Your message dated Sun, 13 Nov 2005 09:02:11 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#335866: fixed in kfreebsd-5 5.4-7 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 26 Oct 2005 11:35:57 +0000 >From [EMAIL PROTECTED] Wed Oct 26 04:35:57 2005 Return-path: <[EMAIL PROTECTED]> Received: from 216.red-62-57-140.user.auna.net (localhost) [62.57.140.216] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EUjZV-0002qL-00; Wed, 26 Oct 2005 04:35:57 -0700 Received: from rmh by localhost with local (Exim 4.54) id 1EUjZR-0003HD-48; Wed, 26 Oct 2005 13:35:53 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Robert Millan <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: please compress kernel image with gzip X-Mailer: reportbug 3.17 Date: Wed, 26 Oct 2005 13:35:53 +0200 Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: kfreebsd-5 Severity: wishlist Please could you compress the kernel image with gzip? I just noticed that the FreeBSD loader can handle it just fine. The gain is significant: [EMAIL PROTECTED]:/boot/kernel$ du -h kernel 6.1M kernel [EMAIL PROTECTED]:/boot/kernel$ sudo gzip -9 kernel [EMAIL PROTECTED]:/boot/kernel$ du -h kernel.gz 2.4M kernel.gz (for LiveCDs, this also means faster loading) -- System Information: Debian Release: testing/unstable Architecture: kfreebsd-i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: GNU/kFreeBSD 5.4-1-686 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) --------------------------------------- Received: (at 335866-close) by bugs.debian.org; 13 Nov 2005 17:04:59 +0000 >From [EMAIL PROTECTED] Sun Nov 13 09:04:59 2005 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1EbLF5-0006TA-P6; Sun, 13 Nov 2005 09:02:11 -0800 From: Aurelien Jarno <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#335866: fixed in kfreebsd-5 5.4-7 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sun, 13 Nov 2005 09:02:11 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-4.8 required=4.0 tests=BAYES_00,FROM_ENDS_IN_NUMS, HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-CrossAssassin-Score: 3 Source: kfreebsd-5 Source-Version: 5.4-7 We believe that the bug you reported is fixed in the latest version of kfreebsd-5, which is due to be installed in the Debian FTP archive: kfreebsd-5_5.4-7.diff.gz to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-7.diff.gz kfreebsd-5_5.4-7.dsc to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-7.dsc kfreebsd-source-5.4_5.4-7_all.deb to pool/main/k/kfreebsd-5/kfreebsd-source-5.4_5.4-7_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Aurelien Jarno <[EMAIL PROTECTED]> (supplier of updated kfreebsd-5 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 13 Nov 2005 14:40:59 +0100 Source: kfreebsd-5 Binary: kfreebsd-image-5.4-1-686 kfreebsd-image-5.4-1-586-smp kfreebsd-headers-5-686 kfreebsd-headers-5.4-1-686 kfreebsd-headers-5.4-1-586 kfreebsd-headers-5.4-1-486 kfreebsd-image-5-586-smp kfreebsd-headers-5-686-smp kfreebsd-image-5.4-1-686-smp kfreebsd-headers-5.4-1-586-smp kfreebsd-headers-5-586 kfreebsd-headers-5-586-smp kfreebsd-image-5.4-1-486 kfreebsd-headers-5.4-1-686-smp kfreebsd-image-5-686-smp kfreebsd-image-5-486 kfreebsd-image-5-586 kfreebsd-headers-5-486 kfreebsd-source-5.4 kfreebsd-image-5-686 kfreebsd-headers-5.4-1 kfreebsd-image-5.4-1-586 Architecture: source all Version: 5.4-7 Distribution: unstable Urgency: low Maintainer: GNU/kFreeBSD Maintainers <debian-bsd@lists.debian.org> Changed-By: Aurelien Jarno <[EMAIL PROTECTED]> Description: kfreebsd-source-5.4 - source code for kernel of FreeBSD 5.4 with Debian patches Closes: 335338 335866 338378 Changes: kfreebsd-5 (5.4-7) unstable; urgency=low . * Enabled ALTQ support (closes: bug#338378). * Added 586-smp flavor, seems those machines are existing. * Don't ship fsck.cd9660. * Moved arch config files to debian/arch/$(cpu)/. * Gzip /boot/kernel/kernel (closes: bug#335866). * Fixed 901_loader_conf.diff (closes: bug#335338). Files: 695f9d4f92d2533d1665276e1bdeb1bb 1443 devel optional kfreebsd-5_5.4-7.dsc 1f160d71a25f45059460172756772825 35067 devel optional kfreebsd-5_5.4-7.diff.gz f6f44475dad10f1e05e8594fae1592bc 13130092 devel optional kfreebsd-source-5.4_5.4-7_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD4DBQFDd3Anw3ao2vG823MRArheAJj7XgY+q30BsygdoMHhjMkwmdXjAJ431xLB 7Wxs5F3z8rKMbHsCu4Jk8A== =ngBa -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]