This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
- From: "me at serhei dot io" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Wed, 17 Oct 2018 15:58:04 +0000
- Subject: [Bug bpf/22330] bpf: generate printf via event tuples, userspace formatting postprocessing
- Auto-submitted: auto-generated
- References: <bug-22330-6586@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=22330
--- Comment #3 from Serhei Makarov <me at serhei dot io> ---
Another reason to rework printf() -- the trace_printk() implementation
hardcodes any string operands to 64 bytes:
https://github.com/torvalds/linux/blob/6b2edf27fe26c73cd67b6bf5ffb23dce882e1455/kernel/trace/bpf_trace.c#L226
Prioritizing this PR on account of the 64-byte trace_printk() limitation.
--
You are receiving this mail because:
You are the assignee for the bug.