This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/12196] New: avoid varargs in script-invokable runtime


http://sourceware.org/bugzilla/show_bug.cgi?id=12196

           Summary: avoid varargs in script-invokable runtime
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
        AssignedTo: systemtap@sources.redhat.com
        ReportedBy: fche@redhat.com


Functions such as printf() translate to varargs calls upon the runtime.
GCC doesn't protect us against stack overflows well (see GCC PR41633 e.g.).

It doesn't have to be this way.  We can use the per-probe-invocation context[]
structure as temporary space.  Let's expand printf() to an array of parameters
in the context -- like script-function calls.  Let's have printf()s store a
flag in the context afterwards, to let us know whether the __stp_print_flush()
thing at the conclusion of the probe handler is at all necessary.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]