Hi,

preliminary systemtap 2.1 packages are now available at

http://lindi.iki.fi/lindi/systemtap/debian/
http://anonscm.debian.org/gitweb/?p=collab-maint/systemtap.git;a=summary

systemtap (2.1-1~experimental1~try1) experimental; urgency=low

  * New upstream release (Closes: #690404, #701365, #701365)
    (LP: #803549, #1130626, #1075772).
  * Drop patches that are part of the new upstream release:
    - manpage-syntax1.diff
    - spelling-fixes1.diff
    - spelling-fixes2.diff
    - manpage-paths1.diff
    - fix.CVE-2012-0875.diff
  * Add patches that fix various lintian warnings:
    - 0001-man-stap.1-escape-minus-sign-properly.patch
    - 0002-man-stap.1-fix-typo.patch
    - 0003-man-stapprobes.3stap-escape-minus-sign-properly.patch
    - 0005-Add-missing-usr-bin-env-stap-to-some-examples.patch
    - 0006-man-stappaths.7-properly-escape-dot-in-the-beginning.patch
    - 0008-man-escape-quote-properly-in-header.patch
  * Upload to experimental since wheezy is frozen.
  * Drop systemtap-grapher binary package as it has been
    removed by upstream.
  * Add powerpcspe to the architecture list (Closes: #700161).
  * Bump Standards-Version to 3.9.4, no changes were needed.

There are still some things to do:

1) package the emacs mode
2) fix some lintian man page warnings
3) check if kprobe blacklist can be updated. A quick test shows that
   #604453 still occurs.

Also systemtap-server is still mostly non-functional. I don't feel like
shipping a service before I fully understand the security
implications. If somebody else has time to learn how all the certificate
magic works I'd appreciate help :)

-Timo


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to