public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug bpf/23559] New: stapbpf string literal support for octal and hex escape codes
@ 2018-08-21 21:21 me at serhei dot io
  2018-08-21 21:22 ` [Bug bpf/23559] " me at serhei dot io
  2018-10-24 21:19 ` me at serhei dot io
  0 siblings, 2 replies; 3+ messages in thread
From: me at serhei dot io @ 2018-08-21 21:21 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=23559

            Bug ID: 23559
           Summary: stapbpf string literal support for octal and hex
                    escape codes
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: bpf
          Assignee: systemtap at sourceware dot org
          Reporter: me at serhei dot io
  Target Milestone: ---

I've written a patch for this. But currently, it's not enabled because putting
arbitrary non-printing characters into the trace_printk() buffer seems to be a
good recipe for chaos.

So this issue also depends on PR22330.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug bpf/23559] stapbpf string literal support for octal and hex escape codes
  2018-08-21 21:21 [Bug bpf/23559] New: stapbpf string literal support for octal and hex escape codes me at serhei dot io
@ 2018-08-21 21:22 ` me at serhei dot io
  2018-10-24 21:19 ` me at serhei dot io
  1 sibling, 0 replies; 3+ messages in thread
From: me at serhei dot io @ 2018-08-21 21:22 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=23559

Serhei Makarov <me at serhei dot io> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Depends on|                            |22330


Referenced Bugs:

https://sourceware.org/bugzilla/show_bug.cgi?id=22330
[Bug 22330] bpf: generate printf via event tuples, userspace formatting
postprocessing
-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug bpf/23559] stapbpf string literal support for octal and hex escape codes
  2018-08-21 21:21 [Bug bpf/23559] New: stapbpf string literal support for octal and hex escape codes me at serhei dot io
  2018-08-21 21:22 ` [Bug bpf/23559] " me at serhei dot io
@ 2018-10-24 21:19 ` me at serhei dot io
  1 sibling, 0 replies; 3+ messages in thread
From: me at serhei dot io @ 2018-10-24 21:19 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=23559

Serhei Makarov <me at serhei dot io> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Assignee|systemtap at sourceware dot org    |me at serhei dot io

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-10-24 21:19 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-08-21 21:21 [Bug bpf/23559] New: stapbpf string literal support for octal and hex escape codes me at serhei dot io
2018-08-21 21:22 ` [Bug bpf/23559] " me at serhei dot io
2018-10-24 21:19 ` me at serhei dot io

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).