public inbox for systemtap-cvs@sourceware.org
help / color / mirror / Atom feed
* [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.4-143-gbd8504c
@ 2011-03-08 21:12 brolley
  0 siblings, 0 replies; only message in thread
From: brolley @ 2011-03-08 21:12 UTC (permalink / raw)
  To: systemtap-cvs

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".

The branch, master has been updated
       via  bd8504cf31aaf701272187aa202540917c4edb31 (commit)
      from  03c412911eeb0f737738286878ddad12fb075f97 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit bd8504cf31aaf701272187aa202540917c4edb31
Author: Dave Brolley <brolley@redhat.com>
Date:   Tue Mar 8 16:10:30 2011 -0500

    PR 12540 (rework) - Could not obtain information on password file" build error
    
    We should only attempt to sign the uprobes.ko module if we are root or
    stap-server.

-----------------------------------------------------------------------

Summary of changes:
 runtime/uprobes/Makefile |   23 +++++++++++++----------
 1 files changed, 13 insertions(+), 10 deletions(-)


hooks/post-receive
--
systemtap: system-wide probe/trace tool


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2011-03-08 21:12 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-03-08 21:12 [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.4-143-gbd8504c brolley

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).