lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 12 Sep 2008 08:21:36 +0300
From:	"emin ak" <eminak71@...il.com>
To:	"linux-os (Dick Johnson)" <linux-os@...logic.com>,
	"Adrian Bunk" <bunk@...nel.org>,
	"Linux kernel" <linux-kernel@...r.kernel.org>
Cc:	7eggert@....de
Subject: Re: Building Kernel with -O0

2008/9/10 Bodo Eggert <7eggert@....de>:
> linux-os (Dick Johnson) <linux-os@...logic.com> wrote:
>
>> If you have to single-step through kernel procedures, you
>> are not writing proper code for a kernel. Furthermore, even
>> when using the kernel debugger, you are not executing the
>> exact same path that would be executed without the debugger
>> attached.
>
> I sometimes single-step in order to verify my (userspace) code, instead of
> just throwing random test data at it. It's easier and makes me feel better.
> OTOH, -O2 never was a problem if I used it, so I don't strongly vote
> for enabling -O0.
>
> --

I had compiled linux-2.6.23 with -O0 for kgdb only with little
modifications, it's  running with no error for a long time. I'am not a
linux expert, I think talented kernel hackers can make kernel to
compile with -O0 easly but for some reason they dont want to do it.
Debug is much understandable for me (and for most people I think) with
-O0. Linux kernel programming ability is not a gift, of course you can
learn the code with printks and reading, but which age are we living
in?

Emin
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ