lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.1.10.0810021407400.5549@apollo.tec.linutronix.de>
Date:	Thu, 2 Oct 2008 14:08:14 +0200 (CEST)
From:	Thomas Gleixner <tglx@...utronix.de>
To:	Dâniel Fraga <fragabr@...il.com>
cc:	Ilpo Järvinen <ilpo.jarvinen@...sinki.fi>,
	David Miller <davem@...emloft.net>,
	Netdev <netdev@...r.kernel.org>
Subject: Re: [PATCH] tcp FRTO: in-order-only "TCP proxy" fragility workaround
 (fwd)

On Thu, 2 Oct 2008, Dâniel Fraga wrote:

> On Thu, 2 Oct 2008 12:42:44 +0200 (CEST)
> Thomas Gleixner <tglx@...utronix.de> wrote:
> 
> >   echo sym-verbose > /debug/tracing/iter_ctrl
> 
> 	Ok, this one I changed to:
> 
> echo verbose > /debug/tracing/iter_ctrl
> 
> 	;) since there's no sym-verbose.
> 
> > Find below a patch which disables the tracer when the listen overflow
> > is detected. It could occassionally be hit in a legimate case as well,
> > but we did not come up with any better idea.
> 
> 	Ok, I applied the patch, but it returns this error:
> 
>   CC      kernel/trace/ftrace.o
> kernel/trace/ftrace.c: In function 'stop_event_tracer_now':
> kernel/trace/ftrace.c:73: error: 'tracer_enabled' undeclared (first use in this function)
> kernel/trace/ftrace.c:73: error: (Each undeclared identifier is reported only once
> kernel/trace/ftrace.c:73: error: for each function it appears in.)
> make[2]: *** [kernel/trace/ftrace.o] Error 1
> make[1]: *** [kernel/trace] Error 2
> make: *** [kernel] Error 2

grmbl. tracer_enabled should have been ftrace_enabled of course.

Thanks,

	tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ