Your message dated Tue, 14 Nov 2023 09:34:40 +0000
with message-id <e1r2poe-00fvlq...@fasolo.debian.org>
and subject line Bug#1035622: fixed in libpciaccess 0.17-3
has caused the Debian Bug report #1035622,
regarding libpciaccess: Add hurd-amd64 symbols
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1035622: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1035622
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libpciaccess
Version: 0.17-2
Severity: important
Tags: patch
User: debian-h...@lists.debian.org
Usertags: hurd

Hello,

The attached patch fixes the symbol list for hurd-amd64.

Samuel

-- System Information:
Debian Release: 12.0
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'stable-security'), (500, 'stable-debug'), (500, 
'proposed-updates-debug'), (500, 'proposed-updates'), (500, 
'oldstable-proposed-updates'), (500, 'oldoldstable'), (500, 'buildd-unstable'), 
(500, 'unstable'), (500, 'stable'), (500, 'oldstable'), (1, 
'experimental-debug'), (1, 'buildd-experimental'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, arm64

Kernel: Linux 6.2.0 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- debian/libpciaccess0.symbols.original       2023-05-06 18:31:42.923396000 
+0000
+++ debian/libpciaccess0.symbols        2023-05-06 18:31:54.219239521 +0000
@@ -44,14 +44,14 @@
  pci_device_vgaarb_set_target@Base 0.10.7
  pci_device_vgaarb_trylock@Base 0.10.7
  pci_device_vgaarb_unlock@Base 0.10.7
- (arch=hurd-i386)pci_device_x86_close_io@Base 0.16
- (arch=hurd-i386)pci_device_x86_open_legacy_io@Base 0.16
- (arch=hurd-i386)pci_device_x86_read16@Base 0.16
- (arch=hurd-i386)pci_device_x86_read32@Base 0.16
- (arch=hurd-i386)pci_device_x86_read8@Base 0.16
- (arch=hurd-i386)pci_device_x86_write16@Base 0.16
- (arch=hurd-i386)pci_device_x86_write32@Base 0.16
- (arch=hurd-i386)pci_device_x86_write8@Base 0.16
+ (arch=hurd-any)pci_device_x86_close_io@Base 0.16
+ (arch=hurd-any)pci_device_x86_open_legacy_io@Base 0.16
+ (arch=hurd-any)pci_device_x86_read16@Base 0.16
+ (arch=hurd-any)pci_device_x86_read32@Base 0.16
+ (arch=hurd-any)pci_device_x86_read8@Base 0.16
+ (arch=hurd-any)pci_device_x86_write16@Base 0.16
+ (arch=hurd-any)pci_device_x86_write32@Base 0.16
+ (arch=hurd-any)pci_device_x86_write8@Base 0.16
  pci_get_strings@Base 0
  pci_id_match_iterator_create@Base 0
  pci_io_read16@Base 0.11.0
@@ -67,7 +67,7 @@
  (arch=kfreebsd-any)pci_system_freebsd_init_dev_mem@Base 0.16
  pci_system_init@Base 0
  pci_system_init_dev_mem@Base 0.10.2
- (arch=hurd-i386)pci_system_x86_destroy@Base 0.16
- (arch=hurd-i386)pci_system_x86_map_dev_mem@Base 0.17
- (arch=hurd-i386)x86_disable_io@Base 0.16
- (arch=hurd-i386)x86_enable_io@Base 0.16
+ (arch=hurd-any)pci_system_x86_destroy@Base 0.16
+ (arch=hurd-any)pci_system_x86_map_dev_mem@Base 0.17
+ (arch=hurd-any)x86_disable_io@Base 0.16
+ (arch=hurd-any)x86_enable_io@Base 0.16

--- End Message ---
--- Begin Message ---
Source: libpciaccess
Source-Version: 0.17-3
Done: Timo Aaltonen <tjaal...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libpciaccess, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1035...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Timo Aaltonen <tjaal...@debian.org> (supplier of updated libpciaccess package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 14 Nov 2023 11:22:26 +0200
Source: libpciaccess
Built-For-Profiles: noudeb
Architecture: source
Version: 0.17-3
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force <debian-x@lists.debian.org>
Changed-By: Timo Aaltonen <tjaal...@debian.org>
Closes: 1035622
Changes:
 libpciaccess (0.17-3) unstable; urgency=medium
 .
   [ Debian Janitor ]
   * Bump debhelper from old 12 to 13.
     + debian/rules: Drop --fail-missing argument to dh_missing, which is now 
the
       default.
   * Replace XC-Package-Type with Package-Type.
   * Update standards version to 4.6.1, no changes needed.
 .
   [ Samuel Thibault ]
   * symbols: Add hurd-amd64 symbols. (Closes: #1035622)
Checksums-Sha1:
 9413b6fc5ed8e0958f3ffe1e8f2a37c5a2c1e754 2291 libpciaccess_0.17-3.dsc
 498d4e15cbc976a9e899c3b51c47d66d20de661a 34504 libpciaccess_0.17-3.diff.gz
 5ccd97889a34cafca42a7d1d582440ca3a351c7f 7322 
libpciaccess_0.17-3_source.buildinfo
Checksums-Sha256:
 b85bc2f12e4566e6471597c2cdc376bc8d0f403f4b56505d02dc937ac210f475 2291 
libpciaccess_0.17-3.dsc
 34c49a1dc94b7a69b5f7a31fee2878d516f733446107386aa405185c246e828b 34504 
libpciaccess_0.17-3.diff.gz
 a5d05cb5e4694acf104348ae9432116c1c13e3f53bb961acb3932b4e4a680247 7322 
libpciaccess_0.17-3_source.buildinfo
Files:
 bad5a72cced8b2537612b664874a3df7 2291 devel optional libpciaccess_0.17-3.dsc
 9b7b1d740b1d6350ff1fa59dca79ab31 34504 devel optional 
libpciaccess_0.17-3.diff.gz
 29dd4395f5405c00da7443b3447e6efc 7322 devel optional 
libpciaccess_0.17-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=8RIE
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to