Your message dated Sun, 15 May 2005 22:47:09 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#308399: fixed in openafs 1.3.82-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 May 2005 00:45:09 +0000
>From [EMAIL PROTECTED] Mon May 09 17:45:09 2005
Return-path: <[EMAIL PROTECTED]>
Received: from mailgate02.slac.stanford.edu [134.79.18.92] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DVIs1-00022m-00; Mon, 09 May 2005 17:45:09 -0700
Received: from localhost.localdomain (dhcpvisitor21889.slac.stanford.edu 
[198.129.218.89])
        by mailgate02.slac.stanford.edu (8.12.11/8.12.11) with ESMTP id 
j4A0j7OJ029339;
        Mon, 9 May 2005 17:45:08 -0700 (PDT)
        (envelope-from [EMAIL PROTECTED])
Received: from pclark by localhost.localdomain with local (Exim 4.50)
        id 1DVIs0-0003lP-Pc; Mon, 09 May 2005 17:45:08 -0700
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: "Philip J. Clark" <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: openafs-client: openafs wont shutdown in kernel 2.6.12-rc3
X-Mailer: reportbug 3.11
Date: Mon, 09 May 2005 17:45:08 -0700
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: openafs-client
Version: 1.3.81-5
Severity: grave
Justification: renders package unusable

Openafs wont shutdown. Using Debian unstable, kernel 2.6.12-rc3 and 
openafs-modules-source 1.3.81-5. There is a thread on the openafs-devel list 
about it:-
https://lists.openafs.org/pipermail/openafs-devel/2005-April/011994.html
Essentially, this is grave because you are unable to shutdown Linux after this
has occurred. This makes the package unusable since it requires a hard reboot 
and possible loss of data. There is apparently a fix by enabling CONFIG_SMP in 
the kernel, but for single processor machines this may result in a significant 
slow down.


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.12-rc3
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)

Versions of packages openafs-client depends on:
ii  debconf [debconf-2 1.4.49                Debian configuration management sy
ii  libc6              2.3.2.ds1-21          GNU C Library: Shared libraries an
ii  libncurses5        5.4-4                 Shared libraries for terminal hand
ii  openafs-modules-2. 1.3.81-5+2.6.12-rc3-8 The AFS distributed filesystem- Ke
ii  openafs-modules-so 1.3.81-5              The AFS distributed filesystem- Mo

-- debconf information:
* openafs-client/fakestat: true
* openafs-client/afsdb: true
* openafs-client/run-client: false
* openafs-client/dynroot: true
* openafs-client/crypt: true
* openafs-client/thiscell: slac.stanford.edu
* openafs-client/cachesize: 50000
  openafs-client/cell-info:

---------------------------------------
Received: (at 308399-close) by bugs.debian.org; 16 May 2005 02:54:02 +0000
>From [EMAIL PROTECTED] Sun May 15 19:54:02 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DXVk1-0002zt-00; Sun, 15 May 2005 19:54:02 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DXVdN-0000iZ-00; Sun, 15 May 2005 22:47:09 -0400
From: Russ Allbery <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#308399: fixed in openafs 1.3.82-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 15 May 2005 22:47:09 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 7

Source: openafs
Source-Version: 1.3.82-1

We believe that the bug you reported is fixed in the latest version of
openafs, which is due to be installed in the Debian FTP archive:

libopenafs-dev_1.3.82-1_i386.deb
  to pool/main/o/openafs/libopenafs-dev_1.3.82-1_i386.deb
libpam-openafs-kaserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/libpam-openafs-kaserver_1.3.82-1_i386.deb
openafs-client_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-client_1.3.82-1_i386.deb
openafs-dbserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-dbserver_1.3.82-1_i386.deb
openafs-fileserver_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-fileserver_1.3.82-1_i386.deb
openafs-kpasswd_1.3.82-1_i386.deb
  to pool/main/o/openafs/openafs-kpasswd_1.3.82-1_i386.deb
openafs-modules-source_1.3.82-1_all.deb
  to pool/main/o/openafs/openafs-modules-source_1.3.82-1_all.deb
openafs_1.3.82-1.diff.gz
  to pool/main/o/openafs/openafs_1.3.82-1.diff.gz
openafs_1.3.82-1.dsc
  to pool/main/o/openafs/openafs_1.3.82-1.dsc
openafs_1.3.82.orig.tar.gz
  to pool/main/o/openafs/openafs_1.3.82.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Russ Allbery <[EMAIL PROTECTED]> (supplier of updated openafs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----

Format: 1.7
Date: Tue, 10 May 2005 21:09:55 -0700
Source: openafs
Binary: openafs-client libopenafs-dev openafs-dbserver openafs-modules-source 
openafs-fileserver openafs-kpasswd libpam-openafs-kaserver
Architecture: source i386 all
Version: 1.3.82-1
Distribution: unstable
Urgency: medium
Maintainer: Sam Hartman <[EMAIL PROTECTED]>
Changed-By: Russ Allbery <[EMAIL PROTECTED]>
Description: 
 libopenafs-dev - The AFS distributed filesystem- development libraries
 libpam-openafs-kaserver - The AFS distributed filesystem- kaserver PAM module
 openafs-client - The AFS distributed filesystem- client support
 openafs-dbserver - The AFS distributed filesystem- database server
 openafs-fileserver - The AFS distributed filesystem- file server
 openafs-kpasswd - The AFS distributed filesystem- old password changing
 openafs-modules-source - The AFS distributed filesystem- Module Sources
Closes: 225907 253168 303495 304040 307699 308399 308844
Changes: 
 openafs (1.3.82-1) unstable; urgency=medium
 .
   * New upstream version.  (Closes: #307699)
     - Proper locking for preempt kernels.  This bug manifested as an
       inability to shut down AFS cleanly.  (Closes: #308399, #304040)
     - Correctly handle the inotify semaphore.  (Closes: #303495)
   * Repackage upstream to remove MacOS-specific files covered by the APSL.
     Remove the WINNT directory to save space since we have to repackage
     anyway.  Provide a get-orig-source target to do the repackaging.
   * libpam-openafs-kaserver: Fix compilation so that the PAM module isn't
     missing symbols and therefore unusable.  (Closes: #308844)
   * Apply patch from Chas Williams to fix stale cache data from deleted
     files, a bug introduced in 1.3.82.
   * In all cases, only build the module appropriate to the kernel we're
     building against.  Building an SMP module against a non-SMP kernel
     fails due to missing defines.  (Closes: #225907)
   * README.modules: Add documentation for module-assistant and recommend
     it when using Debian kernels.  Mention divergences from upstream in
     module naming.  (Closes: #253168)  Emphasize that the kernel source
     tree used for make-kpkg must be identically configured to the kernel
     the module will be used with.
   * Update copyright with more complete information from upstream
     src/LICENSE.
   * Simplify clean target.  Upstream make distclean is now better.
Files: 
 be18ffb47be4d08939fb524289703f32 1097 net optional openafs_1.3.82-1.dsc
 3f611129bcab821760d30d7fbb0b1ede 4334564 net optional 
openafs_1.3.82.orig.tar.gz
 ac699751bdffad7ccea4763ec51b2c2f 119190 net optional openafs_1.3.82-1.diff.gz
 32b4d7825f12f74d6f508336b1e00311 4425684 net extra 
openafs-modules-source_1.3.82-1_all.deb
 1f7b4771bd05c4127e93dc3d4c682e67 1540402 net optional 
openafs-client_1.3.82-1_i386.deb
 f630dee77e4b041fbf2626f50f26bf5b 204584 net extra 
openafs-kpasswd_1.3.82-1_i386.deb
 b7a663a00fd95301aa4a93ddee6433f9 785586 net optional 
openafs-fileserver_1.3.82-1_i386.deb
 a83d5464950e99b3cdb2a19f76464699 465512 net optional 
openafs-dbserver_1.3.82-1_i386.deb
 a90c3746f26faa7005a9585c5a0a5ffe 1261884 libdevel extra 
libopenafs-dev_1.3.82-1_i386.deb
 633e7771375ae4f14f71e3480b722472 218290 net extra 
libpam-openafs-kaserver_1.3.82-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iQEVAwUBQof/fLf2jhx5fmQdAQEzOQf+K3epjxyWYHP+V65437Jnng4flk6lvznh
oZTBl4GSWzxv1Ka7GU85eJFtCPRBPc1fss3q3lwNLoAmk/eOGSGvlo3vqniOrLBd
s5z7PU7Z7xUoEgmTi4lwyCJYf0qKxvxUJSbJdrkF9fnqgn3q392H36XIjeDyFqdr
5RxaDz3wCrpaEQ68yZK8owFu9lcP+7H50kHs0g+1D4urVT4qyr2levqzWHkmXcyS
r2iqnK689vbQCBJPJ298VrmiLaeN0MklkKcekOwqOpqAY4BVuGhyZSCeyZAXjGE+
9mlNYyRuXlVgNUArUs7v+NpmqFzQpjXSdmfGEq8/8HUm0o443eaggg==
=7c/f
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to