Your message dated Fri, 28 May 2010 10:02:57 +0000
with message-id <[email protected]>
and subject line Bug#583283: fixed in xen-3 3.4.3-1
has caused the Debian Bug report #583283,
regarding udev - Weird behaviour with device names including a slash
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
583283: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583283
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: udev
Version: 154-1
Severity: important
As udev wants to remove support to rename devices, I tried to change the
kernel today and install a device as "xen/evtchn". After the boot I
found the following:
| # udevadm info --query=all --path=/class/misc/xen\!evtchn
| P: /devices/virtual/misc/xen!evtchn
| N: xen/evtchn
| S: char/10:57
| E: UDEV_LOG=3
| E: DEVPATH=/devices/virtual/misc/xen!evtchn
| E: SUBSYSTEM=misc
| E: DEVNAME=/dev/xen/evtchn
| E: MAJOR=10
| E: MINOR=57
| E: DEVLINKS=/dev/char/10:57
| # ls -al /dev/xen
| total 0
| drwxr-xr-x 2 root root 40 Mai 26 20:56 .
| drwxr-xr-x 18 root root 4460 Mai 26 20:56 ..
The device themself is missing.
I can reproduce this with the following commands:
| # killall xenconsoled
| # umount /proc/xen
| # rmmod xen-evtchn
| # rmmod xenfs
| # invoke-rc.d xend start
Debug log:
| udevd-work[2634]: seq 1679 running
| udevd-work[2634]: device 0x136bc70 has devpath
'/devices/virtual/misc/xen!evtchn'
| udevd-work[2634]: LINK 'char/10:57' /lib/udev/rules.d/50-udev-default.rules:2
| kernel: [ 449.105592] Event-channel device installed.
| udevd-work[2634]: no node name set, will use kernel supplied name 'xen/evtchn'
| udevd-work[2634]: created db link (xen/evtchn char/10:57)
| udevd-work[2634]: creating device node '/dev/xen/evtchn', devnum=10:57,
mode=0660, uid=0, gid=0
| udevd-work[2634]: preserve file '/dev/xen/evtchn', because it has correct
dev_t
| udevd-work[2634]: set permissions /dev/xen/evtchn, 020660, uid=0, gid=0
| udevd-work[2634]: creating symlink '/dev/char/10:57' to '../xen/evtchn'
| udevd-work[2634]: passed -1 bytes to netlink monitor 0x136bb60
| udevd-work[2634]: seq 1679 processed with 0
However only doing a rmmod-insmod-cycle of xen-evtchn, it is there. May
this be a bug in devtmpfs?
Bastian
--
We have found all life forms in the galaxy are capable of superior
development.
-- Kirk, "The Gamesters of Triskelion", stardate 3211.7
--- End Message ---
--- Begin Message ---
Source: xen-3
Source-Version: 3.4.3-1
We believe that the bug you reported is fixed in the latest version of
xen-3, which is due to be installed in the Debian FTP archive:
libxen-dev_3.4.3-1_i386.deb
to main/x/xen-3/libxen-dev_3.4.3-1_i386.deb
libxenstore3.0_3.4.3-1_i386.deb
to main/x/xen-3/libxenstore3.0_3.4.3-1_i386.deb
xen-3_3.4.3-1.debian.tar.gz
to main/x/xen-3/xen-3_3.4.3-1.debian.tar.gz
xen-3_3.4.3-1.dsc
to main/x/xen-3/xen-3_3.4.3-1.dsc
xen-3_3.4.3.orig.tar.gz
to main/x/xen-3/xen-3_3.4.3.orig.tar.gz
xen-docs-3.4_3.4.3-1_all.deb
to main/x/xen-3/xen-docs-3.4_3.4.3-1_all.deb
xen-hypervisor-3.4-amd64_3.4.3-1_i386.deb
to main/x/xen-3/xen-hypervisor-3.4-amd64_3.4.3-1_i386.deb
xen-hypervisor-3.4-i386_3.4.3-1_i386.deb
to main/x/xen-3/xen-hypervisor-3.4-i386_3.4.3-1_i386.deb
xen-utils-3.4_3.4.3-1_i386.deb
to main/x/xen-3/xen-utils-3.4_3.4.3-1_i386.deb
xenstore-utils_3.4.3-1_i386.deb
to main/x/xen-3/xenstore-utils_3.4.3-1_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Blank <[email protected]> (supplier of updated xen-3 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Fri, 28 May 2010 11:43:18 +0200
Source: xen-3
Binary: xen-docs-3.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-3.4
xen-hypervisor-3.4-amd64 xen-hypervisor-3.4-i386
Architecture: source i386 all
Version: 3.4.3-1
Distribution: unstable
Urgency: low
Maintainer: Debian Xen Team <[email protected]>
Changed-By: Bastian Blank <[email protected]>
Description:
libxen-dev - Public headers and libs for Xen
libxenstore3.0 - Xenstore communications library for Xen
xen-docs-3.4 - Documentation for Xen
xen-hypervisor-3.4-amd64 - The Xen Hypervisor on AMD64
xen-hypervisor-3.4-i386 - The Xen Hypervisor on i386
xen-utils-3.4 - XEN administrative tools
xenstore-utils - Xenstore utilities for Xen
Closes: 583283
Changes:
xen-3 (3.4.3-1) unstable; urgency=low
.
* New upstream version.
* Disable blktap support, it is unusable with current kernels.
* Disable libaio, was only used by blktap.
* Drop device creation support. (closes: #583283)
Checksums-Sha1:
9cb66267abc60e864b23ca65fe00d16d7bba2680 1531 xen-3_3.4.3-1.dsc
5a633813b15a6bf178b51b55959dde1cd262ddc6 8386069 xen-3_3.4.3.orig.tar.gz
5c6e89cece8c9d96ded7a5acdf8d801673dd1520 33707 xen-3_3.4.3-1.debian.tar.gz
1ae7062e8b96f8de13408c24ceabf1efecf96971 576376
xen-hypervisor-3.4-amd64_3.4.3-1_i386.deb
ca9e8a3934f4267a9f1f63252f14ca8efd504fc7 513016
xen-hypervisor-3.4-i386_3.4.3-1_i386.deb
c58554c377498ee55c9f16fd32d3bc54e693c9af 1280710 xen-docs-3.4_3.4.3-1_all.deb
5c1fb7856732d4b67fb419a5b2d7cbf087dd384a 215670 libxen-dev_3.4.3-1_i386.deb
23acef1bb5e2a95560d2fb4e3dd6a3430fb9a709 19780 libxenstore3.0_3.4.3-1_i386.deb
0159bbfcf7b7099e34508eb477e05307ce7f89b6 17438 xenstore-utils_3.4.3-1_i386.deb
0b65a63dc40c340785398aa0b9cf1b4c2fae0223 809680 xen-utils-3.4_3.4.3-1_i386.deb
Checksums-Sha256:
ebb8caa2382ce9d8199a547a6bbfd7438f7c6f86543df704fed33eb25dd4deca 1531
xen-3_3.4.3-1.dsc
951fb26a2edfddb0ce8a01181188eca1d65f098ecacfd871d18d0bf373f20a72 8386069
xen-3_3.4.3.orig.tar.gz
59ad911d9e7abc17dd00c5f2e3cebc63688a2cd1a37ab5582c073b0979e8cbb2 33707
xen-3_3.4.3-1.debian.tar.gz
e058f3893c83e3f5081f28c722fb831875c43706747d31789e4ae266b4b78e7c 576376
xen-hypervisor-3.4-amd64_3.4.3-1_i386.deb
026c5e1130156bb0a98f71e25f3ad12845747d39728c059916179624879ed79b 513016
xen-hypervisor-3.4-i386_3.4.3-1_i386.deb
151ef03436342aa01e8e3bec2b28cf251cb474c1d49699ff935d2fd0268ef11f 1280710
xen-docs-3.4_3.4.3-1_all.deb
10928fa7d6f06c2d6e1bf9dfd8bc72745df043d7a58d8fcdc2687dbb26c1b80e 215670
libxen-dev_3.4.3-1_i386.deb
8e2908d3eaf3d8d193c5e89e8eed8060558d4f4643c13f8dd70a547fd3b8a7ef 19780
libxenstore3.0_3.4.3-1_i386.deb
66f57c8652207fa9ce0405824a85d3391287728a911b644b1bb394f9e5fc292a 17438
xenstore-utils_3.4.3-1_i386.deb
1f99c95332871f1e90fd12cc47b5a6afa346cfece1f4cbad5e9c173f69aa34de 809680
xen-utils-3.4_3.4.3-1_i386.deb
Files:
9ba9db03f2546fb08027bffc46bc08ca 1531 kernel optional xen-3_3.4.3-1.dsc
74f80e5196ed22b4215a8f671cb0d583 8386069 kernel optional
xen-3_3.4.3.orig.tar.gz
2c3def8d5fb797dfc34be0e534159eb1 33707 kernel optional
xen-3_3.4.3-1.debian.tar.gz
a0c20ea2ab1a82af6275e3b63a21557d 576376 kernel optional
xen-hypervisor-3.4-amd64_3.4.3-1_i386.deb
66060d2d9acb88fcd8c2cea16118cff8 513016 kernel optional
xen-hypervisor-3.4-i386_3.4.3-1_i386.deb
7b83def431198e4afbf79e098bad281a 1280710 doc optional
xen-docs-3.4_3.4.3-1_all.deb
b509c1d7df1c8d5c60411eaf7fd749f7 215670 libdevel optional
libxen-dev_3.4.3-1_i386.deb
00f1ba4ff831d7b8754aea7e39cc0811 19780 libs optional
libxenstore3.0_3.4.3-1_i386.deb
212aa845f701ea185e3f27ddf32ee627 17438 admin optional
xenstore-utils_3.4.3-1_i386.deb
1c5fcc6a8c0838fc208a280ab0a4c4e9 809680 kernel optional
xen-utils-3.4_3.4.3-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkv/kkkACgkQLkAIIn9ODhF42ACgt06uCCNWu5R1ynGcSxeAjabN
vnsAn12h2tJjEzBevtXX4/X1vfcSWpzw
=995E
-----END PGP SIGNATURE-----
--- End Message ---