From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 64378 invoked by alias); 29 Nov 2018 18:06:20 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 64369 invoked by uid 89); 29 Nov 2018 18:06:20 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_PASS autolearn=ham version=3.3.2 spammy= X-HELO: gnu.wildebeest.org Received: from wildebeest.demon.nl (HELO gnu.wildebeest.org) (212.238.236.112) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 29 Nov 2018 18:06:18 +0000 Received: from librem.wildebeest.org (5ED53817.cm-7-6a.dynamic.ziggo.nl [94.213.56.23]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id A40B3302BB40; Thu, 29 Nov 2018 19:06:16 +0100 (CET) Received: by librem.wildebeest.org (Postfix, from userid 1000) id C70A5140C41; Thu, 29 Nov 2018 19:06:15 +0100 (CET) Date: Thu, 29 Nov 2018 18:06:00 -0000 From: Mark Wielaard To: Torsten Polle Cc: systemtap@sourceware.org Subject: Re: [PATCH] runtime/unwind: Allow to increase MAX_CFI Message-ID: <20181129180615.GL31795@wildebeest.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-IsSubscribed: yes X-SW-Source: 2018-q4/txt/msg00128.txt.bz2 Hi Torsten, On Tue, Nov 27, 2018 at 10:37:08PM +0100, Torsten Polle wrote: > As discussed this patch allows to define the limit of CFIs to a higher value in case the limit is too low. Thanks, applied to git master. I am still curious what program/library defines more than 512 CFI instructions. If you could post some example of eu-readelf --debug-dump=frame that would be interesting. I assume it must be some really big functions that haven't been split up? Cheers, Mark