From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 13032 invoked by alias); 30 Jul 2009 15:00:00 -0000 Received: (qmail 13023 invoked by uid 22791); 30 Jul 2009 15:00:00 -0000 X-SWARE-Spam-Status: No, hits=-2.5 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: sourceware.org Received: from mx2.redhat.com (HELO mx2.redhat.com) (66.187.237.31) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Thu, 30 Jul 2009 14:59:51 +0000 Received: from int-mx2.corp.redhat.com (int-mx2.corp.redhat.com [172.16.27.26]) by mx2.redhat.com (8.13.8/8.13.8) with ESMTP id n6UExn7n027573 for ; Thu, 30 Jul 2009 10:59:49 -0400 Received: from ns3.rdu.redhat.com (ns3.rdu.redhat.com [10.11.255.199]) by int-mx2.corp.redhat.com (8.13.1/8.13.1) with ESMTP id n6UExmCt028588; Thu, 30 Jul 2009 10:59:48 -0400 Received: from [127.0.0.1] (sebastian-int.corp.redhat.com [172.16.52.221]) by ns3.rdu.redhat.com (8.13.8/8.13.8) with ESMTP id n6UExkks031745; Thu, 30 Jul 2009 10:59:47 -0400 Subject: Re: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-0.9.8-214-g9ace370 From: Mark Wielaard To: systemtap@sourceware.org Cc: Josh Stone In-Reply-To: <20090729214027.21631.qmail@sourceware.org> References: <20090729214027.21631.qmail@sourceware.org> Content-Type: text/plain Date: Thu, 30 Jul 2009 15:00:00 -0000 Message-Id: <1248965986.29739.23.camel@springer.wildebeest.org> Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q3/txt/msg00256.txt.bz2 Hi Josh, On Wed, 2009-07-29 at 21:40 +0000, jistone@sourceware.org wrote: > commit 0a98fd42f87ef9217917931bd8a47e272a5664ce > Author: Josh Stone > Date: Wed Jul 29 14:07:37 2009 -0700 > > Enable variable listing (-L) for dwarf probes > > All $target variables and their C-types are now printed in -L mode. Very neat! Please do add a NEWS entry for this also. This is really useful. It did break one testcase though. FAIL: cmd_parse13: unexpected EOF The regexp doesn't expect all the new type information: -re {(syscall\.a[_a-zA-Z0-9]*(\ [_a-zA-Z0-9\$]+:(string|long|unknown| stats))*\r\n)+} Is it so that the $vars always come after to other variable? Then maybe we need to split this and only expect something like (\ $[_a-zA-Z0-9]+:[^$])* (untested) last? Cheers, Mark