Your message dated Fri, 21 Oct 2005 10:02:12 -0700 with message-id <[EMAIL PROTECTED]> and subject line Bug#334584: fixed in udev 0.071-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 18 Oct 2005 19:32:49 +0000 >From [EMAIL PROTECTED] Tue Oct 18 12:32:49 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.metronet.co.uk [213.162.97.75] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1ERxCb-000708-00; Tue, 18 Oct 2005 12:32:49 -0700 Received: from riva.pelham.vpn.ucam.org (83-216-156-196.colinw664.adsl.metronet.co.uk [83.216.156.196]) by smtp.metronet.co.uk (MetroNet Mail) with ESMTP id 785DB416647 for <[EMAIL PROTECTED]>; Tue, 18 Oct 2005 20:32:33 +0100 (BST) Received: from cjwatson by riva.pelham.vpn.ucam.org with local (Exim 3.36 #1 (Debian)) for [EMAIL PROTECTED] id 1ERxCb-0002M6-00; Tue, 18 Oct 2005 20:32:49 +0100 Date: Tue, 18 Oct 2005 20:32:49 +0100 From: Colin Watson <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: udev-udeb: /lib/hotplug/*.agent not executable Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.9i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: udev-udeb Version: 0.070-5 Severity: normal Tags: patch /lib/hotplug/*.agent aren't executable and should be. Trivial patch: diff -u udev-0.070/debian/rules udev-0.070/debian/rules --- udev-0.070/debian/rules +++ udev-0.070/debian/rules @@ -141,7 +141,8 @@ cp extra/permissions.rules $(DU)/etc/udev/rules.d/020_permissions.rules cp extra/hotplug.rules $(DU)/etc/udev/rules.d/z55_hotplug.rules cp extra/links.conf $(DU)/etc/udev/ - cp hotplug/firmware.agent hotplug/ide.agent $(DU)/lib/hotplug/ + install --mode=755 hotplug/firmware.agent hotplug/ide.agent \ + $(DU)/lib/hotplug/ install --mode=755 extra/udev.startup \ $(DU)/lib/debian-installer-startup.d/S02udev Thanks, -- Colin Watson [EMAIL PROTECTED] --------------------------------------- Received: (at 334584-close) by bugs.debian.org; 21 Oct 2005 17:08:02 +0000 >From [EMAIL PROTECTED] Fri Oct 21 10:08:02 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian)) id 1ET0HU-0001Ft-00; Fri, 21 Oct 2005 10:02:12 -0700 From: Marco d'Itri <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#334584: fixed in udev 0.071-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Fri, 21 Oct 2005 10:02:12 -0700 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: udev Source-Version: 0.071-1 We believe that the bug you reported is fixed in the latest version of udev, which is due to be installed in the Debian FTP archive: udev-udeb_0.071-1_i386.udeb to pool/main/u/udev/udev-udeb_0.071-1_i386.udeb udev_0.071-1.diff.gz to pool/main/u/udev/udev_0.071-1.diff.gz udev_0.071-1.dsc to pool/main/u/udev/udev_0.071-1.dsc udev_0.071-1_i386.deb to pool/main/u/udev/udev_0.071-1_i386.deb udev_0.071.orig.tar.gz to pool/main/u/udev/udev_0.071.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Marco d'Itri <[EMAIL PROTECTED]> (supplier of updated udev package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 21 Oct 2005 16:39:05 +0200 Source: udev Binary: udev udev-udeb Architecture: source i386 Version: 0.071-1 Distribution: unstable Urgency: low Maintainer: Marco d'Itri <[EMAIL PROTECTED]> Changed-By: Marco d'Itri <[EMAIL PROTECTED]> Description: udev - /dev/ and hotplug management daemon udev-udeb - /dev/ and hotplug management daemon (udeb) Closes: 334179 334232 334439 334584 Changes: udev (0.071-1) unstable; urgency=low . * New upstream release. Removed the following patches which have been merged upstream: ata_id_nonblock, install_hotplugd, scsi_id_tmp. * Added patch udev-synthesize-waldi which implements full support for CCW devices in udevsynthesize. Provided by Bastian Blank. * devfs.rules, udev.rules: added semicolons after setting variables in shell script fragments to work around a dash bug. (Closes: #334179) * README.Debian: suggest to use CONFIG_PNP, CONFIG_PNPACPI and CONFIG_PNPBIOS too. (Closes: #334232) * permissions.rules: added fuse group fuse. (Closes: #334439) * Make executable the agent scripts in the udeb. (Closes: #334584) Files: de8f1ca9cb3b8f281651db74e412fdf9 593 admin optional udev_0.071-1.dsc 0116e5feabb78698f43638822ab8a27b 437817 admin optional udev_0.071.orig.tar.gz 4714845975500eaebaaba6cd72897c46 42352 admin optional udev_0.071-1.diff.gz 22c1f7113218a7dad44519d7cf4f2eb7 316958 admin optional udev_0.071-1_i386.deb b57a49d77aaf07287227fed38f5f74a8 57736 debian-installer optional udev-udeb_0.071-1_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDWQszFGfw2OHuP7ERAvVhAKCYFn9rRbW1yG7acoU43qiUqiqoSgCfYqkX LFh9EwsPFuqU9lxaoRtahUs= =EzZH -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]