Your message dated Tue, 17 Jul 2007 15:03:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#431666: fixed in iperf 2.0.2-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: iperf
Version: 2.0.2-2
Severity: normal
Tags: patch

Please add patch from
http://dast.nlanr.net/Projects/Iperf2.0/patch-iperf-linux-2.6.21.txt

Comments from patch:
>Without this fix, iperf will get poor performance because the
>monitoring
>thread
>may hog the cpu, keeping the sender/receiver threads from running.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21-1-686 (SMP w/1 CPU core)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages iperf depends on:
ii  libc6                   2.5-11           GNU C Library: Shared libraries
ii  libgcc1                 1:4.2-20070627-1 GCC support library
ii  libstdc++6              4.2-20070627-1   The GNU Standard C++ Library v3

iperf recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: iperf
Source-Version: 2.0.2-3

We believe that the bug you reported is fixed in the latest version of
iperf, which is due to be installed in the Debian FTP archive:

iperf_2.0.2-3.diff.gz
  to pool/main/i/iperf/iperf_2.0.2-3.diff.gz
iperf_2.0.2-3.dsc
  to pool/main/i/iperf/iperf_2.0.2-3.dsc
iperf_2.0.2-3_i386.deb
  to pool/main/i/iperf/iperf_2.0.2-3_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roberto Lumbreras <[EMAIL PROTECTED]> (supplier of updated iperf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 17 Jul 2007 15:16:00 +0200
Source: iperf
Binary: iperf
Architecture: source i386
Version: 2.0.2-3
Distribution: unstable
Urgency: low
Maintainer: Roberto Lumbreras <[EMAIL PROTECTED]>
Changed-By: Roberto Lumbreras <[EMAIL PROTECTED]>
Description: 
 iperf      - Internet Protocol bandwidth measuring tool
Closes: 346099 431666
Changes: 
 iperf (2.0.2-3) unstable; urgency=low
 .
   * Added patch to fix poor performance with >= 2.6.21 kernels
    (closes: #431666).
   * Fix -t: cast to max_size_t instead of int (closes: #346099).
     Updated auto-makefiles and autoconf.
   * debian/rules: now using cdbs.
Files: 
 c349655821c0267dfdbdf3811a3b5c2e 574 net optional iperf_2.0.2-3.dsc
 95203a4fdc5e2cc6cc191b1c75fa8ea2 81543 net optional iperf_2.0.2-3.diff.gz
 54a1b07c8c849b6202414d33d0c65600 47612 net optional iperf_2.0.2-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGnNYtfIEQE/XJcI0RAgPjAJ9TrKavQUps6Ur0+iECmm5TaD5r6gCgrMyG
E+fPz8bb7YT6RcEo6bmLoHg=
=c3iV
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to