public inbox for systemtap-cvs@sourceware.org
help / color / mirror / Atom feed
* [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.6-2-ge708135
@ 2011-07-26 17:41 fche
  0 siblings, 0 replies; only message in thread
From: fche @ 2011-07-26 17:41 UTC (permalink / raw)
  To: systemtap-cvs

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".

The branch, master has been updated
       via  e7081358cd9a9def036a0f0fef3290cbe5dc34f7 (commit)
      from  aff1eaa0f000454790d4cf658d884332216fa192 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit e7081358cd9a9def036a0f0fef3290cbe5dc34f7
Author: Frank Ch. Eigler <fche@redhat.com>
Date:   Tue Jul 26 13:26:37 2011 -0400

    stap-server security: use @PIELDFLAGS@ for all binaries
    
    * Makefile.am (stap-authorize-cert, stap-gen-cert, stap-serverd,
      stap-sign-module): Add @PIELDFLAGS@ to foo_LDFLAGS.

-----------------------------------------------------------------------

Summary of changes:
 Makefile.am |    6 ++++--
 Makefile.in |   10 ++++++----
 2 files changed, 10 insertions(+), 6 deletions(-)


hooks/post-receive
--
systemtap: system-wide probe/trace tool


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2011-07-26 17:41 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-07-26 17:41 [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.6-2-ge708135 fche

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).