udpkg_1.13_amd64.changes uploaded successfully to localhost
along with the files:
udpkg_1.13.dsc
udpkg_1.13.tar.gz
udpkg_1.13_amd64.udeb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
--
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a
Accepted:
udpkg_1.13.dsc
to main/u/udpkg/udpkg_1.13.dsc
udpkg_1.13.tar.gz
to main/u/udpkg/udpkg_1.13.tar.gz
udpkg_1.13_amd64.udeb
to main/u/udpkg/udpkg_1.13_amd64.udeb
Override entries for your package:
udpkg_1.13.dsc - source debian-installer
udpkg_1.13_amd64.udeb - standard debian-inst
Package: netcfg
Version: 1.70
Severity: normal
Tags: patch
127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
is based on the assumption that when loopback interface is set with
a 255.0.0.0 netmask, it will identify itself by any address belonging to
this subnet. This is
Processing commands for cont...@bugs.debian.org:
> severity 614768 important
Bug #614768 [partman-zfs] should detect when embed area is too small for GRUB
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
614768: http://bugs
Processing commands for cont...@bugs.debian.org:
> tags 637086 + pending
Bug #637086 [partman-zfs] sets up ZFS filesystems for automated mount
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
637086: http://bugs.debian.org/cgi-bin/bugreport.cg
Hi Robert,
Robert Millan wrote:
> (it remains to be found whether it's true on Hurd pfinet, anyone can
> find out by running "ping 127.0.1.1"?)
Seems as if it works:
strauss:~# ping 127.0.1.1
PING 127.0.1.1 (127.0.1.1): 56 data bytes
64 bytes from 127.0.1.1: icmp_seq=0 ttl=255 time=10.053 ms
64
2011/11/23 Axel Beckert :
> Seems as if it works:
Thanks for testing. Patch updated.
--
Robert Millan
diff --git a/netcfg-common.c b/netcfg-common.c
index 4b2a8a0..6053a48 100644
--- a/netcfg-common.c
+++ b/netcfg-common.c
@@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddres
Robert Millan, le Wed 23 Nov 2011 19:17:16 +0100, a écrit :
> 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8
> is based on the assumption that when loopback interface is set with
> a 255.0.0.0 netmask, it will identify itself by any address belonging to
> this subnet.
8 matches
Mail list logo