You are welcome.
To sidetrack, there is a longstanding vulnerability/security bug or just a
"feature" of linux kernel though:
If you compile any program with "float" or "double" type declaration, you
will see that a lot of "XMM" registers and its instruction set being used.
But searching the en
Thanks @Peter a very good explanation and it's very help full to me.
On 29 July 2014 19:49, Peter Teoh wrote:
> Perhaps a little explanation:anything that can be done at userspace,
> should not be done at the kernel, simply because doing at the kernel
> entailed a lot of security privileges
Perhaps a little explanation:anything that can be done at userspace,
should not be done at the kernel, simply because doing at the kernel
entailed a lot of security privileges being available. (ie, logic which
require hardware interaction / access, process scheduling logic or anything
cutting
On Thu, Jul 24, 2014 at 08:09:31AM +0530, me storage wrote:
> Can you please explain me one scenario that lets suppose take calculator
> application in lower level it should interact with kernel code So here who is
> take care of Floating point calculations?
The userspace program does the floatin
Can you please explain me one scenario that lets suppose take calculator
application in lower level it should interact with kernel code So here who
is take care of Floating point calculations?
Sorry if i am wrong
Thanks for replying me
On 23 July 2014 08:45, me storage wrote:
> Hi
> I am read
On Wed, Jul 23, 2014 at 08:45:54AM +0530, me storage wrote:
> Hi
> I am reading LDD .In that i didn't understand one point .In Chapter 2(Building
> and Running Modules) they mentioned that
> " Kernel code cannot do floating point arithmetic"
> .My doubt is which code is used for floating point ari