Re: [PATCH] BUG preserve registers

Linus Torvalds (torvalds@transmeta.com)
Sat, 9 Feb 2002 13:37:59 -0800 (PST)


On Sat, 9 Feb 2002, Andrew Morton wrote:
> >
>
> Is better, except the filename gets expanded multipe times into
> the object file. How about:
>
> #define BUG() \
> asm( "ud2\n" \
> "\t.word %0\n" \
> "\t.long %1\n" \
> : : "i" (__LINE__), "i" (__FILE__))

Even better.

That way you can actually totally remove the "verbose bug" config option,
because even the verbose BUG's aren't actually using up any noticeable
amounts of space.

This is all assuming that gcc doesn't create the string for inline
functions that aren't used, which it probably cannot, so maybe this
doesn't work out.

Linus

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/


ff, I
> would say that having the system hang waiting for entropy is a performance
> issue. And lack of it is a security issue.
>
> > No one said the rngd has to run as root. For example, run it as nobody
> > in a random group and give /dev/random write privileges to the random
> > group.
>
> So a functional /dev/random would be a feature of power users installing
> fixes, as opposed to the kernel using the available hardware? And having
> one or more extra user space daemons crapping up the system doesn't seem
> an issue?
>
> > If userspace equates to insecure, and we stick things in the kernel for
> > that reason, we are beyond help ...
>
> Not all Linux users are hackers, and depending on users to know their
> hardware, find, build, install, and configure something, change ownership
> of a device without messing it up, and understand that not doing so is
> both a performance and security issue... seems either optimistic or just
> unconcerned with the users.

What about distributors ? These user space daemons and device ownership
changes can be done by the installation process of any given distro. I
know Mandrake allows users to choose their "security level" from
install. The options range from "Welcome to crackers" to "Paranoid".
I'm certain that distros could perform the proper steps upon detection
of, say, a RNG.

>
> --
> bill davidsen <davidsen@tmr.com>
> CTO, TMR Associates, Inc
> Doing interesting things with little computers since 1979.
>
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.tux.org/lkml/
>

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/