Devuan Dev Team <devuan-dev@lists.dyne.org>
:
bug#527
; Package eudev
.
(Thu, 03 Dec 2020 22:03:01 GMT) (full text, mbox, link).
Acknowledgement sent
to Bodo Eggert <7eggert@online.de>
:
New bug report received and forwarded. Copy sent to Devuan Dev Team <devuan-dev@lists.dyne.org>
.
(Thu, 03 Dec 2020 22:03:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.devuan.org (full text, mbox, reply):
Package: eudev
Version: 3.2.7-6
This bug has been described here; too:
https://bugs.gentoo.org/show_bug.cgi?id=739268
tl;dr:
messages saying "Aug 27 16:30:50 MiniHTPC2 udevd[2291]: failed to execute
'/usr/lib/udev/${exec_prefix}/bin/udevadm' '${exec_prefix}/bin/udevadm
trigger -s block -p ID_BTRFS_READY=0': No such file or directory" do
appear in dmesg log (similar on my system, except for the host name)
To fix, ${exec_prefix} needs to be set in the build scripts
I fixed it locally; until then, the config files were original.
Effective local patch:
--- /lib/udev/rules.d/64-btrfs.rules~ 2019-02-09 13:22:24.000000000 +0100
+++ /lib/udev/rules.d/64-btrfs.rules 2020-11-16 15:02:07.720000000 +0100
@@ -11,6 +11,6 @@ IMPORT{builtin}="btrfs ready $devnode"
ENV{ID_BTRFS_READY}=="0", ENV{SYSTEMD_READY}="0"
# reconsider pending devices in case when multidevice volume awaits
-ENV{ID_BTRFS_READY}=="1", RUN+="${exec_prefix}/bin/udevadm trigger -s block -p ID_BTRFS_READY=0"
+ENV{ID_BTRFS_READY}=="1", RUN+="/bin/udevadm trigger -s block -p ID_BTRFS_READY=0"
LABEL="btrfs_end"
Have a nice day;
Bodo Eggert
Reply sent
to dak@devuan.org
:
You have taken responsibility.
(Sun, 28 Feb 2021 18:33:02 GMT) (full text, mbox, link).
Notification sent
to Bodo Eggert <7eggert@online.de>
:
bug acknowledged by developer.
(Sun, 28 Feb 2021 18:33:14 GMT) (full text, mbox, link).
Message #10 received at 527-done@bugs.devuan.org (full text, mbox, reply):
Version: 3.2.9-9
Source package eudev (3.2.9-9) added to Devuan suite unstable.
This closes bug report 527.
Thanks
DAK managing the Devuan archive
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 26 Feb 2021 13:49:24 +0100
Source: eudev
Architecture: source
Version: 3.2.9-9
Distribution: unstable
Urgency: medium
Maintainer: Devuan Dev Team <devuan-dev@lists.dyne.org>
Changed-By: Svante Signell <svante.signell@gmail.com>
Closes: 527 538 548
Changes:
eudev (3.2.9-9) unstable; urgency=medium
.
* debian/rules: Add --bindir=/bin to CONFFLAGS to fix path in 64-btrfs.rules.
Problem found upstream: https://bugs.gentoo.org/739268 (Closes: #527, #538)
* debian/eudev.postinst: Fix postinst when input, kvm or render groups, with
gid >= 1000 are present. Solution proposed by Bob Proulx <bob@proulx.com>
(Closes: #548)
Checksums-Sha1:
e390dd847746a1d010e72b83b784ad383ae54e2a 2345 eudev_3.2.9-9.dsc
fd2e0f54064a9f057016246749054007ab52fa0a 62368 eudev_3.2.9-9.debian.tar.xz
e7cb1a0ec0259c408de7dd9c7462090277f66a86 5154 eudev_3.2.9-9_source.buildinfo
Checksums-Sha256:
fe8b82f8727eea2e65ac3ab296a1971c5544380dc17064b21b0d3eea2d7a9b98 2345 eudev_3.2.9-9.dsc
69a0b9b8187f061fbc3b4365a294f2c9a8676fbeba35b1a2b7cbae827a8f7191 62368 eudev_3.2.9-9.debian.tar.xz
13b4a65fb342fa91c9da0c0dac342e5c556bb69b8a199232b856883b48e4aedd 5154 eudev_3.2.9-9_source.buildinfo
Files:
253dcad1ff87a0862224435eb81ef6fc 2345 admin optional eudev_3.2.9-9.dsc
665699c5a11e75f67223f9e13e9bcf46 62368 admin optional eudev_3.2.9-9.debian.tar.xz
900fc1146f86b024c22cfcce7f8f189c 5154 admin optional eudev_3.2.9-9_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEcuPLdzMV36LkZHQ9lFMhJFQZIvsFAmA720EACgkQlFMhJFQZ
IvuKPwf/dQl9prglyLhz/uBvMpfKV4XAfwFCfERl0Hbb2uEUeCGLe5sp/PoN1oiy
IVkrD9UcSD24U8mjneE7vps/Y1K2M5k1HsGPrhuey+us5MY/CvQCBC6jVOACEkE6
H2+h8FSb/qqapVpNVukY17PoqXayQ8ypQlfcTvH2UOXtdNPAwFfjwO/gKOCZ0IOa
EsPJ7Hrrsx1SRpiIkiMXiluz4B18XXT0+mT/GoWz9qcgOsZQxxD89MA1hKLN5VaA
N20kt2XP7SgLv6EJcqE1CyGJLoAGRxL/gZmkByNd5a07EfNnBllAPoxK/GmjUAZ9
RFPPjvnm4qV+7L8kHPKLYNfx/4Vefw==
=Ce4O
-----END PGP SIGNATURE-----
Send a report that this bug log contains spam.