[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220926123650.3b29d1a4@gandalf.local.home>
Date: Mon, 26 Sep 2022 12:36:50 -0400
From: Steven Rostedt <rostedt@...dmis.org>
To: Peter Zijlstra <peterz@...radead.org>
Cc: Nadav Amit <nadav.amit@...il.com>,
Thomas Gleixner <tglx@...utronix.de>,
linux-kernel@...r.kernel.org, x86@...nel.org,
Dave Hansen <dave.hansen@...ux.intel.com>,
Borislav Petkov <bp@...en8.de>, Ingo Molnar <mingo@...hat.com>,
Nadav Amit <namit@...are.com>
Subject: Re: [RFC PATCH] x86/syscalls: allow tracing of __do_sys_[syscall]
functions
On Tue, 20 Sep 2022 11:47:11 +0200
Peter Zijlstra <peterz@...radead.org> wrote:
> #3 I think Steve's concern is that the tracability of a function then
> depends on the compiler's whim -- but yeah, who cares ;-)
As I mentioned in my other email. I was tired of the bug reports telling me
it was a bug that a function was no longer available for tracing because
the compiler decided to inline it. By having notrace on all inlines, it
made it consistent no matter what the compiler decided to do, and those bug
reports went away ;-)
-- Steve
Powered by blists - more mailing lists