Your message dated Thu, 15 Apr 2004 14:04:41 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#242687: fixed in colo 1.5-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 8 Apr 2004 03:55:57 +0000 >From [EMAIL PROTECTED] Wed Apr 07 20:55:57 2004 Return-path: <[EMAIL PROTECTED]> Received: from sorrow.cyrius.com [65.19.161.204] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BBQdx-000717-00; Wed, 07 Apr 2004 20:55:57 -0700 Received: by sorrow.cyrius.com (Postfix, from userid 10) id 34FDA64D4F; Thu, 8 Apr 2004 03:55:57 +0000 (UTC) Received: by deprecation.cyrius.com (Postfix, from userid 1000) id C5F1F106D4; Thu, 8 Apr 2004 04:55:17 +0100 (BST) Date: Thu, 8 Apr 2004 04:55:17 +0100 From: Martin Michlmayr <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: ITP: colo -- Cobalt Qube2/RaQ2 boot loader Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Reportbug-Version: 2.56 X-Debbugs-Cc: [EMAIL PROTECTED], debian-mips@lists.debian.org User-Agent: Mutt/1.5.5.1+cvs20040105i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-10.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Scores: 1 Package: wnpp Severity: wishlist * Package name : colo Version : 1.4 Upstream Author : Peter Horton <[EMAIL PROTECTED]> * URL : http://www.colonel-panic.org/cobalt-mips/ * License : GPL Description : Cobalt Qube2/RaQ2 boot loader * Architecture : mipsel Peter 'p2' De Schrijver and I intend to package colo, a new boot loader written by Peter Horton for MIPS based Cobalt machines (e.g. Qube2 and RaQ2). The boot loader on the Cobalt firmware has several limitations (e.g. only kernels smaller than about 600K can be loaded, the boot partition has to be ext2 revision 0), and this new boot loader doesn't have any of them. The boot loader can be written to flash, thereby overriding the old one. However, the more popular use will be in chain mode; that is, the old boot loader will be used to load colo from an ext2 /boot partition, and colo will then be used to load the kernel (from ext2 or ext3, kernels of any size). -- Martin Michlmayr [EMAIL PROTECTED] --------------------------------------- Received: (at 242687-close) by bugs.debian.org; 15 Apr 2004 18:08:52 +0000 >From [EMAIL PROTECTED] Thu Apr 15 11:08:52 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BEBIC-0000an-00; Thu, 15 Apr 2004 11:08:52 -0700 Received: from dsilvers by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1BEBE9-0004vR-00; Thu, 15 Apr 2004 14:04:41 -0400 From: Martin Michlmayr <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.30 $ Subject: Bug#242687: fixed in colo 1.5-1 Message-Id: <[EMAIL PROTECTED]> Sender: Daniel Silverstone <[EMAIL PROTECTED]> Date: Thu, 15 Apr 2004 14:04:41 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: X-CrossAssassin-Score: 1 Source: colo Source-Version: 1.5-1 We believe that the bug you reported is fixed in the latest version of colo, which is due to be installed in the Debian FTP archive: colo_1.5-1.dsc to pool/main/c/colo/colo_1.5-1.dsc colo_1.5-1.tar.gz to pool/main/c/colo/colo_1.5-1.tar.gz colo_1.5-1_mipsel.deb to pool/main/c/colo/colo_1.5-1_mipsel.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Martin Michlmayr <[EMAIL PROTECTED]> (supplier of updated colo package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Thu, 15 Apr 2004 02:47:59 +0100 Source: colo Binary: colo Architecture: source mipsel Version: 1.5-1 Distribution: unstable Urgency: low Maintainer: Martin Michlmayr <[EMAIL PROTECTED]> Changed-By: Martin Michlmayr <[EMAIL PROTECTED]> Description: colo - boot loader for MIPS based Cobalt machines Closes: 242687 Changes: colo (1.5-1) unstable; urgency=low . * Initial release (Closes: #242687). * debian/patches/10_gp-fix: Fix _gp pointing to an empty segment, patch by Thiemo Seufer <[EMAIL PROTECTED]> * debian/patches/11_changelog: Include changelog from upstream web site. * debian/patches/12_config-file: Rename default.boot to default.colo because future releases of colo will support multiple configuration files, ending with .colo. * debian/patches/05_initrd: Change the initrd command line argument passed to the kernel in a way compatible with Debian's mips/mipsel kernel. * debian/default.colo: Add an example configuration file. Files: a39a27bcf52dcaf33866d4f570417d62 575 base important colo_1.5-1.dsc 212acecf2d9cbe71de00d0f259d36b70 84029 base important colo_1.5-1.tar.gz baf1710ce4921d3f155fe9066c7b7f38 41710 base important colo_1.5-1_mipsel.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAfsnnKb5dImj9VJ8RAmE0AJ46jwaNltbLiRoLM8m6iYjIR65KngCfVsoM wdDDIpLpZ0qd0bU4aC7QQmk= =o0qe -----END PGP SIGNATURE-----