http://lwn.net/SubscriberLink/272048/34349d400065bc89/
interesting read
GCC 4.3.0 exposes a kernel bug
This bug is no real threat, moreover, by the time this new version of gcc is used to compile programs, the problem will have been fixed, secondly it only effects programs that uses signal handlers, and also use memmove() (or a function that uses and relies on the DF flag), before and within the signal handler. Also there is no escalation of privileges, and will only run at the current users privileges.
Microsoft: "let everyone run after us. We'll just INNOV~1"
It should be noted that the kernel bug would be exposed by any compiler correctly implementing the ABI.
I think many kernel gurus are pretty arrogant bas****s, for half a dozen reasons, and can't help but smile whenever they're bitten by that attitude.
I think many kernel gurus are pretty arrogant bas****s, for half a dozen reasons, and can't help but smile whenever they're bitten by that attitude.
Every good solution is obvious once you've found it.
I still recall them calling GCC 3.* bad because it broke their code ... not to mention that their code was the problem in the first place.Solar wrote:It should be noted that the kernel bug would be exposed by any compiler correctly implementing the ABI.
I think many kernel gurus are pretty arrogant bas****s, for half a dozen reasons, and can't help but smile whenever they're bitten by that attitude.