Your message dated Tue, 21 Aug 2001 15:01:42 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#109059: fixed in kernel-image-2.2.19-udma100-ext3-i386 2.2.19-2 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Darren Benham (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 17 Aug 2001 20:01:12 +0000 >From [EMAIL PROTECTED] Fri Aug 17 15:01:12 2001 Return-path: <[EMAIL PROTECTED]> Received: from quechua.inka.de (mail.inka.de) [212.227.14.2] (mail) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 15Xpnr-0003Ah-00; Fri, 17 Aug 2001 15:01:12 -0500 Received: from zombie.inka.de by mail.inka.de with uucp (rmailwrap 0.4) id 15Xpno-0006gm-00; Fri, 17 Aug 2001 22:01:08 +0200 Received: from inet by zombie.inka.de with local (Exim 3.32 #1 (Debian)) id 15Xpib-0002ke-00; Fri, 17 Aug 2001 21:55:45 +0200 From: [EMAIL PROTECTED] Subject: wnpp: ITP: kernel-image-2.2.19-udma100-ext3 To: [EMAIL PROTECTED] X-Mailer: bug 3.3.10 Message-Id: <[EMAIL PROTECTED]> Sender: Eduard Bloch <[EMAIL PROTECTED]> Date: Fri, 17 Aug 2001 21:55:45 +0200 Delivered-To: [EMAIL PROTECTED] Package: wnpp Version: N/A Severity: wishlist udma100-ext3 variant of boot floppies uses a kernel patched with the latest ext3 and Hedrick's IDE patch The patch supports the Promise and Highpoint chipsets used on EIDE controler cards or builtin on modern boards with VIA chipset. If you install the standard kernel-image package you may not be able to reboot, since the standard package does not contain the necessary IDE patch. An additional extra feature is ext3fs (aka Journaling for ext2). This extension is up and backward compatible with ext2. Though you must not expect real reliability and safeness for your data. -- System Information Debian Release: testing/unstable Kernel Version: Linux zombie 2.4.9 #1 Fri Aug 17 17:08:53 CEST 2001 i686 unknown --------------------------------------- Received: (at 109059-close) by bugs.debian.org; 21 Aug 2001 19:09:40 +0000 >From [EMAIL PROTECTED] Tue Aug 21 14:09:40 2001 Return-path: <[EMAIL PROTECTED]> Received: from auric.debian.org [206.246.226.45] (mail) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 15ZGuC-0003lv-00; Tue, 21 Aug 2001 14:09:40 -0500 Received: from troup by auric.debian.org with local (Exim 3.12 1 (Debian)) id 15ZGmU-0002vZ-00; Tue, 21 Aug 2001 15:01:42 -0400 From: Eduard Bloch <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#109059: fixed in kernel-image-2.2.19-udma100-ext3-i386 2.2.19-2 Message-Id: <[EMAIL PROTECTED]> Sender: James Troup <[EMAIL PROTECTED]> Date: Tue, 21 Aug 2001 15:01:42 -0400 Delivered-To: [EMAIL PROTECTED] We believe that the bug you reported is fixed in the latest version of kernel-image-2.2.19-udma100-ext3-i386, which has been installed in the Debian FTP archive: kernel-headers-2.2.19-udma100-ext3_2.2.19-2_i386.deb to pool/main/k/kernel-image-2.2.19-udma100-ext3-i386/kernel-headers-2.2.19-udma100-ext3_2.2.19-2_i386.deb kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.tar.gz to pool/main/k/kernel-image-2.2.19-udma100-ext3-i386/kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.tar.gz kernel-image-2.2.19-udma100-ext3_2.2.19-2_i386.deb to pool/main/k/kernel-image-2.2.19-udma100-ext3-i386/kernel-image-2.2.19-udma100-ext3_2.2.19-2_i386.deb kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.dsc to pool/main/k/kernel-image-2.2.19-udma100-ext3-i386/kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.dsc A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Eduard Bloch <[EMAIL PROTECTED]> (supplier of updated kernel-image-2.2.19-udma100-ext3-i386 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 19 Aug 2001 01:38:56 +0200 Source: kernel-image-2.2.19-udma100-ext3-i386 Binary: kernel-headers-2.2.19-udma100-ext3 kernel-image-2.2.19-udma100-ext3 Architecture: source i386 Version: 2.2.19-2 Distribution: unstable Urgency: low Maintainer: Eduard Bloch <[EMAIL PROTECTED]> Changed-By: Eduard Bloch <[EMAIL PROTECTED]> Description: kernel-headers-2.2.19-udma100-ext3 - Header files related to Linux kernel version 2.2.19-udma100-ext3 kernel-image-2.2.19-udma100-ext3 - Linux kernel binary image for version 2.2.19-udma100-ext3. Closes: 109059 Changes: kernel-image-2.2.19-udma100-ext3-i386 (2.2.19-2) unstable; urgency=low . * First useable release. Closes: #109059 * Adopted the build system of the reiser "colleague", the previous was a joke. * ext3 patch from the package kernel-patch-2.2.19-ext3 applied * hedricks IDE patch applied, from http://www.kernel.org/pub/linux/kernel/people/hedrick/ide-2.2.19/ide.2.2.19.05042001.patch.gz * winbond-840.diff applied, from http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=107790&repeatmerged=yes * config based on the kernel-config from udma66 boot-floppies * Quota disabled (stability reasons in ext3 code) * builtin: unix, af_packet, drivers for popular PCI NICs and SCSI host adapters (similar to -compact), SysRQ Files: afb8b00bf24efb201249b49ca066e2d5 837 devel optional kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.dsc 0c0c5ac6e0b5919aad64e1c49fa2a74d 344683 devel optional kernel-image-2.2.19-udma100-ext3-i386_2.2.19-2.tar.gz d29a13fbf234a522e8deac979f6a3162 1950962 devel optional kernel-headers-2.2.19-udma100-ext3_2.2.19-2_i386.deb 6d5e0f39faa049cf57acbb9cce127da3 5998564 base optional kernel-image-2.2.19-udma100-ext3_2.2.19-2_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Weitere Infos: siehe http://www.gnupg.org iD8DBQE7f3dA4QZIHu3wCMURAgF+AJ4rx+HLyB8lDchwm9ooRmwNt5lRuwCeIWXY OjcoHh8AP/ZlFQrc0agDlmc= =ru2S -----END PGP SIGNATURE-----