Devuan bug report logs - #617
initscripts: brightness init script sets brightness to zero, thus blanking laptop display

version graph

Package: initscripts; Maintainer for initscripts is Devuan Developers <devuan-dev@lists.dyne.org>; Source for initscripts is src:sysvinit.

Reported by: Martin Steigerwald <martin@lichtvoll.de>

Date: Mon, 11 Oct 2021 16:22:02 UTC

Severity: normal

Tags: patch

Found in version 2.96-7+devuan1

Fixed in version 3.06-4devuan3

Done: dak@devuan.org

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#617: [devuan-dev] bug#617: bug#617: initscripts: brightness init script sets brightness to zero, thus blanking laptop display
Reply-To: Martin Steigerwald <martin@lichtvoll.de>, 617@bugs.devuan.org
Resent-From: Martin Steigerwald <martin@lichtvoll.de>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: Devuan Developers <devuan-dev@lists.dyne.org>
X-Loop: owner@bugs.devuan.org
Resent-Date: Wed, 22 Dec 2021 10:20:02 +0000
Resent-Message-ID: <handler.617.B617.16401683741856@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 617
X-Devuan-PR-Package: initscripts
X-Devuan-PR-Keywords: 
References: <163396916488.2227.13166665119512005807.reportbug@om.lichtvoll> <20211012171950.GF4446@asandir.lunixsys.com> <163396916488.2227.13166665119512005807.reportbug@om.lichtvoll>
Received: via spool by 617-submit@bugs.devuan.org id=B617.16401683741856
          (code B ref 617); Wed, 22 Dec 2021 10:20:02 +0000
Received: (at 617) by bugs.devuan.org; 22 Dec 2021 10:19:34 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 22 Dec 2021 10:19:34 +0000 (UTC)
Received: from mail.lichtvoll.de (luna.lichtvoll.de [194.150.191.11])
	by vm6.ganeti.dyne.org (Postfix) with ESMTP id C36F7F604B5
	for <617@bugs.devuan.org>; Wed, 22 Dec 2021 11:19:21 +0100 (CET)
Received: from ananda.localnet (unknown [IPv6:2001:a62:1a49:200:90e6:8e2f:a039:7b5e])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
	 key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384)
	(No client certificate requested)
	by mail.lichtvoll.de (Postfix) with ESMTPSA id 2E85A333E60;
	Wed, 22 Dec 2021 11:19:20 +0100 (CET)
From: Martin Steigerwald <martin@lichtvoll.de>
To: Mark Hindley <mark@hindley.org.uk>, 617@bugs.devuan.org, devuan developers internal list <devuan-dev@lists.dyne.org>
Cc: Jacob Lundberg <jacob@gnifty.net>
Date: Wed, 22 Dec 2021 11:19:17 +0100
Message-ID: <16580662.aHbKO4Mz0p@ananda>
In-Reply-To: <20211012171950.GF4446@asandir.lunixsys.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset="us-ascii"
Authentication-Results: mail.lichtvoll.de;
	auth=pass smtp.auth=martin2 smtp.mailfrom=martin@lichtvoll.de
X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=disabled
	version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
Dear Mark, dear Jacob

Jacob Lundberg - 12.10.21, 19:19:50 CET:
> On Tue, Oct 12, 2021 at 11:07:53AM +0100, Mark Hindley wrote:
> > At least you have a workaround that will avoid the issue for you
> > again. If you get any other ideas about clean fixes, do say.
> 
> Why not just refuse to *update* to 0 at shutdown.  It seems like 0 is
> a special case the user is fairly unlikely to have set it to themself
> (but if they do want 0 they are probably technical enough to update
> the setting file on their own).

I think that would be a good idea.

I'd really welcome this after I "bricked" another device due to exactly 
this bug. I needed to put GRML to an USB stick and boot from there in 
order to recover.

Have a relaxing, quiet and peaceful time, a merry Christmas!

Best,
-- 
Martin

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Fri Apr 19 05:11:37 2024;