From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 0BA983857C50; Thu, 2 Sep 2021 19:24:00 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 0BA983857C50 From: "wcohen at redhat dot com" To: systemtap@sourceware.org Subject: [Bug bpf/28285] Allow stapbpf backend to handle $arg1, $arg2, ... Date: Thu, 02 Sep 2021 19:23:59 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: bpf X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: wcohen at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: systemtap@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Systemtap mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Sep 2021 19:24:00 -0000 https://sourceware.org/bugzilla/show_bug.cgi?id=3D28285 --- Comment #1 from William Cohen --- The issue is occuring because tapsets.cxx is writing the code for the acces= s to the argument in tapsets.cxx sdt_uprobe_var_expanding_visitor::try_parse_arg_register around line 7053.= =20 Later on the bpf-translate.cxx has no way of converting that magic string containing the code to access an SDT marker argument into bpf. There is similar generation of strings containing code in the following sdt methods: sdt_uprobe_var_expanding_visitor::try_parse_arg_register (target_symbol *e, const string& asm= arg, long precision) sdt_uprobe_var_expanding_visitor::try_parse_arg_offset_register (target_sym= bol *e, const stri= ng& asmarg, long precision) sdt_uprobe_var_expanding_visitor::try_parse_arg_effective_addr (target_symb= ol *e, const strin= g& asmarg, long precis= ion) sdt_uprobe_var_expanding_visitor::try_parse_arg_varname (target_symbol *e, const string& asma= rg, long precision) --=20 You are receiving this mail because: You are the assignee for the bug.=