Fourth quarter 2013 Archives by date
Starting: Wed Oct 2 04:17:00 GMT 2013
Ending: Tue Dec 31 17:42:00 GMT 2013
Messages: 528
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Masami Hiramatsu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Masami Hiramatsu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- [Bug translator/15999] New: symbol-table-based fallback for foo.function() should resolve $$vars etc.
fche at redhat dot com
- Regarding systemtap support for AArch64
William Cohen
- [Bug translator/15999] symbol-table-based fallback for foo.function() should resolve $$vars etc.
lberk at redhat dot com
- Regarding systemtap support for AArch64
Masami Hiramatsu
- new systemtap snapshot available
fche@sourceware.org
- [PATCH v2 0/3] Perf support to SDT markers
Hemant Kumar
- [PATCH v2 1/3] SDT markers listing by perf:
Hemant Kumar
- [PATCH v2 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v2 3/3] Documentation regarding perf/sdt
Hemant Kumar
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Masami Hiramatsu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- [PATCH v2 0/3] Perf support to SDT markers
Frank Ch. Eigler
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- [PATCH v2 0/3] Perf support to SDT markers
Masami Hiramatsu
- [PATCH v2 1/3] SDT markers listing by perf:
Namhyung Kim
- [PATCH v2 2/3] Support for perf to probe into SDT markers:
Namhyung Kim
- [PATCH v2 0/3] Perf support to SDT markers
Namhyung Kim
- [PATCH v2 1/3] SDT markers listing by perf:
Masami Hiramatsu
- [PATCH v2 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v2 0/3] Perf support to SDT markers
Hemant
- [PATCH v2 1/3] SDT markers listing by perf:
Hemant
- [PATCH v2 2/3] Support for perf to probe into SDT markers:
Hemant
- [PATCH v2 0/3] Perf support to SDT markers
Hemant
- [PATCH v2 1/3] SDT markers listing by perf:
Hemant
- [PATCH v2 2/3] Support for perf to probe into SDT markers:
Hemant
- [PATCH v2 0/3] Perf support to SDT markers
Hemant
- [Bug tapsets/15219] syscall.exp failures on RHEL5, RHEL6, and rawhide
dsmith at redhat dot com
- [Bug tapsets/15219] syscall.exp failures on RHEL5, RHEL6, and rawhide
dsmith at redhat dot com
- [Bug translator/16019] New: limit number of similar semantic errors output
jlebon at redhat dot com
- [Bug translator/16019] limit number of similar semantic errors output
jlebon at redhat dot com
- new systemtap snapshot available
fche@sourceware.org
- [Bug translator/16019] limit number of similar semantic errors output
siarhei_labyka at epam dot com
- [Bug translator/16019] limit number of similar semantic errors output
fche at redhat dot com
- [Bug runtime/9822] reduce timer load
fche at redhat dot com
- Regarding systemtap support for AArch64
William Cohen
- Regarding systemtap support for AArch64
William Cohen
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
William Cohen
- Regarding systemtap support for AArch64
Masami Hiramatsu
- [Bug translator/16019] limit number of similar semantic errors output
siarhei_labyka at epam dot com
- [Bug translator/16019] limit number of similar semantic errors output
siarhei_labyka at epam dot com
- [Bug translator/16019] limit number of similar semantic errors output
siarhei_labyka at epam dot com
- Regarding systemtap support for AArch64
William Cohen
- Regarding systemtap support for AArch64
William Cohen
- [Bug tapsets/16057] New: task_dentry_path fails to cross mount points
jistone at redhat dot com
- [Bug tapsets/16057] task_dentry_path fails to cross mount points
jistone at redhat dot com
- [Bug tapsets/15961] nd_syscall.exp failure on i686
dsmith at redhat dot com
- [Bug tapsets/16058] New: syscall.mmap/nd_syscall.mmap probe alias problem
dsmith at redhat dot com
- [Bug tapsets/16058] syscall.mmap/nd_syscall.mmap probe alias problem
dsmith at redhat dot com
- [Bug tapsets/15913] on s390x, nd_syscall.execve fails when accessing filename
dsmith at redhat dot com
- [Bug tapsets/15913] on s390x, nd_syscall testsuite failures when accessing arguments 1 and 6
dsmith at redhat dot com
- [Bug tapsets/15961] nd_syscall.exp failure on i686
dsmith at redhat dot com
- [PATCH v3 0/3] Perf support to SDT markers
Hemant Kumar
- [PATCH v3 1/3] SDT markers listing by perf:
Hemant Kumar
- [PATCH v3 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v3 3/3] Documentation regarding perf/sdt
Hemant Kumar
- [Bug runtime/13078] investigate qemu virtio-serial channel for talking to stap-sh
jlebon at redhat dot com
- [PATCH v3 0/3] Perf support to SDT markers
Hemant Kumar
- [PATCH v3 1/3] SDT markers listing by perf:
Hemant Kumar
- [PATCH v3 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v3 3/3] Documentation regarding perf/sdt
Hemant Kumar
- [PATCH v3 0/3] Perf support to SDT markers
Hemant
- [Bug tapsets/16058] syscall.mmap/nd_syscall.mmap probe alias problem
dsmith at redhat dot com
- [Bug translator/16019] limit number of similar semantic errors output
jlebon at redhat dot com
- [Bug translator/16019] limit number of similar semantic errors output
jlebon at redhat dot com
- [Bug translator/16019] limit number of similar semantic errors output
jlebon at redhat dot com
- rootkits and hidden processes
ch2009@arcor.de
- new systemtap snapshot available
fche@sourceware.org
- [PATCH v3 1/3] SDT markers listing by perf:
Masami Hiramatsu
- [PATCH v3 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v3 1/3] SDT markers listing by perf:
Hemant Kumar
- [PATCH v3 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- rootkits and hidden processes
Josh Stone
- Monitoring cpu time in us (or even ns?)
corpaul
- Monitoring cpu time in us (or even ns?)
Frank Ch. Eigler
- [PATCH v4 0/3] perf support to SDT markers
Hemant Kumar
- [PATCH v4 1/3] SDT markers listing by perf:
Hemant Kumar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v4 3/3] Documentation regarding perf/sdt
Hemant Kumar
- Monitoring cpu time in us (or even ns?)
Cor-paul Bezemer - EWI
- Monitoring cpu time in us (or even ns?)
Frank Ch. Eigler
- [Bug translator/16019] limit number of similar semantic errors output
siarhei_labyka at epam dot com
- Regarding systemtap support for AArch64
William Cohen
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Sandeepa Prabhu
- Regarding systemtap support for AArch64
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- Regarding systemtap support for AArch64
William Cohen
- ARM linux-3.11.1-300.fc19.armv7hl incorrect handling uint16_t in probe_kernel_read() probe_kernel_write() functions
William Cohen
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Srikar Dronamraju
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
David Ahern
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Ingo Molnar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Frank Ch. Eigler
- new systemtap snapshot available
fche@sourceware.org
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Ingo Molnar
- help!! could I debug a loadable module with systemtap
Frank Ch. Eigler
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- Regarding systemtap support for AArch64
William Cohen
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Srikar Dronamraju
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
David Ahern
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Srikar Dronamraju
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [Bug runtime/16096] New: on i686, the nd_syscall tapset is broken
dsmith at redhat dot com
- [Bug translator/16097] New: improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Namhyung Kim
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Namhyung Kim
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Mark Wielaard
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [Bug runtime/16096] on i686, the nd_syscall tapset is broken
dsmith at redhat dot com
- [Bug runtime/16096] on i686, the nd_syscall tapset is broken
dsmith at redhat dot com
- [PATCH] Fix typo in man/stap.1
Masanari Iida
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Masami Hiramatsu
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Pekka Enberg
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Hemant Kumar
- [Bug translator/16019] limit number of similar semantic errors output
jlebon at redhat dot com
- Recent ARM systemtap test results using a kernel with uprobe support
William Cohen
- Recent ARM systemtap test results using a kernel with uprobe support
David Long
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Ingo Molnar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Mark Wielaard
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Ingo Molnar
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Peter Zijlstra
- [PATCH v4 2/3] Support for perf to probe into SDT markers:
Mark Wielaard
- [Bug tapsets/15219] syscall.exp failures on RHEL5, RHEL6, and rawhide
dsmith at redhat dot com
- Regarding systemtap support for AArch64
William Cohen
- new systemtap snapshot available
fche@sourceware.org
- [Fwd: Re: Regarding systemtap support for AArch64]
Petr Machata
- [Fwd: Re: Regarding systemtap support for AArch64]
Petr Machata
- [Fwd: Re: Regarding systemtap support for AArch64]
Mark Wielaard
- [Fwd: Re: Regarding systemtap support for AArch64]
William Cohen
- [Fwd: Re: Regarding systemtap support for AArch64]
Petr Machata
- [PATCH] Fix typo in man/error::7stap
Masanari Iida
- [Fwd: Re: Regarding systemtap support for AArch64]
William Cohen
- [PATCH] Fix typo in man/error::7stap
Mark Wielaard
- Segmenation fault for systemtap tests using the arm uprobes support
William Cohen
- Segmenation fault for systemtap tests using the arm uprobes support
David Long
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
Petr Machata
- Segmenation fault for systemtap tests using the arm uprobes support
William Cohen
- Segmenation fault for systemtap tests using the arm uprobes support
David Long
- Segmenation fault for systemtap tests using the arm uprobes support
William Cohen
- SystemTap 2.4 release
Jonathan Lebon
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- Unable to access function parameters
Sergey Oboguev
- [Bug runtime/16131] New: CONFIG_USER_NS support
fche at redhat dot com
- Unable to access function parameters
Josh Stone
- Unable to access function parameters
Frank Ch. Eigler
- [Bug runtime/16132] New: staprun/stapio confused by presence of traceN files
fche at redhat dot com
- [Bug runtime/16132] staprun/stapio confused by presence of traceN files
fche at redhat dot com
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
William Cohen
- [Fwd: Re: Regarding systemtap support for AArch64]
William Cohen
- Unable to access function parameters
Sergey Oboguev
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- kprobes-systemtap validation on AArch64
Sandeepa Prabhu
- [PATCH] don't require .config and Module.symvers for dyninst runtime
Adrian Negreanu
- [Bug tapsets/14325] for arm, the nd_syscall tapsets need improvement
dsmith at redhat dot com
- Segmenation fault for systemtap tests using the arm uprobes support
David Long
- [Fwd: Re: Regarding systemtap support for AArch64]
William Cohen
- Curly brace outside macro conditional typo
Miroslav Franc
- Curly brace outside macro conditional typo
David Smith
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- Failed to compile after 86aae990179c7
Masanari Iida
- [Bug translator/16097] improve error message on array type mismatch
jlebon at redhat dot com
- [Bug translator/16161] New: Multiple address problems with symtab functions
jistone at redhat dot com
- [Bug translator/16161] Multiple address problems with symtab functions
mjw at redhat dot com
- [Bug translator/16162] New: plt addresses are incorrect for prelinked libraries
jistone at redhat dot com
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)
Robin Hack
- [Bug translator/16165] New: @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- Failed to compile after 86aae990179c7
Mark Wielaard
- [Bug translator/16166] New: stap -vvv causes SIGSEGV when using @perf operator
jlebon at redhat dot com
- [Bug translator/16166] stap -vvv causes SIGSEGV when using @perf operator
jlebon at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jistone at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [PATCH] examples: Print header once in interrupts-by-dev.stp
Aaron Tomlin
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)
Frank Ch. Eigler
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [Bug translator/16162] plt addresses are incorrect for prelinked libraries
jistone at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- [Bug translator/16165] @perf operator in error msgs is corrupted
jlebon at redhat dot com
- Systemtap and UEFI Secure Boot
David Smith
- [Bug testsuite/16175] New: on ppc64, getting mmap syscall and nd_syscall testsuite failures
dsmith at redhat dot com
- [Bug testsuite/16176] New: on ia32, the trunc nd_syscall.exp subtest fails
dsmith at redhat dot com
- [Bug runtime/2035] investigate boot-time probing
jlebon at redhat dot com
- [Bug testsuite/16175] on ppc64, getting mmap syscall and nd_syscall testsuite failures
dsmith at redhat dot com
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)
Robin Hack
- [Bug testsuite/16176] on ia32, the trunc nd_syscall.exp subtest fails
dsmith at redhat dot com
- [Bug tapsets/16184] New: The rt_sigprocmask syscall subtest fails
dsmith at redhat dot com
- [Bug testsuite/16175] on ppc64, getting mmap syscall and nd_syscall testsuite failures
jistone at redhat dot com
- [Bug testsuite/16175] on ppc64, getting mmap syscall and nd_syscall testsuite failures
dsmith at redhat dot com
- [Bug tapsets/16184] The rt_sigprocmask syscall subtest fails
jistone at redhat dot com
- [Bug tapsets/16187] New: the 'sendfile' syscall.exp/nd_syscall.exp test fails
dsmith at redhat dot com
- [Bug tapsets/16187] the 'sendfile' syscall.exp/nd_syscall.exp test fails
dsmith at redhat dot com
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- [PATCH -tip v3 01/23] kprobes: Prohibit probing on .entry.text code
Masami Hiramatsu
- [PATCH -tip v3 03/23] kprobes: Show blacklist entries via debugfs
Masami Hiramatsu
- [PATCH -tip v3 02/23] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Masami Hiramatsu
- [PATCH -tip v3 04/23] kprobes: Support blacklist functions in module
Masami Hiramatsu
- [PATCH -tip v3 05/23] kprobes: Use NOKPROBE_SYMBOL() in sample modules
Masami Hiramatsu
- [PATCH -tip v3 06/23] kprobes/x86: Allow probe on some kprobe preparation functions
Masami Hiramatsu
- [PATCH -tip v3 07/23] kprobes/x86: Use NOKPROBE_SYMBOL instead of __kprobes
Masami Hiramatsu
- [PATCH -tip v3 08/23] kprobes: Allow probe on some kprobe functions
Masami Hiramatsu
- [PATCH -tip v3 09/23] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes
Masami Hiramatsu
- [PATCH -tip v3 10/23] ftrace/kprobes: Allow probing on some preparation functions
Masami Hiramatsu
- [PATCH -tip v3 11/23] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v3 12/23] x86/hw_breakpoint: Use NOKPROBE_SYMBOL macro in hw_breakpoint
Masami Hiramatsu
- [PATCH -tip v3 13/23] x86/trap: Use NOKPROBE_SYMBOL macro in trap.c
Masami Hiramatsu
- [PATCH -tip v3 14/23] x86/fault: Use NOKPROBE_SYMBOL macro in fault.c
Masami Hiramatsu
- [PATCH -tip v3 15/23] x86/alternative: Use NOKPROBE_SYMBOL macro in alternative.c
Masami Hiramatsu
- [PATCH -tip v3 16/23] x86/nmi: Use NOKPROBE_SYMBOL macro for nmi handlers
Masami Hiramatsu
- [PATCH -tip v3 17/23] x86/kvm: Use NOKPROBE_SYMBOL macro in kvm.c
Masami Hiramatsu
- [PATCH -tip v3 22/23] sched: Use NOKPROBE_SYMBOL macro in sched
Masami Hiramatsu
- [PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
Masami Hiramatsu
- [PATCH -tip v3 20/23] [BUGFIX] kprobes: Prohibit probing on func_ptr_is_kernel_text
Masami Hiramatsu
- [PATCH -tip v3 19/23] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
Masami Hiramatsu
- [PATCH -tip v3 21/23] notifier: Use NOKPROBE_SYMBOL macro in notifier
Masami Hiramatsu
- [PATCH -tip v3 23/23] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text
Masami Hiramatsu
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Frank Ch. Eigler
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Ingo Molnar
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Frank Ch. Eigler
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Steven Rostedt
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Josh Stone
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Ingo Molnar
- [PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
Ingo Molnar
- [PATCH] Add STAP_ERROR macro
Aaron Tomlin
- [PATCH] Add STAP_ERROR macro
Josh Stone
- [PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
Masami Hiramatsu
- Segmenation fault for systemtap tests using the arm uprobes support
William Cohen
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- Segmenation fault for systemtap tests using the arm uprobes support
David Long
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- [PATCH v2] Add STAP_ERROR macro
Aaron Tomlin
- [PATCH] Add loadavg tapset
Aaron Tomlin
- [Bug tapsets/16207] New: on rawhide, we're getting more syscall.exp failures
dsmith at redhat dot com
- [PATCH -tip v3 13/23] x86/trap: Use NOKPROBE_SYMBOL macro in trap.c
Andi Kleen
- [PATCH -tip v3 13/23] x86/trap: Use NOKPROBE_SYMBOL macro in trap.c
Masami Hiramatsu
- [Bug testsuite/16247] New: Some examples don't work on RHEL5
jlebon at redhat dot com
- [Bug testsuite/16248] New: pfiles example fails to build on RHEL7
jlebon at redhat dot com
- [Bug testsuite/16247] Some examples don't work on RHEL5
jlebon at redhat dot com
- [Bug translator/16249] New: Add support for variadic stap macros
jistone at redhat dot com
- [Bug dyninst/16250] New: Allow triggering remote gdb through stapdyn
jistone at redhat dot com
- Segmenation fault for systemtap tests using the arm uprobes support
David Long
- [PATCH v2] Add loadavg tapset
Aaron Tomlin
- [Bug tapsets/16207] on rawhide, we're getting more syscall.exp failures
dsmith at redhat dot com
- Segmenation fault for systemtap tests using the arm uprobes support
William Cohen
- [PATCH -tip v3 13/23] x86/trap: Use NOKPROBE_SYMBOL macro in trap.c
Masami Hiramatsu
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
Petr Machata
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [Fwd: Re: Regarding systemtap support for AArch64]
Sandeepa Prabhu
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Ingo Molnar
- New location for aarch64 Fedora 19 packages
William Cohen
- Results for arm uprobes-v3 posted
William Cohen
- Results for arm uprobes-v3 posted
David Long
- Results for arm uprobes-v3 posted
William Cohen
- New location for aarch64 Fedora 19 packages
Sandeepa Prabhu
- [PATCH -tip v3 02/23] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Masami Hiramatsu
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- [Bug tapsets/16273] New: irq_handler probe doesn't work on RHEL5 kernel
mcermak at redhat dot com
- [Bug tapsets/16273] irq_handler probe doesn't work on RHEL5 kernel
atomlin at redhat dot com
- New location for aarch64 Fedora 19 packages
William Cohen
- [Bug translator/16276] New: resource limits interfering with buildrun.cxx make -j
fche at redhat dot com
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
fche at redhat dot com
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Ingo Molnar
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
Masanari Iida
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
standby24x7 at gmail dot com
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
mjw at redhat dot com
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
Masanari Iida
- [Bug translator/16276] resource limits interfering with buildrun.cxx make -j
standby24x7 at gmail dot com
- [Bug runtime/16278] New: orphaned stapsh goes to 100% CPU after stap closing
jlebon at redhat dot com
- [Bug runtime/16278] orphaned stapsh goes to 100% CPU after stap closing
jlebon at redhat dot com
- [PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist
Masami Hiramatsu
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)]
Robin Hack
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)]
Robin Hack
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- [Bug tapsets/16273] irq_handler probe doesn't work on RHEL5 kernel
dsmith at redhat dot com
- An attempt for systemtap "make installcheck" AArch64
Sandeepa Prabhu
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- [Bug testsuite/16248] pfiles example fails to build on RHEL7
dsmith at redhat dot com
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 1/6] kprobes: Prohibit probing on .entry.text code
Masami Hiramatsu
- [PATCH -tip v4 2/6] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Masami Hiramatsu
- [PATCH -tip v4 3/6] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
Masami Hiramatsu
- [PATCH -tip v4 4/6] [BUGFIX] x86: Prohibit probing on native_set_debugreg
Masami Hiramatsu
- [PATCH -tip v4 5/6] [BUGFIX] x86: Prohibit probing on thunk functions and restore
Masami Hiramatsu
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Masami Hiramatsu
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Steven Rostedt
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Sandeepa Prabhu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Ingo Molnar
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Sandeepa Prabhu
- [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)]
Robin Hack
- [Bug uprobes/15785] Failure to resolve symbols defined as indirect functions for user-space libraries
alexander.hoole at ece dot uvic.ca
- [Bug kprobes/2725] function("*") probes sometimes crash & burn
fche at redhat dot com
- [Bug runtime/2035] investigate boot-time probing
jlebon at redhat dot com
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [Bug translator/15785] Failure to resolve symbols defined as indirect functions for user-space libraries
fche at redhat dot com
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Ingo Molnar
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Sandeepa Prabhu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Frank Ch. Eigler
- [Bug translator/15785] Failure to resolve symbols defined as IFUNC (indirect functions) for user-space libraries
fche at redhat dot com
- [Bug translator/15785] Failure to resolve symbols defined as IFUNC (indirect functions) for user-space libraries
mjw at redhat dot com
- [Bug translator/15785] Failure to resolve symbols defined as IFUNC (indirect functions) for user-space libraries
lberk at redhat dot com
- [Bug translator/15785] Failure to resolve symbols defined as IFUNC (indirect functions) for user-space libraries
alexander.hoole at ece dot uvic.ca
- [RFC PATCH tip 0/5] tracing filters with BPF
Frank Ch. Eigler
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Sandeepa Prabhu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Frank Ch. Eigler
- [Bug translator/16300] New: suppress statement-counting protections in loop-free non-recursive probe handlers
fche at redhat dot com
- RFC stap/java backtracing
Lukas Berk
- [Bug translator/16300] suppress statement-counting protections in loop-free non-recursive probe handlers
jistone at redhat dot com
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Frank Ch. Eigler
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v5 00/18] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v5 01/18] kprobes: Prohibit probing on .entry.text code
Masami Hiramatsu
- [PATCH -tip v5 02/18] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Masami Hiramatsu
- [PATCH -tip v5 03/18] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
Masami Hiramatsu
- [PATCH -tip v5 04/18] [BUGFIX] x86: Prohibit probing on native_set_debugreg
Masami Hiramatsu
- [PATCH -tip v5 05/18] [BUGFIX] x86: Prohibit probing on thunk functions and restore
Masami Hiramatsu
- [PATCH -tip v5 06/18] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Masami Hiramatsu
- [PATCH -tip v5 07/18] kprobes/x86: Allow probe on some kprobe preparation functions
Masami Hiramatsu
- [PATCH -tip v5 08/18] kprobes: Allow probe on some kprobe functions
Masami Hiramatsu
- [PATCH -tip v5 09/18] ftrace/kprobes: Allow probing on some preparation functions
Masami Hiramatsu
- [PATCH -tip v5 10/18] x86: Use NOKPROBE_SYMBOL() instead of __kprobes annotation
Masami Hiramatsu
- [PATCH -tip v5 11/18] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes
Masami Hiramatsu
- [PATCH -tip v5 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v5 13/18] notifier: Use NOKPROBE_SYMBOL macro in notifier
Masami Hiramatsu
- [PATCH -tip v5 14/18] sched: Use NOKPROBE_SYMBOL macro in sched
Masami Hiramatsu
- [PATCH -tip v5 15/18] kprobes: Show blacklist entries via debugfs
Masami Hiramatsu
- [PATCH -tip v5 16/18] kprobes: Support blacklist functions in module
Masami Hiramatsu
- [PATCH -tip v5 17/18] kprobes: Use NOKPROBE_SYMBOL() in sample modules
Masami Hiramatsu
- [PATCH -tip v5 18/18] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text
Masami Hiramatsu
- [PATCH -tip v5 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Steven Rostedt
- [Bug translator/16306] New: adapt to new _kprobe_blacklist kernel mechanism if adopted
fche at redhat dot com
- [Bug testsuite/16307] New: ubuntu 12.04 /bin/kill no likey new kill -SIG -- -[exp_pid]
fche at redhat dot com
- [Bug testsuite/16307] ubuntu 12.04 /bin/kill no likey new kill -SIG -- -[exp_pid]
mjw at redhat dot com
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- [PATCH -tip v5 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v5.1 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Ingo Molnar
- [Bug server/16309] New: SELinux prevents stap-serverd from opening the current dir when spawning processes
jlebon at redhat dot com
- [Bug server/16309] SELinux prevents stap-serverd from opening the current dir when spawning processes
jlebon at redhat dot com
- [Bug tapsets/16311] New: need to add pwritev() syscall support to the syscall/nd_syscall tapsets
dsmith at redhat dot com
- [Bug tapsets/16312] New: need to add preadv() syscall support to the syscall/nd_syscall tapsets
dsmith at redhat dot com
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v5 13/18] notifier: Use NOKPROBE_SYMBOL macro in notifier
Masami Hiramatsu
- [PATCH -tip v5 13/18] notifier: Use NOKPROBE_SYMBOL macro in notifier
Masami Hiramatsu
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Jiri Kosina
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Ingo Molnar
- [Bug tapsets/16311] need to add pwritev() syscall support to the syscall/nd_syscall tapsets
dsmith at redhat dot com
- [Bug runtime/16319] New: on sysvinit systems, virtio-serial port hotplugging fails
jlebon at redhat dot com
- [Bug runtime/16319] on sysvinit systems, virtio-serial port hotplugging fails
jlebon at redhat dot com
- [Bug runtime/16278] orphaned stapsh goes to 100% CPU after stap closing
jlebon at redhat dot com
- [Bug tapsets/16312] need to add preadv() syscall support to the syscall/nd_syscall tapsets
dsmith at redhat dot com
- [PATCH -tip v5.1 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Steven Rostedt
- Role of svc_entry macro with 64 bytes in kprobes/systemtap on ARM
Jey Jay
- [PATCH -tip v5.1 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Jiri Kosina
- [PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Ingo Molnar
- [Bug translator/15781] improve pass-2 function suggestions
jlebon at redhat dot com
- [Bug testsuite/15807] need more serious workload program for examples vice -c sleep 0.2
scox at redhat dot com
- uprobes-v4 branch now available
David Long
- Role of svc_entry macro with 64 bytes in kprobes/systemtap on ARM
Josh Stone
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Josh Stone
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- [Bug testsuite/16325] New: client.exp contains duplicate check
mcermak at redhat dot com
- [Bug testsuite/16326] New: client.exp and local stap-server interactions
mcermak at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
mcermak at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
brolley at redhat dot com
- An attempt for systemtap "make installcheck" AArch64
Sandeepa Prabhu
- [PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs
Masami Hiramatsu
- An attempt for systemtap "make installcheck" AArch64
William Cohen
- [Bug kprobes/16331] New: stap missing radeon tracepoints
mcermak at redhat dot com
- [Bug translator/16331] stap missing radeon tracepoints
fche at redhat dot com
- [Bug translator/16331] stap missing radeon tracepoints
mcermak at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug testsuite/16325] client.exp contains duplicate check
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
mcermak at redhat dot com
- [Bug server/16342] New: stap --list-servers lists spurious line when having two stap-serverd instances
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug server/16342] stap --list-servers lists spurious line when having two stap-serverd instances
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v6 01/22] kprobes: Prohibit probing on .entry.text code
Masami Hiramatsu
- [PATCH -tip v6 02/22] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist
Masami Hiramatsu
- [PATCH -tip v6 03/22] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*
Masami Hiramatsu
- [PATCH -tip v6 05/22] [BUGFIX] x86: Prohibit probing on thunk functions and restore
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip v6 04/22] [BUGFIX] x86: Prohibit probing on native_set_debugreg/load_idt
Masami Hiramatsu
- [PATCH -tip v6 07/22] kprobes/x86: Call exception handlers directly from do_int3/do_debug
Masami Hiramatsu
- [PATCH -tip v6 08/22] kprobes/x86: Allow probe on some kprobe preparation functions
Masami Hiramatsu
- [PATCH -tip v6 09/22] kprobes: Allow probe on some kprobe functions
Masami Hiramatsu
- [PATCH -tip v6 10/22] ftrace/kprobes: Allow probing on some preparation functions
Masami Hiramatsu
- [PATCH -tip v6 11/22] x86: Allow kprobes on text_poke/hw_breakpoint
Masami Hiramatsu
- [PATCH -tip v6 12/22] x86: Use NOKPROBE_SYMBOL() instead of __kprobes annotation
Masami Hiramatsu
- [PATCH -tip v6 13/22] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes
Masami Hiramatsu
- [PATCH -tip v6 14/22] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace
Masami Hiramatsu
- [PATCH -tip v6 15/22] notifier: Use NOKPROBE_SYMBOL macro in notifier
Masami Hiramatsu
- [PATCH -tip v6 16/22] sched: Use NOKPROBE_SYMBOL macro in sched
Masami Hiramatsu
- [PATCH -tip v6 17/22] kprobes: Show blacklist entries via debugfs
Masami Hiramatsu
- [PATCH -tip v6 18/22] kprobes: Support blacklist functions in module
Masami Hiramatsu
- [PATCH -tip v6 19/22] kprobes: Use NOKPROBE_SYMBOL() in sample modules
Masami Hiramatsu
- [PATCH -tip v6 20/22] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text
Masami Hiramatsu
- [PATCH -tip v6 21/22] kprobes/x86: Remove unneeded preempt_disable/enable in interrupt handlers
Masami Hiramatsu
- [PATCH -tip v6 22/22] [RFC] kprobes/x86: Add emergency recovery process for bad kprobes
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Frank Ch. Eigler
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Ingo Molnar
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip 0/3] perf-probe: Dwarf support for uprobes
Masami Hiramatsu
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events
Masami Hiramatsu
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Ingo Molnar
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Frank Ch. Eigler
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- [PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events
Arnaldo Carvalho de Melo
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Arnaldo Carvalho de Melo
- uprobes-v4 branch now available
William Cohen
- [Bug translator/16358] New: build-id difficulties with hand-built kernels
fche at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug server/16342] stap --list-servers lists spurious line when having two stap-serverd instances
jlebon at redhat dot com
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [Bug translator/16358] build-id difficulties with hand-built kernels
mjw at redhat dot com
- [Bug translator/16358] build-id difficulties with hand-built kernels
mjw at redhat dot com
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events
Masami Hiramatsu
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Namhyung Kim
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Namhyung Kim
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Ingo Molnar
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- [PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events
Arnaldo Carvalho de Melo
- [Bug testsuite/16326] client.exp and local stap-server interactions
mcermak at redhat dot com
- [Bug server/16342] stap --list-servers lists spurious line when having two stap-serverd instances
mcermak at redhat dot com
- [PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events
Masami Hiramatsu
- [PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Namhyung Kim
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Namhyung Kim
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes
Masami Hiramatsu
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Masami Hiramatsu
- [Bug testsuite/16326] client.exp and local stap-server interactions
jlebon at redhat dot com
- [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset
Jovi Zhangwei
- [PATCH -tip v2 0/2] perf-probe: Dwarf support for uprobes
Masami Hiramatsu
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip v2 2/2] perf-probe: Support basic dwarf-based operations on uprobe events
Masami Hiramatsu
- [Bug translator/13420] prologue detection fails for function parameters in unoptimized (-g only, no -O) code
fche at redhat dot com
- [Bug translator/13420] prologue detection fails for function parameters in unoptimized (-g only, no -O) code
fche at redhat dot com
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
David Ahern
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- [PATCH -tip v2 2/2] perf-probe: Support basic dwarf-based operations on uprobe events
David Ahern
- [PATCH -tip v2 2/2] perf-probe: Support basic dwarf-based operations on uprobe events
Arnaldo Carvalho de Melo
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
Masami Hiramatsu
- [PATCH -tip v2 2/2] perf-probe: Support basic dwarf-based operations on uprobe events
Masami Hiramatsu
- maxactive(NNNN) usage
Jey Jay
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
David Ahern
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- [PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- [PATCH 43/49] perf probe: Support basic dwarf-based operations on uprobe events
Arnaldo Carvalho de Melo
- [PATCH 42/49] perf probe: Expand given path to absolute path
Arnaldo Carvalho de Melo
- report a segment fault bug of systemtap
maliubiao
- report a segment fault bug of systemtap
maliubiao
- [Bug runtime/16378] New: in-kernel utrace problem with 2.6.32: implicit declaration of function 'do_each_thread' in task_finder.c
fahadaliarshad at gmail dot com
- [Bug translator/14226] semantic error: missing x86_64 kernel/module debuginfo under '...' while resolving probe point kernel.function("vfs_read").return
sourceware.org at ch dot pkts.ca
Last message date:
Tue Dec 31 17:42:00 GMT 2013
Archived on: Sun Mar 8 15:00:17 GMT 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).