You are not logged in.
Hello:
thanks ...
You're welcome.
... seems connected with this "systemd" thing,
Yes, your post is.
What I meant to say was that it is not connected to the OP by @Fjalar.
That said, let's see if we can make some sense out of what seems to be going on.
... this package has been function since "etch".
etch is a Debian release from April 2007 and Devuan did not exist at that time.
Devuan Jesse was released May 2017, roughly ten years later.
$ uname -a tells us your system runs Devuan Daedalus.
apt list | grep -i installed | grep -i open-iscsi tells us the open-iscsi package installed is open-iscsi_2.1.8-1_amd64.
Yet for some reason, attempting to run the application gets you a classic systemd error in a system that by definition does not use the systemd package for init.
In an attempt to get to the bottom of the problem, I decided to see if I could reproduce the problem:
Installation
# apt install open-iscsi
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed:
libisns0 libopeniscsiusr
Recommended packages:
finalrd
The following NEW packages will be installed:
libisns0 libopeniscsiusr open-iscsi
0 upgraded, 3 newly installed, 0 to remove and 0 not upgraded.
Need to get 464 kB of archives.
After this operation, 2152 kB of additional disk space will be used.
Do you want to continue? [Y/n]
Get:1 http://deb.devuan.org/merged daedalus/main amd64 libisns0 amd64 0.101-0.2+b1 [92.0 kB]
Get:2 http://deb.devuan.org/merged daedalus/main amd64 libopeniscsiusr amd64 2.1.8-1 [59.7 kB]
Get:3 http://deb.devuan.org/merged daedalus/main amd64 open-iscsi amd64 2.1.8-1 [312 kB]
Fetched 464 kB in 2s (187 kB/s)
Preconfiguring packages ...
Selecting previously unselected package libisns0:amd64.
(Reading database ... 188375 files and directories currently installed.)
Preparing to unpack .../libisns0_0.101-0.2+b1_amd64.deb ...
Unpacking libisns0:amd64 (0.101-0.2+b1) ...
Selecting previously unselected package libopeniscsiusr.
Preparing to unpack .../libopeniscsiusr_2.1.8-1_amd64.deb ...
Unpacking libopeniscsiusr (2.1.8-1) ...
Selecting previously unselected package open-iscsi.
Preparing to unpack .../open-iscsi_2.1.8-1_amd64.deb ...
Unpacking open-iscsi (2.1.8-1) ...
Setting up libopeniscsiusr (2.1.8-1) ...
Setting up libisns0:amd64 (0.101-0.2+b1) ...
Setting up open-iscsi (2.1.8-1) ...
Processing triggers for libc-bin (2.36-9+deb12u10) ...
Processing triggers for man-db (2.11.2-2) ...
Processing triggers for initramfs-tools (0.142+deb12u1) ...
update-initramfs: Generating /boot/initrd.img-6.1.0-33-amd64
live-boot: core filesystems dm-verity devices utils udev blockdev iscsi dns.
#The package installed properly.
Attempt to run the application using your same parameters:
$ iscsiadm --mode discovery --type sendtargets --portal 192.168.178.100
sh: 1: /bin/systemctl: not found # <---- same error
iscsiadm: can not connect to iSCSI daemon (111)!
iscsiadm: Could not make /etc/iscsi/send_targets: Permission denied # <---- this neeeds root
iscsiadm: Could not add new discovery record.Same error.
Try as root, again using your same parameters:
# iscsiadm --mode discovery --type sendtargets --portal 192.168.178.100
sh: 1: /bin/systemctl: not found # <---- same error
iscsiadm: can not connect to iSCSI daemon (111)!
iscsiadm: Could not scan /sys/class/iscsi_transport.
sh: 1: /bin/systemctl: not found # <---- same error
iscsiadm: can not connect to iSCSI daemon (111)!
iscsiadm: Cannot perform discovery. Initiatorname required.
iscsiadm: Could not perform SendTargets discovery: could not connect to iscsid
# Same error.
---
From what I see, it seems that this is a problem with the open-iscsi_2.1.8-1_amd64 package.
It requies a Devuan bug report to the maintainers.
See here on how to do that.
Note: Being a topic not related to the original post, please continue anything related to this issue on another, new thread.
Best,
A.
Hello:
... nothing with the systemd gets installed ...
Indeed.
As it should be.
This provided that the package installed (like the printout you posted shows) actually comes from the Devuan repository.
Like I pointed out, the problem* posted by kapqa (not related to the original post) would seem to indicate that the package installed may not be from the Devuan repository. * printout points to a typical error in Linux systems using systemd.
That said, note that the link posted leads to a Debian open-iscsi wiki page.
@kapqa
You may want to consider opening a separate thread with your problem and start by posting the terminal printout from this:
$ uname -a$ cat /etc/apt/sources.list$ apt list | grep -i installed | grep -i open-iscsiBest,
A.
Hello:
... using "open-iscsi" there is error with devuan
https://wiki.debian.org/SAN/iSCSI/open-iscsisystemctl not found
The printout points to a typical error in Linux systems using systemd.
Devuan is not one of them.
From the web:
If systemctl is not found on your system, it usually means the systemd service manager is not installed or configured correctly.
This can happen if the system is not fully updated or if you've removed systemd accidentally.
To fix this, you'll need to install or reinstall systemd.
systemd has been intentionally removed from Devuan, no failed update or accident to speak of there. 8^°
The installed open-iscsi application is looking for systemctl (part of the systemd package) but cannot find it, hence the error printout.
At the risk of stating the obvious, this should not happen* if the installed open-iscsi package is the one present in the Devuan repositories.
* unless there has been some error in the processing / sanitising for use in Devuan for which a bug report should be filed with the Devuan maintainers.
HTH.
Best,
A.
Hello:
... spelling mistake is one thing ...
Crikey !...
Seems espresso had not kicked in yet.
But not a proper excuse though.
The thing is that I'm just lowly hack who most always finds the answers to difficult stuff under the same two names.
ie: fsmithred / ralph.ronnquist
Yes, that's the best (true one) I can come up with. 8^D
Best,
A.
Hello:
... disable this kernel module either modularly ...
Does not seem possible.
I have not found a way to disable any of those modules.
ie: ima, evm, selinux, etc.
Whatever methods I found searching on-line did not work.
The main thing to disable would be LSM which seems to orchestrate all of them, including this latest Microsoft contribution to the Linux kernel.
But I have not been able to find a working method.
... or when building the kernel ...
Right ... 8^°
... distros may integrate ...
Debian obviously does, no options to disable or heads-up given.
No surprise there ...
As a result, Devuan is stuck with all this crap.
Best,
A.
Hello:
3 years later ...
... anything with "viber" in it. # <- Actually it was ralph.ronnquist
There is no viber package in the Debian repositories.
As a result, there is no viber package in the Devuan repositories either.
The reason being (most probably) that viber is "Proprietary cross-platform IM and VoIP software".
With respect to it working on Arch, bear in mind that the package in queston is part of their user repository ie: not an official AUR package.
DISCLAIMER: AUR packages are user produced content. Any use of the provided files is at your own risk.
Seems that none of that has changed in the last three years.
Best,
A.
Hello:
That is one of the basic characteristics these security features have.
The main one one being that they are both installed and enabled by default / without your consent or knowledge.
Some fresh news with respect to LSM (Linux Security Modules).
Yes, those modules.
The ones you cannot disable or have any control over.
Microsoft's newest open-source contribution to the Linux kernel being proposed is ... Hornet,
a Linux security module (LSM) for providing signature verification of eBPF programs.
About eBPF
TL;DR
What is eBPF used for?
eBPF lets you gather detailed information about low-level networking, security, and other system-level activities within the kernel.
Better yet, it works without requiring direct modifications to kernel code.
Absolutely wonderful !!!
Just what we were needing.
Linux kernel with Microsoft security module integration doing all of that.
Check the Phoronix note here.
Best,
A.
Hello:
... same errors at boot time.These are not errors.
What you are seeing is information related to EVM being enabled, not errors.
And it seems that there is no easy or documented way to avoid / disable security which (for a desktop system) is probably not needed.
As always, YMMV.
That said, the usual/basic way to check for errors is to look at dmesg in a terminal:
1. in a line by line fashion:
sudo dmesg | more
2. using grep:
sudo dmesg | grep -i "error\|warning\|fail\|segfault\|fatal\|not"
3. sifting by type of message
sudo dmesg --level=alert,crit,err,warn
4. with a real time rolling printout:
sudo dmesg -wH
As this is Linux*, there are probably more ways to get that done as there are other logfies in human readable format which you can look at to get a more detailed idea as to what is going on.
* 8^D !
Best,
A.
Hello:
... sysvinit follows a design principle which states that designs and/or systems should be as simple as possible.
Maybe I'm just as dumb as a (rusty) doornail, but after all these years (~12) with Linux I still fail to grasp the need for anything but one properly working init package for my systems* which have always worked wthout a hitch.
* desktop, netbook, RPi
Of course, as many others have, I came across more than one issue.
But none in any way related to the default init software, which was always* sysvinit.
* save experiments with Debian/Debian based dists which I abandoned as systemd was adopted.
... *nix method of do one thing and do it well, a concept seemingly lost to many of today's programmers.
+1
Best,
A.
Hello:
... sounds like a pain to get rid of and/or disable ...
Indeed ...
That is one of the basic characteristics these security features have.
The main one one being that they are both installed and enabled by default / without your consent or knowledge.
Something that should be getting everyone thinking about it and the reasons for it being so.
We are slowly but steadily arriving at the point where booting a computer will require signatures, code or features over which you will have no control or access to.
Unless certain requirements are met, of course.
Best,
A.
Hello:
... if you haven't disabled apparmor ...
I disabled apparmor from the first time I saw it has been installed and enabled without my intervention.
So no, I do not have the problem you have.
My way of dealing with it is adding security=none apparmor=0 nmi_watchdog=0 to my kernel command line.
That said, I am not too sure the stanza is quite as effective as I believe it is because early on, my dmesg printout also reveals this:
--- snip ---
[ 3.066032] evm: Initialising EVM extended attributes:
[ 3.066218] evm: security.selinux # <-
[ 3.066338] evm: security.SMACK64 (disabled)
[ 3.066493] evm: security.SMACK64EXEC (disabled)
[ 3.066660] evm: security.SMACK64TRANSMUTE (disabled)
[ 3.066842] evm: security.SMACK64MMAP (disabled)
[ 3.067009] evm: security.apparmor # <-
[ 3.067132] evm: security.ima # <-
[ 3.067239] evm: security.capability # <-
[ 3.067369] evm: HMAC attrs: 0x1
--- snip --- As you can see, evm* does not indicate apparmor (and other security features) as being disabled.
ie: adding security=none to the kernel command line should have disabled all that.
* https://linux-ima.sourceforge.net/linux … l-20110907
Edit:
At some point, someone posted a request to disable EVM and IMA.
While reading and testing LSM code, I found IMA/EVM consume per inode
storage even when they are not in use. Add options to diable them in
kernel command line. The logic and syntax is mostly borrowed from an
old serious [1].
I have tried (adding lsm= to the kernel command line but it does not work, at least in the latest Daedalus 6.1.0-33-amd64:
$ grep -o "lsm=.*" /proc/cmdline
lsm=
$
$ ls /sys/kernel/security/
evm ima integrity lockdown lsm # <- this should read "integrity lsm"
$ Apparently it requires a patch. (?)
Best,
A.
Hello:
Filed using ...
Hmm ...
Good luck with that. 8^°
Last time I followed an issue here at Dev1, it required a Debian bug report, which I encouraged the author of the OP to file.
The reply was this:
Since sysvinit is not enabled by default in Debian, I do not consider this
bug as release-critical. Downgrading the bug severity to "normal"*.
* "won't fix" "get lost".
You may (or may not) want to consider reading the whole Dev1 thread and the Debian bug report to get an idea of the severity of the (properly investigated) problem the OP reported to see where any non-systemd bug report stands.
Best,
A.
Hello:
Thank you ...
You're welcome.
... seems to be in Caja.
... it's nasty ...
... 100's of mb's ...
... critical error ...
... unattended to ...
... permanently screw up a solid state drive.
Best,
A.
Hello:
... have the .xsession-errors down to almost zero ...
As long as they generate no issues ... *
... i'd like to figure out these things and address them ...
I thought likewise at one time but all the answers I found were in line with that I say above.
Like you, I don't like those errors either, but with most it's like chasing a rainbow.
So I ended up resorting to having a size limit on the /home/.xsession-errors file.
Check out this post.
* gist of most if not all the replies I got when asking about the entries in the huge /home/.xsession-errors file.
Best,
A.
Hello:
... a huge amount of .xsession-errors ...
Yes, /home/.xsession.errors can get quite fat with just harmless informative printout.
See here: https://dev1galaxy.org/viewtopic.php?id=2412
and
here: http://www.daniloaz.com/en/how-to-preve
Best,
A.
Hello:
... postinst script of xz is buggy ...
I see.
... doesn't recognize that the "alternatives" link for lzma already points correcly.
Right.
Makes sense. 8^)
Maybe the script ...
... when the new "alternatives" link get installed ...
... ends up with the same value that it already had.
Thank you for taking the time to figure that out.
I was worried that an unknown something had mucked around the system.
ie: the (manually or by a script) part of the postinst printout.
Not having been me, the only alternative offered was a script.
Not good.
My only intervention (as far as my memory serves me) in update-alternatives was long ago to set the default editor.
For obvious reasons, not vim.
Or emacs. 8^° !
Remember that the postinst script doesn't "see" those pathnames the way you see them in the error message.
Remember?
I did not have a clue, I'll have to learn it first.
Thanks for the heads up.
... sure there are other possible stories that could explain ...
And I'm quite sure that you have worked out the most probable | feasible | likely one.
So I will mark this one as [solved].
As always, thank you very much for your input.
Best,
A.
Hello:
... upgraded the xz-utils package ...
Yes, of course.
My post was about the warnings and whatever reason could have caused them.
Do have a read at the OP.
Best,
A.
Hello:
... because you updated the lzma package(s) for two different arches?
No idea.
That package is probably in my system since ascii or Jesse and I am now running on Daedalus, to which I arrived through succesive dist-upgrades.
Now ...
Looking at yesterday's timeshift snapshot of /etc/alternatives/lzma I see this:
/etc/alternatives/lzma: symbolic link to ../../usr/bin/xzIn the current version, I see the same thing:
/etc/alternatives/lzma: symbolic link to ../../usr/bin/xz/usr/bin/xz exist in both cases, same size but different timestamp: 02/12/2023 and 03/04/2025 respectively.
So I don't get the part where apt reports ... /lzma has been changed ... and ... /xz is unknown.
Edit:
I checked to see how update-alternatives read:
$ update-alternatives --get-selections | grep lzma
lzma auto ../../usr/bin/xz
$ So it seems it is on auto and not manual, maybe apt found it had been changed?
Edit_2:
I recalled I had once seen /var/log/alternatives.log.
The printout is rather unreadable but I have tried to split it so as to see what it is all about:
$ cat /var/log/alternatives.log
update-alternatives 2025-04-06 09:30:57: run with
--install /usr/bin/lzma lzma /usr/bin/xz 20
--slave /usr/share/man/man1/lzma.1.gz lzma.1.gz /usr/share/man/man1/xz.1.gz
--slave /usr/bin/unlzma unlzma /usr/bin/unxz
--slave /usr/share/man/man1/unlzma.1.gz unlzma.1.gz /usr/share/man/man1/unxz.1.gz
--slave /usr/bin/lzcat lzcat /usr/bin/xzcat
--slave /usr/share/man/man1/lzcat.1.gz lzcat.1.gz /usr/share/man/man1/xzcat.1.gz
--slave /usr/bin/lzmore lzmore /usr/bin/xzmore
--slave /usr/share/man/man1/lzmore.1.gz lzmore.1.gz /usr/share/man/man1/xzmore.1.gz
--slave /usr/bin/lzless lzless /usr/bin/xzless
--slave /usr/share/man/man1/lzless.1.gz lzless.1.gz /usr/share/man/man1/xzless.1.gz
--slave /usr/bin/lzdiff lzdiff /usr/bin/xzdiff
--slave /usr/share/man/man1/lzdiff.1.gz lzdiff.1.gz /usr/share/man/man1/xzdiff.1.gz
--slave /usr/bin/lzcmp lzcmp /usr/bin/xzcmp
--slave /usr/share/man/man1/lzcmp.1.gz lzcmp.1.gz /usr/share/man/man1/xzcmp.1.gz
--slave /usr/bin/lzgrep lzgrep /usr/bin/xzgrep
--slave /usr/share/man/man1/lzgrep.1.gz lzgrep.1.gz /usr/share/man/man1/xzgrep.1.gz
--slave /usr/bin/lzegrep lzegrep /usr/bin/xzegrep
--slave /usr/share/man/man1/lzegrep.1.gz lzegrep.1.gz /usr/share/man/man1/xzegrep.1.gz
--slave /usr/bin/lzfgrep lzfgrep /usr/bin/xzfgrep
--slave /usr/share/man/man1/lzfgrep.1.gz lzfgrep.1.gz /usr/share/man/man1/xzfgrep.1.gz
update-alternatives 2025-04-06 09:30:57: status of link group /usr/bin/lzma set to manual
update-alternatives 2025-04-06 09:30:57: auto-repair link group lzma
update-alternatives 2025-04-06 09:30:57: status of link group /usr/bin/lzma set to auto
$ Thanks for your input.
Best,
A.
Hello:
Thanks for the fast reply.
Much appreciated.
The link has been renewed ...
I was referring to what came afterwards:
--- snip ---
update-alternatives: warning: /etc/alternatives/lzma has been changed (manually or by a script); switching to manual updates only
update-alternatives: warning: forcing reinstallation of alternative ../../usr/bin/xz because link group lzma is broken
update-alternatives: warning: current alternative ../../usr/bin/xz is unknown, switching to /usr/bin/xz for link group lzma
--- snip ---About the lzma package:
$ apt list | grep -i lzma
lzma-alone/stable 9.22-2.2 amd64
lzma-alone/stable 9.22-2.2 i386
lzma-dev/stable,stable 9.22-2.2 all
lzma/stable 9.22-2.2 amd64
lzma/stable 9.22-2.2 i386
~$ $ aptitude why lzma
i font-manager Suggests file-roller
p file-roller Suggests lzma
$Seems apt found something amiss in /etc/alternatives/lzma.
ie: something ... has been changed ...
But what | why | who changed it?
That said, do I even need it?
Thanks for your input.
Best,
A.
Hello:
Weekly updating this morning got me this:
$ apt list --upgradable
Listing... Done
liblzma-dev/stable-security 5.4.1-1 amd64 [upgradable from: 5.4.1-0.2]
liblzma5/stable-security 5.4.1-1 amd64 [upgradable from: 5.4.1-0.2]
liblzma5/stable-security 5.4.1-1 i386 [upgradable from: 5.4.1-0.2]
xz-utils/stable-security 5.4.1-1 amd64 [upgradable from: 5.4.1-0.2]
$ And then this:
$ sudo apt upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following packages will be upgraded:
liblzma-dev liblzma5 liblzma5:i386 xz-utils
4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 1151 kB of archives.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n]
Get:1 http://deb.devuan.org/merged daedalus-security/main amd64 liblzma-dev amd64 5.4.1-1 [260 kB]
Get:2 http://deb.devuan.org/merged daedalus-security/main i386 liblzma5 i386 5.4.1-1 [215 kB]
Get:3 http://deb.devuan.org/merged daedalus-security/main amd64 liblzma5 amd64 5.4.1-1 [205 kB]
Get:4 http://deb.devuan.org/merged daedalus-security/main amd64 xz-utils amd64 5.4.1-1 [471 kB]
Fetched 1151 kB in 1s (957 kB/s)
Reading changelogs... Done
(Reading database ... 166981 files and directories currently installed.)
Preparing to unpack ... (files listed)
Unpacking ... (files listed)
Setting up ... (files listed)
--- snip ---
update-alternatives: warning: /etc/alternatives/lzma has been changed (manually or by a script); switching to manual updates only
update-alternatives: warning: forcing reinstallation of alternative ../../usr/bin/xz because link group lzma is broken
update-alternatives: warning: current alternative ../../usr/bin/xz is unknown, switching to /usr/bin/xz for link group lzma
Setting up liblzma-dev:amd64 (5.4.1-1) ...
Processing triggers for man-db (2.11.2-2) ...
Processing triggers for libc-bin (2.36-9+deb12u10) ...
$Don't have a clear idea as to what is going on.
/etc/alternatives/lzma is a symlink to /us/bin/xz
Please advise.
Best,
A.
Hello:
--- snip ---
... deb.devuan.org/merged daedalus InRelease' doesn't support architecture 'i586'Seems to be correct.
As far as I know, Debian Jesse was the last to support i586 (eg: Intel Pentium and Pentium MMX) processors.
Almost 10 tears ago (12/2015).
Maybe someone here at Dev1 has more relevant information.
See here.
Best,
A.
---
Please post code with the appropriate [ code ] [ /code ] ]tags.
Like this:
Reading package lists... Done
N: Skipping acquire of configured file 'main/binary-i586/Packages' ....
Hello:
... thank you ...
You're welcome.
... as you expected ...
Yes, Hama hardware is rather notorious for not playing nice with Linux.
... wasn't aware of the quoting error.
One is the [ quote ] button and the other is the [ code ] button.
Post a reply - ----> [ code ] [ quote ] [ url ] [ list ] [ * ]
You hit either button and you get somehing like this:
[ quote ]
Paste quoted text here
[ /quote ]
or this:
[ code ]
Paste code text here
[ /code ]
... driver problem.
... very annoying story.
Now you know the ugly truth.
And to first check any hardware you want to purchase for Linux compatibility.
Granted, you already had this one.
... small miracle has happened.
Hmm ...
No.
No such thing. 8^)
What did happen is that at some point a Linux driver that works with Hama hardware was added to your system.
But it is not a miracle, not by a long shot.
It is the work of some Linux developer out there who researched, reverse engineered and wrote it.
That said, I seriously doubt that Hama would not know about a Linux driver that worked with your hardware.
So it is a bit petty that they made no mention something that I am sure they know about.
One good reason for not purchasing Hama hardware.
One problem was probably that (no idea why) that driver was missing (?) from your system.
Another is that it does not seem to be documented properly.
eg: I was not able to find any proper reference.
But fortunately, that can be fixed.
Please boot your box with the Hama card reader plugged in and then open a terminal and do:
$ lsusb Please post the output now that the camera is working as expected.
Then do:
$ usb-devicesFor example, when I do usb-devices with an old Genius Webcam plugged in, I find this:
--- snip ---
T: Bus=03 Lev=01 Prnt=01 Port=04 Cnt=01 Dev#= 4 Spd=480 MxCh= 0
D: Ver= 2.00 Cls=ef(misc ) Sub=02 Prot=01 MxPS=64 #Cfgs= 1
P: Vendor=0458 ProdID=6007 Rev=50.02
S: Manufacturer=KYE Systems corp.
S: Product=Genius Webcam
S: SerialNumber=Genius Audio
C: #Ifs= 4 Cfg#= 1 Atr=80 MxPwr=256mA
I: If#= 0 Alt= 0 #EPs= 1 Cls=0e(video) Sub=01 Prot=00 Driver=uvcvideo # <- video driver used
E: Ad=81(I) Atr=03(Int.) MxPS= 16 Ivl=2ms
I: If#= 1 Alt= 0 #EPs= 0 Cls=0e(video) Sub=02 Prot=00 Driver=uvcvideo # <- video driver used
I: If#= 2 Alt= 0 #EPs= 0 Cls=01(audio) Sub=01 Prot=00 Driver=snd-usb-audio # <- sound driver used
I: If#= 3 Alt= 0 #EPs= 0 Cls=01(audio) Sub=02 Prot=00 Driver=snd-usb-audio # <- sound driver used
--- snip ---Please check the printout on your terminal and see what comes up.
The data you post will probably be of use to anyone with the same problem.
ie: drivers needed for this Hama hardware.
Best,
A.
Hello:
Thanks ...
You're welcome.
It happens once.
Q:
You mean that it only happened once?
ie: you cannot reliably reproduce it?
OldGoodDeskTop
Right ...
A desktop.
... room(~20C), cpu(43C), gpu(45C). PC tower-case have good air flow.
Looks normal.
Devuan installed at new ssd drive.
There could be an issue with the drive.
ie: new hardware
... use new UPS.
More new hardware and in this case (and depending on the type/quality of the UPS), a potential source of problems.
eg: while your PSU in you desktop may play nicely with your AC line, smoothing out micro-spikes or simply ignoring them, your new UPS may not be doing the same thing or even be reacting badly.
A good/decent UPS has always been hard to come by ($$$).
Many years ago I ended up deciding that it was much better to go without one that to end up spending more money on a (nother) UPS which could cause problems.
Please remove your new UPS from the equation till we can find out what is going on.
----
... very strange ...
Indeed ...
From what I see of the terminal output you posted at imgur, there is at least one thing that is absolutely out of place:
https://debian.drdteam.org <- this has nothing to do with any Devuan repository.
Seeing that his is a new installation, I suggest that you do a complete reformat of your new HDD and start over, closely following the instructions* the installer provides you on the screen.
* ie: do not screw around the file system as root if you don't know what you are doing.
So ...
In your place I'd do this:
1. disconnect the UPS from your box, you can get back to it once you have a properly working installation. Or get your money back.
2. download the current Daedalus Live-desktop, burn it to a USB drive and boot from there. (link posted in my previous reply)
3. use the machine for a while/a couple of days and see how it runs.
If things go as you expect them to go, then you can install Devuan Daedalus from the current Daedalus Desktop installer *.iso.
That should get you on your way.
Best,
A.
Hello:
Can someone help?
Hard to say ... 8^°
You are not explaining much here.
Please bear in mind that an incomplete question will only get you incomplete answers.
For starters:
- Is this on a desktop or laptop/netbook, etc.?
- If a laptop/netbook, under AC or battery power?
- At what point does this (sudden reboot) happen?
ie: right after it boots?, after a while using the machine?
- Can you reproduce the problem if you boot from the current Devuan 5 Live-iso?
- Under what ambient conditions?
ie: hot summer / AC turned on?, any machinery running nearby or on the same circuit?
- Exactly what are you doing with the system when this happens?
- Do you see a pattern?
- Any peripherals connected to the system's hardware?
- When did this start to happen?
eg: Any changes in OS (updates/upgrades) hardware / ambient conditions?
... Devuan 5 open-rc is suddenly once autorestart ...
... check why os rebooted?
Start by checking the last (previous) dmesg output for any warnings.
ie: /var/log/dmesg.0 file
Also check:
/var/log/syslog and /var/log/messages -> stores all global system activity data, including startup messages.
/var/log/auth.log stores all security-related events such as logins, root user actions.
/var/log/kern.log stores kernel events, errors, and warning logs.
Best,
A.
Hello:
... a boot action aimed at restoring the brightness ...
Quite so.
That's exactly what it is.
[rant]
And why would that need to be so?
I have never needed any of that.
My three monitors have always had the same brightness values at boot.
One of the SyncMasters 940n has over 70K hours uptime so had to recap it last week but the tubes are a bit dim so a cold environment will make it bit dimmer at boot time, but it only takes a minute or so to get right.
... a comfort utility.
Sure, I guess you could call it that.
But when it is needlessly foisted on the user and root cannot removed it by the usual means, it immediately turns into a nuisance.
As you know, the list of crap like that in today's Linux distributions is endless.
[/rant]
Thanks for your comment.
Best,
A.