[rust-dev] Integer overflow, round -2147483648
pcwalton at mozilla.com
Sun Jun 22 17:37:03 PDT 2014
On 6/22/14 5:34 PM, Vadim Chugunov wrote:
> Modern C++ compilers often have a bunch of runtime checks (stack
> overflow protectors, iterator invalidation detectors, and so on) that
> may be enabled or disabled, and nobody bats an eye at that.
I'm not so sure. C++ is notoriously bad at dynamic linking, and these
switches are part of the reason—code with `-fno-exceptions` can't be
safely linked with code compiled without, for example...
More information about the Rust-dev