• Bug#928121: marked as done ([i915] *ERROR* rcs0: reset request timeout;

    From Debian Bug Tracking System@21:1/5 to All on Sun Nov 27 10:10:03 2022
    This is a multi-part message in MIME format...

    Your message dated Sun, 27 Nov 2022 09:56:59 +0100 (CET)
    with message-id <20221127085659.0FB27BE2DE0@eldamar.lan>
    and subject line Closing this bug (BTS maintenance for src:linux bugs)
    has caused the Debian Bug report #928121,
    regarding [i915] *ERROR* rcs0: reset request timeout; intel_do_flush_locked failed: Input/output error
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    928121: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928121
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 28 Apr 2019 15:23:55 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.2-bugs.debian.org_2005_01_02
    (2018-09-13) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-10.4 required=4.0 tests=BAYES_00,DIGITS_LETTERS,
    DKIM_SIGNED,DKIM_VALID,FOURLA,HAS_PACKAGE,PHONENUMBER,
    RCVD_IN_DNSWL_NONE,SPF_PASS,TXREP,WORD_WITHOUT_VOWELS,
    XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.2-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 144; hammy, 150; neutral, 892; spammy,
    0. spammytokens: hammytokens:0.000-+--H*x:7.1.7, 0.000-+--H*UA:7.1.7,
    0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug, 0.000-+--H*x:reportbug Return-path: <marcin@owsiany.pl>
    Received: from mail-lf1-x133.google.com ([2a00:1450:4864:20::133])
    by buxtehude.debian.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SH