public inbox for systemtap-cvs@sourceware.org
help / color / mirror / Atom feed
* [SCM] systemtap: system-wide probe/trace tool branch, pr13539, created. release-1.6-683-gf916107
@ 2012-01-26 15:16 fche
  0 siblings, 0 replies; only message in thread
From: fche @ 2012-01-26 15:16 UTC (permalink / raw)
  To: systemtap-cvs

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".

The branch, pr13539 has been created
        at  f916107c257942a9fe962c0693c54a9869db166e (commit)

- Log -----------------------------------------------------------------
commit f916107c257942a9fe962c0693c54a9869db166e
Author: Srikar Dronamraju <srikar@linux.vnet.ibm.com>
Date:   Thu Jan 26 09:56:31 2012 -0500

    PR13539: fight uprobes unregister-vs-exit races
    
    While I still cannot see a reason how uprobe_{free,put}_process can
    race uprobe_report_{exit,exec}, I certainly think somebit of cleanup
    can be done.  However I am dont think we need to do a utask or uproc lookup
    from the table. Especially in case of callbacks.
    
    Mostly similar to what Jim proposed.
    I haven't tested this patch myself and I couldn't reproduce the problem.
    [fche corrected some typos and removed meddlesome printk's]

-----------------------------------------------------------------------


hooks/post-receive
--
systemtap: system-wide probe/trace tool


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2012-01-26 15:16 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-01-26 15:16 [SCM] systemtap: system-wide probe/trace tool branch, pr13539, created. release-1.6-683-gf916107 fche

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).