* [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing
@ 2017-10-20 22:33 amerey at redhat dot com
2018-07-05 15:49 ` [Bug runtime/22330] " serhei.public at gmail dot com
` (5 more replies)
0 siblings, 6 replies; 7+ messages in thread
From: amerey at redhat dot com @ 2017-10-20 22:33 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
Bug ID: 22330
Summary: bpf: generate printf via event tuples, userspace
formatting postprocessing
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
Assignee: systemtap at sourceware dot org
Reporter: amerey at redhat dot com
Target Milestone: ---
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug runtime/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
@ 2018-07-05 15:49 ` serhei.public at gmail dot com
2018-08-09 14:34 ` [Bug bpf/22330] " me at serhei dot io
` (4 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: serhei.public at gmail dot com @ 2018-07-05 15:49 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
Serhei Makarov <serhei.public at gmail dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |serhei.public at gmail dot com
--- Comment #1 from Serhei Makarov <serhei.public at gmail dot com> ---
This is also relevant because the current trace_printk() mechanism is
discouraged on 'production kernels' and will log a prominent notice to that
effect to dmesg.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
2018-07-05 15:49 ` [Bug runtime/22330] " serhei.public at gmail dot com
@ 2018-08-09 14:34 ` me at serhei dot io
2018-08-20 15:58 ` me at serhei dot io
` (3 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: me at serhei dot io @ 2018-08-09 14:34 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
Serhei Makarov <me at serhei dot io> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |me at serhei dot io
Component|runtime |bpf
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
2018-07-05 15:49 ` [Bug runtime/22330] " serhei.public at gmail dot com
2018-08-09 14:34 ` [Bug bpf/22330] " me at serhei dot io
@ 2018-08-20 15:58 ` me at serhei dot io
2018-08-21 21:22 ` me at serhei dot io
` (2 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: me at serhei dot io @ 2018-08-20 15:58 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
--- Comment #2 from Serhei Makarov <me at serhei dot io> ---
As part of the reworking of printf() on stapbpf, large printf() invocations
should also be split up into a series of manageable ones. The following example
should work:
probe kernel.trace("netif_receive_skb"), kernel.trace("netif_rx"),
kernel.trace("net_dev_queue"), kernel.trace("napi_gro_receive_entry") {
printf("vars %s\n", $$vars);
}
Currently it fails with "too many arguments to print (19)".
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
` (2 preceding siblings ...)
2018-08-20 15:58 ` me at serhei dot io
@ 2018-08-21 21:22 ` me at serhei dot io
2018-10-17 21:28 ` me at serhei dot io
2018-10-24 21:17 ` me at serhei dot io
5 siblings, 0 replies; 7+ messages in thread
From: me at serhei dot io @ 2018-08-21 21:22 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
Serhei Makarov <me at serhei dot io> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |23435, 23559
Referenced Bugs:
https://sourceware.org/bugzilla/show_bug.cgi?id=23435
[Bug 23435] stapbpf transport layer can swallow a message before exit()
https://sourceware.org/bugzilla/show_bug.cgi?id=23559
[Bug 23559] stapbpf string literal support for octal and hex escape codes
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
` (3 preceding siblings ...)
2018-08-21 21:22 ` me at serhei dot io
@ 2018-10-17 21:28 ` me at serhei dot io
2018-10-24 21:17 ` me at serhei dot io
5 siblings, 0 replies; 7+ messages in thread
From: me at serhei dot io @ 2018-10-17 21:28 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
--- Comment #3 from Serhei Makarov <me at serhei dot io> ---
Another reason to rework printf() -- the trace_printk() implementation
hardcodes any string operands to 64 bytes:
https://github.com/torvalds/linux/blob/6b2edf27fe26c73cd67b6bf5ffb23dce882e1455/kernel/trace/bpf_trace.c#L226
Prioritizing this PR on account of the 64-byte trace_printk() limitation.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
* [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
` (4 preceding siblings ...)
2018-10-17 21:28 ` me at serhei dot io
@ 2018-10-24 21:17 ` me at serhei dot io
5 siblings, 0 replies; 7+ messages in thread
From: me at serhei dot io @ 2018-10-24 21:17 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
Serhei Makarov <me at serhei dot io> changed:
What |Removed |Added
----------------------------------------------------------------------------
Assignee|systemtap at sourceware dot org |me at serhei dot io
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2018-10-24 21:17 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-10-20 22:33 [Bug runtime/22330] New: bpf: generate printf via event tuples, userspace formatting postprocessing amerey at redhat dot com
2018-07-05 15:49 ` [Bug runtime/22330] " serhei.public at gmail dot com
2018-08-09 14:34 ` [Bug bpf/22330] " me at serhei dot io
2018-08-20 15:58 ` me at serhei dot io
2018-08-21 21:22 ` me at serhei dot io
2018-10-17 21:28 ` me at serhei dot io
2018-10-24 21:17 ` me at serhei dot io
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).