diff options
author | Frank Ch. Eigler <fche@elastic.org> | 2010-02-19 17:45:50 -0500 |
---|---|---|
committer | Frank Ch. Eigler <fche@elastic.org> | 2010-02-19 17:45:50 -0500 |
commit | 489e3d510e3ed9bf4e3388084cc4de6e2749576a (patch) | |
tree | 3c9f0cc91b584e138ce39f37cfd15d5b62b0f43a /NEWS | |
parent | 83b38ce6107fc90de79e14edc0fea29d6dec7724 (diff) | |
download | systemtap-steved-489e3d510e3ed9bf4e3388084cc4de6e2749576a.tar.gz systemtap-steved-489e3d510e3ed9bf4e3388084cc4de6e2749576a.tar.xz systemtap-steved-489e3d510e3ed9bf4e3388084cc4de6e2749576a.zip |
PR11208: glue adjacent string literals together.
* parse.cxx (lexer::scan): Glue adjacent strings together.
* testsuite/parseko/twentyseven.stp, semok/thirtyfive.stp: New tests.
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 13 |
1 files changed, 11 insertions, 2 deletions
@@ -1,9 +1,18 @@ * What's new + +- Adjacent string literals are glued together, making this + construct valid: + probe process("/usr" @1 "/bin").function("*") { ... } + - In order to limit potential impact from future security problems, the stap-server process does not permit its being launched as root. -- New : systemtap now supports probes for Hardware Breakpoints on x86 - and x86_64. For syntax details, see man page for stapprobes. +- On recent kernels, for some architectures/configurations, hardware + breakpoint probes are supported. The probe point syntax is: + + probe kernel.data(ADDRESS).write + probe kernel.data(ADDRESS).length(LEN).write + probe kernel.data("SYMBOL_NAME").write * What's new in version 1.1 |