[rust-dev] Integer overflow, round -2147483648

Patrick Walton pcwalton at mozilla.com
Sun Jun 22 17:37:03 PDT 2014

On 6/22/14 5:34 PM, Vadim Chugunov wrote:
> Modern C++ compilers often have a bunch of runtime checks (stack
> overflow protectors, iterator invalidation detectors, and so on) that
> may be enabled or disabled, and nobody bats an eye at that.

I'm not so sure. C++ is notoriously bad at dynamic linking, and these 
switches are part of the reason—code with `-fno-exceptions` can't be 
safely linked with code compiled without, for example...


More information about the Rust-dev mailing list