Processing of udpkg_1.13_amd64.changes

2011-11-23 Thread Debian FTP Masters
udpkg_1.13_amd64.changes uploaded successfully to localhost along with the files: udpkg_1.13.dsc udpkg_1.13.tar.gz udpkg_1.13_amd64.udeb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org with a

udpkg_1.13_amd64.changes ACCEPTED into unstable

2011-11-23 Thread Debian FTP Masters
Accepted: udpkg_1.13.dsc to main/u/udpkg/udpkg_1.13.dsc udpkg_1.13.tar.gz to main/u/udpkg/udpkg_1.13.tar.gz udpkg_1.13_amd64.udeb to main/u/udpkg/udpkg_1.13_amd64.udeb Override entries for your package: udpkg_1.13.dsc - source debian-installer udpkg_1.13_amd64.udeb - standard debian-inst

Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Robert Millan
Package: netcfg Version: 1.70 Severity: normal Tags: patch 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8 is based on the assumption that when loopback interface is set with a 255.0.0.0 netmask, it will identify itself by any address belonging to this subnet. This is

Processed: severity of 614768 is important

2011-11-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 614768 important Bug #614768 [partman-zfs] should detect when embed area is too small for GRUB Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 614768: http://bugs

Processed: tagging 637086

2011-11-23 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 637086 + pending Bug #637086 [partman-zfs] sets up ZFS filesystems for automated mount Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 637086: http://bugs.debian.org/cgi-bin/bugreport.cg

Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Axel Beckert
Hi Robert, Robert Millan wrote: > (it remains to be found whether it's true on Hurd pfinet, anyone can > find out by running "ping 127.0.1.1"?) Seems as if it works: strauss:~# ping 127.0.1.1 PING 127.0.1.1 (127.0.1.1): 56 data bytes 64 bytes from 127.0.1.1: icmp_seq=0 ttl=255 time=10.053 ms 64

Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Robert Millan
2011/11/23 Axel Beckert : > Seems as if it works: Thanks for testing. Patch updated. -- Robert Millan diff --git a/netcfg-common.c b/netcfg-common.c index 4b2a8a0..6053a48 100644 --- a/netcfg-common.c +++ b/netcfg-common.c @@ -1042,19 +1042,23 @@ void netcfg_write_common(struct in_addr ipaddres

Bug#649747: 127.0.1.1 hack is not supported by kFreeBSD

2011-11-23 Thread Samuel Thibault
Robert Millan, le Wed 23 Nov 2011 19:17:16 +0100, a écrit : > 127.0.1.1 hack introduced in commit 6762701e15829b1857fe252c1de642f8ec00f8a8 > is based on the assumption that when loopback interface is set with > a 255.0.0.0 netmask, it will identify itself by any address belonging to > this subnet.