| Summary: | Portage sandbox compiled with minimal CFLAGS | ||
|---|---|---|---|
| Product: | Gentoo Linux | Reporter: | Kaiting Chen <Phoenixfire159> |
| Component: | [OLD] Core system | Assignee: | Sandbox Maintainers <sandbox> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | ||
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
|
Description
Kaiting Chen
2005-03-27 19:58:08 UTC
possibly because the sandbox developers (az and the portage team) know better than to trust user CFLAGS for something as critical as the sandbox? Just a guess. I thought of something like that, but if you're going to set crazy CFLAGS, you might as well be aware of the consequences. I don't know how much really low CFLAGS are going to slow down portage; my guess is not much, considering the sandbox is only used for a little part of the emerge process, but I'm really looking for ways to optimize, and I think that compiling the sandbox without user CFLAGS is pretty unnecessary. And the sandbox isn't all THAT critical. How many ebuilds really violate the sandbox? The only time its critical at all is if a user is screwing around with an overlay. Except that if your sandbox lib is broken, you can't compile anything... if the sandbox segfaults, it'll pretty much take out any and all processess running sandbox'd. Meanwhile, marking this later. the autotooling of sandbox allows for it, although the question of filtering/limiting cflags hasn't been addressed. Reopening for reassignment this has already been addressed |