Calibrating your fear of big bad optimizing compilers
Calibrating your fear of big bad optimizing compilers
Posted Oct 12, 2019 16:03 UTC (Sat) by scientes (guest, #83068)In reply to: Calibrating your fear of big bad optimizing compilers by hsivonen
Parent article: Calibrating your fear of big bad optimizing compilers
But don't we only look at user-land data from the same thread that sent the data, so there are no races (and we don't trust the data, so if another thread with access to that data changes it, that is their problem.)
Posted Oct 12, 2019 16:47 UTC (Sat)
by excors (subscriber, #95769)
[Link] (1 responses)
If the access from the kernel is undefined behaviour (because another user thread modified that memory in violation of the rules), that's the kernel's problem. Undefined behaviour doesn't just mean the kernel will read an incorrect value, it means absolutely anything could happen (and would happen with kernel privileges).
Posted Oct 12, 2019 19:12 UTC (Sat)
by hsivonen (subscriber, #91034)
[Link]
Calibrating your fear of big bad optimizing compilers
Calibrating your fear of big bad optimizing compilers