lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180809032035.GB5729@thunk.org>
Date:   Wed, 8 Aug 2018 23:20:35 -0400
From:   "Theodore Y. Ts'o" <tytso@....edu>
To:     "Darrick J. Wong" <darrick.wong@...cle.com>
Cc:     linux-ext4@...r.kernel.org
Subject: Re: [PATCH 0/4] e2fprogs: compiler fun

I've been experimenting with the LTO feature, and interestingly
enough, some executables actually get *bigger*:

   text	   data	    bss	    dec	    hex	filename
  27684	   1408	   1272	  30364	   769c	e2image
  34014	   1448	   1304	  36766	   8f9e	e2image.lto

Net Gain: 21%

Other executables, it's (mostly) a wash:

   text	   data	    bss	    dec	    hex	filename
 285991	  21696	   1128	 308815	  4b64f	e2fsck
 287997	  21696	   1144	 310837	  4be35	e2fsck.lto

Net Gain: 0.65%

And in some cases, it's definitely a win:

   text	   data	    bss	    dec	    hex	filename
1479034	  56898	  27728	1563660	 17dc0c	e2fsck.static
1426183	  56320	  27608	1510111	 170adf	e2fsck.static.lto

Net Savings: 3.4%

					- Ted

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ