From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 60B8B385840D; Sat, 18 Sep 2021 21:18:27 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 60B8B385840D From: "wcohen at redhat dot com" To: elfutils-devel@sourceware.org Subject: [Bug backends/27925] riscv backend only provides return value locations for code compiled for LP64D ABI Date: Sat, 18 Sep 2021 21:18:27 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: elfutils X-Bugzilla-Component: backends X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: wcohen at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: unassigned at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: elfutils-devel@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Elfutils-devel mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Sep 2021 21:18:27 -0000 https://sourceware.org/bugzilla/show_bug.cgi?id=3D27925 --- Comment #1 from William Cohen --- Created attachment 13669 --> https://sourceware.org/bugzilla/attachment.cgi?id=3D13669&action=3Ded= it Possibe patch to provide return value information for lp64 abi This patch applies to elfutils 0.183 in fedora 33 and builds successfully.= =20 When running the systemtap examples testsuite there were a number of probe handlers that needed $return information what no longer complained about be= ing unable to find the $return like the following with the patched elfutils for pfault.stp example: $ sudo ../install/bin/stap -v testsuite/systemtap.examples/memory/pfaults.= stp=20 Pass 1: parsed user script and 462 library scripts using 307316virt/76224res/10492shr/65720data kb, in 3020usr/560sys/3602real ms. Pass 2: analyzed script: 3 probes, 7 functions, 2 embeds, 7 globals using 422972virt/182640res/11412shr/181376data kb, in 10500usr/1900sys/12425real = ms. Pass 3: translated to C into "/tmp/stapFHW9Zg/stap_aeb36ff31c1e99bccaad8645b97de810_4982_src.c" using 422972virt/182768res/11540shr/181376data kb, in 300usr/940sys/1247real ms. Pass 4: compiled C into "stap_aeb36ff31c1e99bccaad8645b97de810_4982.ko" in 51270usr/5930sys/51419real ms. Pass 5: starting run. ^CPass 5: run completed in 1350usr/2510sys/300065real ms. Previously with the unpatched elfutils: $ sudo ../install/bin/stap -v testsuite/systemtap.examples/memory/pfaults.= stp=20 Pass 1: parsed user script and 462 library scripts using 307316virt/76260res/10528shr/65720data kb, in 3710usr/640sys/4447real ms. semantic error: failed to retrieve return value location for handle_mm_fault [man error::dwarf] (mm/memory.c): identifier '$return' at /home/riscv/systemtap_write/install/share/systemtap/tapset/linux/memory.stp= :91:15 source: fault_type =3D $return ^ Pass 2: analyzed script: 3 probes, 6 functions, 2 embeds, 7 globals using 422972virt/182872res/11644shr/181376data kb, in 12180usr/2310sys/14710real = ms. Pass 2: analysis failed. [man error::pass2] --=20 You are receiving this mail because: You are on the CC list for the bug.=