https://bugzilla.novell.com/show_bug.cgi?id=746595 https://bugzilla.novell.com/show_bug.cgi?id=746595#c40 --- Comment #40 from Felix Miata <mrmazda@earthlink.net> 2012-06-13 18:05:54 UTC --- (In reply to comment #39)
If you don't say which package of systemd is installed on your system, it is impossible to guess if you have a version which is supposed to contain the fix or not and how you are testing exactly and what is exactly broken.
# rpm --changelog -q systemd | head ... * Fri Apr 20 2012 sbrabec@suse.cz - Implemented SUSE specific sysconfig numlock logic (bnc#746595). ... Don't you think it safe to assume when someone complains of "10 ... systems updated from Factory repo as late as" 6 weeks after a supposed fix is reported that some version containing that "fix" had been installed?
From the host that's booted ATM: # rpm -qa | grep systemd systemd-44-8.1.i586
For the record, these are the 12.2M1 hosts this bug affects (100% of my Factory installations), with their latest (all June) 'zypper dup' dates: gx28b 02 m7ncd 03 big31 06 gx280 07 gx27b 08 kt880 08 s2846 09 gx110 09 t2240 10 gx62b 11 kt400 11 gx260 11 I'm going to pass on booting the other 11 right now just to gather their systemd versions to report here. I test by booting, 39 times out of 40, directly into runlevel 3, where everything is virtually guaranteed to be big enough to be legible, unlike typical X defaults. I try to login, and get login failure because I start using numpad keystrokes for password entry before looking at the screen after the switch from tty1 to tty2 or tty3. Sorry I forgot to include the 3 tidbit in comment 0. I wouldn't know if this had any effect on runlevel 5, as I always set numlock=On in kdmrc before first instance of runlevel 5 is initiated after an installation. What exactly is broken remains as exactly stated in comment 0, as login confirms with "Hint: Num Lock is off". -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.