Hi, preliminary systemtap 2.1 packages are now available at
http://lindi.iki.fi/lindi/systemtap/debian/ http://anonscm.debian.org/gitweb/?p=collab-maint/systemtap.git;a=summary systemtap (2.1-1~experimental1~try1) experimental; urgency=low * New upstream release (Closes: #690404, #701365, #701365) (LP: #803549, #1130626, #1075772). * Drop patches that are part of the new upstream release: - manpage-syntax1.diff - spelling-fixes1.diff - spelling-fixes2.diff - manpage-paths1.diff - fix.CVE-2012-0875.diff * Add patches that fix various lintian warnings: - 0001-man-stap.1-escape-minus-sign-properly.patch - 0002-man-stap.1-fix-typo.patch - 0003-man-stapprobes.3stap-escape-minus-sign-properly.patch - 0005-Add-missing-usr-bin-env-stap-to-some-examples.patch - 0006-man-stappaths.7-properly-escape-dot-in-the-beginning.patch - 0008-man-escape-quote-properly-in-header.patch * Upload to experimental since wheezy is frozen. * Drop systemtap-grapher binary package as it has been removed by upstream. * Add powerpcspe to the architecture list (Closes: #700161). * Bump Standards-Version to 3.9.4, no changes were needed. There are still some things to do: 1) package the emacs mode 2) fix some lintian man page warnings 3) check if kprobe blacklist can be updated. A quick test shows that #604453 still occurs. Also systemtap-server is still mostly non-functional. I don't feel like shipping a service before I fully understand the security implications. If somebody else has time to learn how all the certificate magic works I'd appreciate help :) -Timo -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org