public inbox for systemtap-cvs@sourceware.org
help / color / mirror / Atom feed
* [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.4-238-g892ec39
@ 2011-04-12 20:30 scox
  0 siblings, 0 replies; only message in thread
From: scox @ 2011-04-12 20:30 UTC (permalink / raw)
  To: systemtap-cvs

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".

The branch, master has been updated
       via  892ec39acf1ad24813135b730b02f431dfa7109a (commit)
      from  e2d993da08cb9b7cbb03a6e9d8f4470b306ad6e9 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 892ec39acf1ad24813135b730b02f431dfa7109a
Author: Stan Cox <scox@redhat.com>
Date:   Tue Apr 12 16:25:15 2011 -0400

    Simplify V3 sdt argument mode handling.
    
    * tapsets.cxx (sdt_uprobe_var_expanding_visitor::visit_target_symbol_arg):
    Treat argument extraction as a 64 bit subexpression and handle its sign if needed.

-----------------------------------------------------------------------

Summary of changes:
 tapsets.cxx |   18 ++++++++----------
 1 files changed, 8 insertions(+), 10 deletions(-)


hooks/post-receive
--
systemtap: system-wide probe/trace tool


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2011-04-12 20:30 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2011-04-12 20:30 [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.4-238-g892ec39 scox

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).