Devuan bug report logs - #762
Debian removed essential startup scripts

version graph

Package: mdadm; Maintainer for mdadm is Mark Hindley <mark@hindley.org.uk>; Source for mdadm is src:mdadm.

Reported by: Klaus Ethgen <Klaus@ethgen.de>

Date: Tue, 13 Jun 2023 09:28:01 UTC

Severity: critical

Tags: debian

Found in version 4.2+20230508-2

Fixed in version 4.2+20230508-5devuan1

Done: dak@devuan.org

Forwarded to https://bugs.debian.org/1037496

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#762: Debian removed essential startup scripts
Reply-To: Mark Hindley <mark@hindley.org.uk>, 762@bugs.devuan.org
Resent-From: Mark Hindley <mark@hindley.org.uk>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: devuan-dev@lists.dyne.org
X-Loop: owner@bugs.devuan.org
Resent-Date: Tue, 20 Jun 2023 11:20:01 +0000
Resent-Message-ID: <handler.762.B762.168725988215419@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 762
X-Devuan-PR-Package: mdadm
X-Devuan-PR-Keywords: debian
References: <ZIg2J3uIx8y8flRM@ikki.ethgen.ch> <ZIg4iRaCPrFO5zp5@hindley.org.uk> <ZIg52BWE6xO0zVuQ@ikki.ethgen.ch> <ZIg7Smha47s3Fjai@hindley.org.uk> <ZIg9x9osh++39sfE@ikki.ethgen.ch> <ZIhpdGKbCMlZfRq8@hindley.org.uk> <ZIg2J3uIx8y8flRM@ikki.ethgen.ch>
Received: via spool by 762-submit@bugs.devuan.org id=B762.168725988215419
          (code B ref 762); Tue, 20 Jun 2023 11:20:01 +0000
Received: (at 762) by bugs.devuan.org; 20 Jun 2023 11:18:02 +0000
Delivered-To: bugs@devuan.org
Received: from email.devuan.org [2a01:4f8:140:32a1::58c6:6473]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Tue, 20 Jun 2023 11:18:02 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id e0aJAeOKkWRTVAAAmSBk0A
	(envelope-from <mark@hindley.org.uk>)
	for <bugs@devuan.org>; Tue, 20 Jun 2023 11:17:55 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id EDDB6416; Tue, 20 Jun 2023 11:17:54 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; envelope-from=mark@hindley.org.uk; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 31FA127
	for <762@bugs.devuan.org>; Tue, 20 Jun 2023 11:17:53 +0000 (UTC)
Received: from hindley.org.uk (apollo.hindleynet [192.168.1.3])
	by mx.hindley.org.uk (Postfix) with SMTP id E290069F;
	Tue, 20 Jun 2023 12:17:51 +0100 (BST)
Received: (nullmailer pid 15924 invoked by uid 1000);
	Tue, 20 Jun 2023 11:17:51 -0000
Date: Tue, 20 Jun 2023 12:17:51 +0100
From: Mark Hindley <mark@hindley.org.uk>
To: Klaus Ethgen <Klaus@ethgen.de>
Cc: 762@bugs.devuan.org
Message-ID: <ZJGK32ZDqq7Qbf2W@hindley.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <ZIhpdGKbCMlZfRq8@hindley.org.uk>
Klaus,

Could you please clarify the boot failure mode caused by the initscript
removal. We are pursuing this in Debian, but lorenzo has just pointed out that

On Tue, Jun 20, 2023 at 12:18:47PM +0200, lorenzo wrote:                                                                                                   
> Can you elaborate on this? I may be wrong, but I don't understand how the
> removal of mdadm script can render the system unbootable: the script runs
> mdadm in monitor mode and starts in runlevel 2. There is no script (removed)
> in runlevel S, I suspect a fail to boot will involve a problem in the kernel
> or in udev rules (that are still there)?

I have had a quick look and agree.

Is there some other change that has caused this? Or has the initramfs
integration broken. Have you edited the runlevels of the original initscripts?

Best wishes

Mark
-- 
Mark Hindley
GPG: 506C 15A4 2B0A F5A0 A854  23EE D28A 45BF 3287 D649

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sun Nov 24 11:57:09 2024;