lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 7 Oct 2012 19:34:02 -0300
From:	Ezequiel Garcia <elezegarcia@...il.com>
To:	Andi Kleen <andi@...stfloor.org>
Cc:	linux-kernel@...r.kernel.org, Tim Bird <tim.bird@...sony.com>,
	mmarek@...e.cz, sam@...nborg.org, rientjes@...gle.com
Subject: Re: [PATCH v2] Makefile: Add option to disable gcc automatic inlining

On Sun, Oct 7, 2012 at 7:21 PM, Andi Kleen <andi@...stfloor.org> wrote:
> Ezequiel Garcia <elezegarcia@...il.com> writes:
>
>> The new option is CONFIG_CC_DISABLE_AUTO_INLINE and it's
>> located at:
>>   * Kernel hacking
>>     * Disable gcc automatic inlining
>
> You don't state anywhere why you want that?
>

This is important -if not necessary- to trace memory allocations with
ftrace kmem
events. Allocations are traced through _RET_IP_ macro, which in turn
only works accurately if gcc don't inline.

Without this patch you will trace callsites like kstrdup, instead of the real
caller.

Perhaps I should explain this better in the commit message?

Thanks for reviewing,

    Ezequiel
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ