Your message dated Thu, 17 Jun 2004 23:13:10 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#251276: fixed in kernel-patch-gcov 0.1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 27 May 2004 18:51:42 +0000 >From [EMAIL PROTECTED] Thu May 27 11:51:42 2004 Return-path: <[EMAIL PROTECTED]> Received: from dialup84-117.utvinternet.net (coll) [194.46.84.117] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1BTPye-00088e-00; Thu, 27 May 2004 11:51:42 -0700 Received: by coll (Postfix, from userid 1000) id DD8132369E; Thu, 27 May 2004 19:51:15 +0100 (IST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Alastair McKinstry <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: ITP: kernel-patch-2.6-gcov -- Extension to gcov to provide coverage information for the Linux Kernel X-Mailer: reportbug 2.60 Date: Thu, 27 May 2004 19:51:15 +0100 X-Debbugs-Cc: debian-devel@lists.debian.org Message-Id: <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: wnpp Severity: wishlist * Package name : kernel-patch-2.6-gcov Version : 2.6 Upstream Author : LTP project * URL : http://ltp.sourceforge.net/coverage/gcov-kernel.php * License : GPL Description : Extension to gcov to provide coverage information for the Linux Kernel GCOV-kernel is an extension of GCOV, a GNU tool which provides information about what parts of a program are actually executed (i.e. "covered") while running a particular test case. The extension provides GCOV support for the Linux kernel by implementing a coverage support infrastructure in the kernel, and a dynamic module (gcov-proc) for accessing data through the /proc filesystem. GCOV-kernel works with the GCOV user program, but enhanced analysis can be performed with the LCOV coverage analysis program. -- System Information: Debian Release: testing/unstable APT prefers experimental APT policy: (990, 'experimental'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.6-1-686 Locale: LANG=en, LC_CTYPE=en (ignored: LC_ALL set to ga_IE.UTF-8) --------------------------------------- Received: (at 251276-close) by bugs.debian.org; 18 Jun 2004 03:24:53 +0000 >From [EMAIL PROTECTED] Thu Jun 17 20:24:53 2004 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Bb9zp-0003bk-00; Thu, 17 Jun 2004 20:24:53 -0700 Received: from rdonald by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1Bb9oU-0003bT-00; Thu, 17 Jun 2004 23:13:10 -0400 From: Alastair McKinstry <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: lisa $Revision: 1.30 $ Subject: Bug#251276: fixed in kernel-patch-gcov 0.1 Message-Id: <[EMAIL PROTECTED]> Sender: Randall Donald <[EMAIL PROTECTED]> Date: Thu, 17 Jun 2004 23:13:10 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Source: kernel-patch-gcov Source-Version: 0.1 We believe that the bug you reported is fixed in the latest version of kernel-patch-gcov, which is due to be installed in the Debian FTP archive: kernel-patch-gcov_0.1.dsc to pool/main/k/kernel-patch-gcov/kernel-patch-gcov_0.1.dsc kernel-patch-gcov_0.1.tar.gz to pool/main/k/kernel-patch-gcov/kernel-patch-gcov_0.1.tar.gz kernel-patch-gcov_0.1_all.deb to pool/main/k/kernel-patch-gcov/kernel-patch-gcov_0.1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alastair McKinstry <[EMAIL PROTECTED]> (supplier of updated kernel-patch-gcov package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 2 Jun 2004 19:40:00 +0100 Source: kernel-patch-gcov Binary: kernel-patch-gcov Architecture: source all Version: 0.1 Distribution: unstable Urgency: low Maintainer: Alastair McKinstry <[EMAIL PROTECTED]> Changed-By: Alastair McKinstry <[EMAIL PROTECTED]> Description: kernel-patch-gcov - Linux Kernel Coverage patch Closes: 251276 Changes: kernel-patch-gcov (0.1) unstable; urgency=low . * Initial Release. Closes: #251276. Files: 78985b3c854be905a4a3a7de0dc918a4 539 devel extra kernel-patch-gcov_0.1.dsc 825e76b46dd69ab085c528237e0938d5 30977 devel extra kernel-patch-gcov_0.1.tar.gz 44d6fdeb8442ebf7f8c247e2b4b8d380 38004 devel extra kernel-patch-gcov_0.1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAv3zLQTK/kCo4XFcRArV2AJkBsWodoIq579um232/RKdzsEf6OwCfXP7e z/WnjP5QgwZUtg/OUp5yuV4= =pwaJ -----END PGP SIGNATURE-----