On Thu, Mar 6, 2014 at 1:38 AM, Patrick Walton <pwal...@mozilla.com> wrote:
> Optimization of null pointer dereferences has resulted in security
> vulnerabilities in the Linux kernel:

That was not a case where the load was actually optimized away, only a
check following the load.  In standard userland as well as modern Linux
(mmap_min_addr), that would crash.

Responsible is debatable; I am just saying that I have never heard of
it affecting a real program.  (Less anecdotal evidence:
-fno-delete-null-pointer-checks exists in GCC and probably has no
performance effect on the vast majority of code, but I have not heard
of it being recommended and it has not been implemented in Clang.)
Since things like use-after-free, buffer overruns, missing locks, etc.
constantly affect real programs, I wouldn't focus on it too much.
_______________________________________________
Rust-dev mailing list
Rust-dev@mozilla.org
https://mail.mozilla.org/listinfo/rust-dev

Reply via email to