Hacker's Delight 178
Hacker's Delight | |
author | Henry S. Warren Jr. |
pages | 320 |
publisher | Addison Wesley Professional |
rating | Excellent |
reviewer | Ben Olmstead |
ISBN | 0201914654 |
summary | Collected Tips & Tricks for Programmers |
Hacker's Delight is an impressive compendium of clever tricks for programmers. Warren concentrates on micro-optimizations -- few of the tricks in this book operate on more than 3 or 4 words of memory -- and he displays an impressive knowledge of diverse computer systems in the process.
Who Should Read This Book
Hacker's Delight is hardcore in its presentation and subject matter. I would not recommend this for a beginning programmer -- to fully understand the material requires at least some knowledge of concepts such as Assembly and Machine languages. However, anyone who writes performance-critical software should read this book, even if they do not plan to write Assembly code, both to learn the tricks given, and to learn the concepts behind them.
What's Good
The book is organized into chapters where Warren presents related tricks. In each chapter, he presents a few tricks which perform related tasks -- for example, in Chapter 3, he presents tricks for rounding (up or down) to the next power of 2, rounding to a multiple of a known power of 2, and detecting power-of-2 boundary crossings (i.e., checking for page faults). For each trick, he discusses why it works, whether the technique is generally applicable, related tricks which might be better in specific situations, and where a trick might be used in the real world.
Warren keeps his discussion architecture-neutral, while noting optimizations and problems for specific architectures for specific tricks -- in the process, he displays a vast array of knowledge about specific processors, from 1960's mainframes to x86, MIPS, PPC, Alpha, and others. He also skims the surface of hardware-design issues in a few places -- for example, he devotes a page or two to explaining why computers use base 2 for arithmetic, and why this is the most efficient choice.
What's Bad
This is an extremely dense book, and there are sections which are difficult to understand. Furthermore, there are many tricks which, while interesting, would be difficult to apply to real-world applications, and use of these tricks does violate the Keep It Simple, Clock Cycles Are Cheap And Someone May Have To Understand Your Code philosophy which is harped upon so heavily (not without reason) in modern software design. However, someone writing a compiler or high-performance code may feel that the benefit outweighs the potential risk.
The Summary
If you want a better understanding of the hardware on which your code runs, or you need to squeeze clock cycles, or you just enjoy seeing clever tricks, this is an excellent book. If you primarily use high-level languages such as VB, perl, python, etc., this may not be the right book for you. Be prepared for very dense material.
You can purchase Hacker's Delight from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Sounds like an interesting read... (Score:5, Funny)
To be honest, 'Hacker's Delight' sounded more like a cookbook title.
Re:Sounds like an interesting read... (Score:2, Funny)
I said a hip hop the hippie the hippie
to the hip hip hop, a you dont stop
the hack it to the bang bang boogie say up jumped the boogie to the rhythm of the boogie, the beat
Re:Sounds like an interesting read... (Score:1)
It'll only be a cookbook title if the hacker's doing something to tweak an AMD processor, and manages to deep fry something in the computer. :)
Re:Sounds like an interesting read... (Score:1)
By Jeffrey Dahmer?
Re:Sounds like an interesting read... (Score:2, Informative)
The PowerPC Compiler Writer's Guide
ISBN 0-9649654-0-2
edited by Steve Hoxey, Faraydon Karim, Bill Hay and Hank Warren.
That book obviously had no qualms about targeting a narrow audience and it served its purpose well.
When Sun was awarded patent #6,073,150 it had a familiar ring. Sure enough: figure 3-25 on page 50 of "PowerPC Compiler Writer's Guide". Only the patent was awarded in 2000 and the Guide was published in 1996. That was about where I lost respect for the patent process.
omg (Score:1, Funny)
i said a hip hop a hippie the hippie
to the hip hip hop, a you dont stop
a rock to the bang bang boogy say upchuck the boogy,
to the rhythm of the boogity beat.
now what you hear is not a test, i'm hacking to the motherfuckin beat
and me, rob malda, and the rest are gonna try and move your feet
see i am timothy and i'd like to say hello
to the ACs, freaks, and logged-in kooks, and all the goatse trolls
but first i gotta bang bang the boogie to the boogie
say up jump the boogie to the bang bang boogie
let's rock, you dont stop
rock the rhythm that will make your body rock
well so far youve heard my voice but i brought two friends along
and next on the mike's my man hemos
come on, hem, sing that song
Re:omg (Score:3, Funny)
You know, the post was offtopic but funny... shouldn't that average out to "Neutral +0"?
-FF
Re:omg (Score:1)
- A.P.
Re:omg (Score:1)
Re:omg (Score:2)
Re:omg (Score:1)
Dubious value? (Score:5, Insightful)
Maybe you should break open the old CS textbook instead. IMO, learning general principles would be a much better use of your time.
Re:Dubious value? (Score:5, Insightful)
I remember back when I was younger and had much more free time (*longing sigh*) I spent most of a term and a summer writing a 3D wolfenstein-like engine, mostly under the careful instruction of a book: Tricks of the game programming gurus [amazon.com]. The book was great, and though it gave some optimizing ideas here and there the resulting engine was very slow (esp. compared to the wolf3d engine, which was so perfectly smooth... and the engine I made didn't even do monsters and doors and items). So then I turned to another book I had, called "PC Interdit", which was written in french and oriented towards Pascal rather than C which I was using, but explained a number of optimization tricks which made all the difference (examples: page flipping in mode X instead of double-buffering in mode 13h, basics of coding fast assembler functions to optimize C functions, etc). Before using that book's advice, my engine would run at something like 10 fps or so on my 486DX4 100Mhz in turbo mode, and 1fps more or less without turbo mode... After the optimizations, it ran very smoothly in turbo mode and at least 5-6fps in non-turbo.
So if you're programming a game engine, those books are really really useful. Or in fact if you're programming anything where squeezing every tiny bit of performance is critical. If you're programming a J2EE servlet engine, though, then for sure, it's a waste of your time.
Daniel
Re:Dubious value? (Score:2)
The real problem for commercial users is that this level of optimisation is dirty, i.e., difficult to test and maintain. However, it is usually only need for a very small percentage of the application.
Re:Dubious value? (Score:1)
To the outside viewer, code optimizing is most likely to be viewed as magic than anything else. Very few people I know could reduce code on the 6502 like myself. And those few I met back then ( 1983 (84 maybe ) onwards were highly gifted and they made optimizing code seem like magic.
Onepoint
Re:Dubious value? (Score:1)
Not that this means that the particular guy you hired was any good.
Daniel
Re:Dubious value? (Score:1)
I agree that without a good foundation, you're not likely to produce good code. However, it sounds to me that you can't even get the most benefit from the book in question without having such a foundation. That is, you can use the book like a cookbook but you probably won't understand why the recipe works. Disclaimer: I have not read the book, only this review. As many others have pointed out, if you're working on something which must be highly optimized, or are working on an optimizer, such a book can help you squeeze that bit of extra performance out of your code. Nothing wrong with that.
Re:Dubious value? (Score:2)
The hacker referenced in the book's title is this one [tuxedo.org].
Also there is no real-world application for hacking. Anyone who says that deserves to be butt-raped in jail.
Tell that to anyone who's ever worked on a tiger team (or opfor, in military terms).
The author.. (Score:5, Informative)
Henry S. Warren, Jr., has had a forty-year career with IBM, spanning from the IBM 704 to the PowerPC. He has worked on various military command and control systems and on the SETL project under Jack Schwartz at New York University. Since 1973 he has been with IBM's Research Division, focusing on compilers and computer architectures. Hank currently works on the Blue Gene petaflop computer project. He received his Ph.D. in computer science from the Courant Institute at New York University.
Re:The author.. (Score:1)
That's fair use if I ever saw it. Besides, that
piece of text is probably from the author's
resume, passed along to the publisher for the
dust cover bio, and copied by B&N for the website.
Probably only the first transfer in that chain
was even marginally interesting from a copyright
law standpoint.
But I agree with derch, it's ironic to say you
"know" Hank S. Warren, and then copy his bio
verbatim. At least add something we don't know:
he wears ugly bowties/cheats at chess/designs
almost-perpetual-motion machines
Re:The author.. (Score:2, Flamebait)
If you really know him, write up your own background.
Re:The author.. (Score:1)
G
Re:The author.. (Score:1)
Hacker delight.... (Score:4, Funny)
Re:Hacker delight.... (Score:2, Funny)
Re:Hacker delight.... (Score:1)
(sex)
Sugar Hill Gang, anyone? (Score:5, Funny)
What you hear is not a test, I'm hacking to the beat. And me, the compiler, and my code are gonna start to move your screen.
See, I am das MB and I'd like to say hello
To the linux loners and the mac fairys and the losers on windows.
But first I gotta..bang slash bin slash P E R L said hack kernel yes hack hack the kernel until the whole machine runs like hell.
Proper.
Re:Sugar Hill Gang, anyone? (Score:1, Offtopic)
But I suppose I can't expect your average slashdot moderator to understand the great works of old school hip hop.
Re:Sugar Hill Gang, anyone? (Score:1)
Offtopic? I think not. You can't review a book called "Hacker's Delight" and not have somebody do a bad parody of "Rapper's Delight." It's a given.
But I suppose I can't expect your average slashdot moderator to understand the great works of old school hip hop.
Yeah! and I thought it was pretty good ... but then they up and made your post offtopic as well. That doesn't make any sense either. These moderators are relentless ... or maybe it's just one moderator who just can't stand to see anything about that song. Damn them youngsters with their foul-mouthed rap music! Why back in my day...
Re:Sugar Hill Gang, anyone? (Score:1)
Re:Sugar Hill Gang, anyone? (Score:2)
The ironic thing is the same moderator probably listens to Las Ketchup.
Re:Sugar Hill Gang, anyone? (Score:2)
know it's not in th spirit of rapping (to revise) but how 'bout a slight change to make a better rhyme in the second line
Re:Sugar Hill Gang, anyone? (Score:1)
Refreshingly different for the CS bookshelves (Score:1, Insightful)
Sounds cool (Score:4, Interesting)
Sounds like he knows his stuff. The world needs more asm-aware programmers. High level languages and all the trickery that is "keep the source simple, waste the abundant cycles" and all are important things. The problem IMHO is that these are techniques to be applied by a fully-fledged programmer, who is capable of doing it the hard way in C or even asm - but too many modern programmers have only ever know the world of OO languages. The Leaky Abstractions paper applies here too.
Re:Sounds cool (Score:3, Interesting)
If you like this idea.. (Score:5, Informative)
If you like this topic you may well appreciate this Assembly Language Gems Page [df.lth.se]
It's a little biased towards x86 assembly, but there are some neat tricks there, and some stunningly lovely code.
Try this more up to date page (Score:2)
Recommended (Score:3, Informative)
Jim Green
Base 2 (Score:2)
Why is that? I always figgered it had something to do with it being easier/cheaper to build hardware that only needs to store and detect 2 states (on/off) than multiple intermediate states.
Re:It's digital. (Score:2)
Re:Base 2 (Score:5, Informative)
Binary maths make many integer operations ridiculously simple, and while the fact that it's cheaper and more feasible to detect 2 states than 10 is true, there's also a certain simplicity that you can get to by coding everything with binary logical gates which wouldn't quite be there if you used some sort of decimal logical gates...
Basically, binary arithmetic is really simple so can be optimized really well and is much more universal, in the wider philosophical sense, than decimal arithmetic. Everything in the universe seems to revolve around a binary concept, rather than a decimal one... matter/antimatter, existence/non-existence, quantum spin states, etc.
Daniel
Re:Base 2 (Score:1)
You know, there are two types of people in the world
Actual non-existence? (Score:1)
Please explain in what sense non-existence is something "in the universe."
Re:Actual non-existence? (Score:2)
In semiconductors, you may have heard of "holes" that carry charge. They can be treated as particles when you do the maths, as if they really existed. Yet all they are is electrons that are missing from filled conduction bands. So in this case, lack of existence IS most definitely something. If it wasn't computers would not exist.
But that's a trivial example. On the more philosophical side, existence is defined by non-existence. If there were electrons everywhere, it would be meaningless to say that there are electrons somewhere. Just like at the moment, because there is spacetime everywhere that is somewhere, it's meaningless to say that there's a bit of spacetime here or there. Anywhere which exists is spacetime. However the discreteness of the existence of particles in that spacetime is a core concept to understand the universe.
Of course, if you dig a bit deeper it all gets a whole lot more confusing when you find that those "discrete" particles are probability distributions smeared out across the entire universe. Still, I don't think that diminishes in any way the importance of non-existence.
That's the sense in which I thought of it when I posted the previous post.
Daniel
Re:Base 2 (Score:2)
The neat thing with that is that it can only be TRUE or FALSE. There may be an indeterminate state in the middle which is neither, but at that point the receiving chip will hold the current state until the input voltage goes to TRUE or FALSE.
Now consider that you have three states. Say one state is 0-1V, another state is 2-3V and the third is 4-5V. It's impossible to go from the first state to the third state without passing through the second state. So how does your receiving chip know whether you really wanted the second state, or whether you're just en route to the third state? Simple answer is that it can't, so you'd need to have some requirement like staying in a state for some length of time before the state's confirmed. This would be a complete pain in the arse, so no-one ever tried doing this.
There's also a compatibility issue. Electronics derived from relay logic, and relays can only be on or off, so there was a bunch of legacy material already on Boolean logic.
Grab.
Re:Base 2 (Score:1)
As mentioned by a comment a few posts down, they used to use base ten in machines (BCD = binary coded decimal), where each base-10 digit was encoded with a 4-bit binary value. Besides the increased complexity of base-10 arithmetic circuits, since each digit uses four bits, there's 6 possible states that aren't utilized. So for example, with two BCD digits, you can represent from 0-99 in BCD, but if you used those same eight bits in binary, you could represent 0-255. I think that's what people may be talking about when they say binary is more "efficient" than BCD. Otherwise from an information theoretic perspective, I don't think one unit is any better than the other (it would be like saying using "kilograms" is more efficient than "grams" or "milligrams" or even "slugs").
Base 10 was on more recent computers too... (Score:2)
Definition of "Hacker" (Score:4, Insightful)
Re:Definition of "Hacker" (Score:1)
I am pleased to see the correct use of the term "hacker". Now if we could just work on the folks at CNN...
Use defines language.
Get over it.
Definitions, Titles, and Categorization (Score:5, Interesting)
Now I know that I'm toying with the usual hacker/cracker jihad. None the less, it seems the definition of "hacker" associated with secuirty is so engrained in to society that it manages to overcome even the content of the book itself. I would have thought the B&N folks, being in the book profession, would manage to catch this. Judging a book by its cover and all that (makes me wonder where a book called 'Pinky Fuzzy Bunnies' that studies furry erotica would land).
Of course, B&N are not the definitive measure of language. Where they stick a book doesn't go much beyond acknowledging one use of our much-flamed word. It doesn't negate the history of the word nor offer final proof of its popular definition. But it does show the power of that popular definition despite the obvious intent of the book's author.
Be it for good or not - there it is.
Efficiency != Portability (or overall goodness) (Score:4, Insightful)
That's not to say that I don't enjoy reading about these clever things; there is a lot to be learned by studying this stuff. But implementing them is usually a mistake these days, if for no other reason than because there's already a portable way to do it which is probably more efficient. To go back to the Duff's Device example, almost all compilers will implement loop unrolling already. And that's a C-language trick, supposedly already a high-level language. Note I said supposedly! :-)
Duff's Device (Score:2)
there's already a portable way to do it which is probably more efficient.
Nitpick: Duff's device is portable
To go back to the Duff's Device example, almost all compilers will implement loop unrolling already
Even where the number of iterations is not known until runtime, as in Duff's Device?
Re:Duff's Device (Score:2)
But you've got to be sure that you don't unroll the loop so much that you go out of your processor's I-cache...
And a programming trick that works *only* in C is hardly a portable one.
Yes. Unrolling a loop is *not* rocket science. Any compiler from the last decade will know how to do it better than you can.
Re:Duff's Device (Score:1)
Double nitpick: only certain forms of Duff's device are portable. The form in which it first came to fame was not portable.
Triple nitpick: It is portable. It just doesn't do very much on implementations where the destination address isn't magic
Re:Efficiency != Portability (or overall goodness) (Score:2)
This sort of subject has been around for years, and gets rediscovered every so often, by a "new" generation of hackers. (Look, for instance, at the big deal made about Duff's Device [tuxedo.org] when C came along.) The problem is, that implementations of these ideas are often non-portable. (To other architectures, languages, or even the next version of the compiler.)
I'm not sure why you mentioned Duff's device. Duff's device is portable. If I had an ANSI C spec in front of me, I could quote you chapter and verse that explicitly allows it.
I think it is a damn spiffy idiom. It is relatively obvious what it means (at least after you've seen it once) and why you would use it. Yes, modern C compilers may do loop unrolling, so it is probably not something that is worth expending a lot of time on. As Tom Duff told me:
I too believe that code can be too clever, but increasingly I see code written with very little regard to either space or time behavior. Gratuitously inefficient code should not be tolerated, and understanding idioms like Duff's device puts one in a mindset of where such inefficiences are revealed more often.
Re:Efficiency != Portability (or overall goodness) (Score:2)
Be Wary (Score:4, Funny)
To paraphrase the great Terry Pratchet: "Beware labour saving devices which are smaller than their manuals".
My computer won't work hard enough (Score:2, Funny)
Ingrate! If it weren't for me, it'd be running gene sequences all day and night. Computers have no sense of perspective.
the most important thing (Score:1, Funny)
oh please (Score:2, Interesting)
Re:oh please (Score:3, Insightful)
So? Most technical books are useless for 99% of people. I personally have no use for The Black Art of C# in 21 Days For Idiots. For my part, I used to write compilers. This book would have been invaluable for me. I guess I was in the 1%.
The only danger in this kind of book is that people will use the techniques in it blindly, in which case they arguably shouldn't be writing software anyway (or at the very least should have it thorougly reviewed before committing).
So if you have to produce code like the Linux kernel, it sounds like the book for you.
Incidentally, the Linux kernel is that way for several reasons, some of which are valid (e.g. profiling or back-of-the-envelope calculations showed that something was going to be a bottleneck) and some of which made sense at the time. For an example fo the latter, see do_pipe() in fs/pipe.c. If starting the kernel again today, it would make a lot more sense to use C++ which would make all those gotos unnecessary, but it's a bit late now.
Re:oh please (Score:2)
You clearly have a different definition of "hacker" than I do. "Anyone who programs" is not even close.
I could equally argue that Knuth's The Art of Computer Programming is marketed to "programmers" which gives people the mistaken impression that to be a "programmer" you need to be able to implement a Patricia trie or solve nonlinear recurrences by hand. These are useful skills, but then so is the ability to write weird, bit-fiddly code.
You clearly have a different definition of "readable" than I do.
You do have a point on the "maintainable" aspect, but that's only because there are a small number of people who understand Linux well and are willing to review patches thoroughly before accepting them. It's got little to do with any inherent clarity in the code and everything to do with the process.
Efficiency of base 2 arithmetic (Score:1)
I always thought that ternary computers [google.com] were theoretically more efficient, from a mathmatical point of view.
Re:Efficiency of base 2 arithmetic (Score:1)
Hard to understand? (Score:5, Interesting)
In some cases, this may be true, but not always. If you want to increment a multiple-precision value, the textbook method is while the "cute trick" method is
The textbook method takes a while to recognize, just because it's very similar to many other loops; but the second is distinctive and can be recognized immediately. If I'm maintaining someon else's code, I'd much prefer to see the second.
Re:Hard to understand? (Score:3, Insightful)
A good compiler will recognize produce the same optimized byte code for different code blocks. It should unroll shorter fixed lenth loops and automatically inline function calls when it determines that it's not worth the overhead of popping the caller onto the stack.
In the end it's the design as a whole that will determine efficiency. For instance, recursion. As soon as it's learned, a coder has a tendency to use the 'cute trick' of recursion everywhere, and doesn't realize that it's rarely the optimal solution to a problem.
Personally, I loathe the 'cute-ass cryptic trick' coding philosophy. I constantly battle with all the bad habits I picked up having been born and raised on the Commodore 64. Unconditional branches (goto), cramming all the code you can onto one line, one or two letter variable names, functions longer than a chapter of the bible. Blech.
Re:Hard to understand? (Score:3, Interesting)
Everyone recognizes what:
is supposed to be doing, but I recently cleared a mystery bug in a very old routine that used such code. The problem had been missed for years because people "recognized" the code and moved on - despite the fact that there were several problems with it.Redundant and proud of it (Score:2, Interesting)
Whoa! (Score:3, Funny)
I almost thought that was 31337 or something!
And all this time (Score:2)
HACKMEM (Score:5, Interesting)
Here's a sample:
HACKMEM [inwap.com]Re:HACKMEM (Score:2)
Not true. It wasn't even true when it was written: It takes only about a minute with pencil and paper to discover that 2^239 - 1 is a multiple of 479.
Re:HACKMEM (Score:1)
It takes only about a minute with pencil and paper to discover that 2^239 - 1 is a multiple of 479.
If you have a minute, then, how does that work?
Re:HACKMEM (Score:2, Informative)
scale=6
((2^239)-1)/479
184430800081250973860
seems to be without a remainder, but this does not equal a proof.
Re:HACKMEM (Score:4, Interesting)
All prime factors of 2^p-1 are of the form 2kp+1 for some k. If we're looking for a factor, the obvious place to start is with k=1, which tells us that we should look at 2*239+1 = 479.
Now, 2^7 = 128, so
2^14 mod 479 = 98,
2^29 mod 479 = 2*98^2 = 48
2^59 mod 479 = 2*48^2 = 297
2^119 mod 479 = 2*297^2 = 146
2^239 mod 479 = 2*146^2 = 1
so 2^239-1 is a multiple of 479.
Premature optimisation is the root of all evil (Score:4, Interesting)
I've not read the book yet, but I do have a general worry, that optimisation isn't always done in the right context or for the right reasons. Code that runs faster in a small test program can break when part of a larger program (by thrashing the cache for example). What's the point of optimising something that's seldom invoked, in other words, always ask an enthusiastic optimiser to show you their profiling results.
My favourite hacks are Jim Blinn's floating point tricks - 10% accurate square roots and reciprocals that blow away a floating point unit and are just what you need in graphics and games.
con.* files on NT or 2K, won't let you, try it (Score:2)
Try creating or renaming any file or your system to con.* * could be anything like .html .jpg .txt. The OS won't let you, it'll give an error. NT and 2K give different error mesasages. Under NT it just says the name is used already. Under 2K it says it's a reserved device name.
Re:con.* files on NT or 2K, won't let you, try it (Score:1)
Re:con.* files on NT or 2K, won't let you, try it (Score:1)
Re:con.* files on NT or 2K, won't let you, try it (Score:1)
Backslashs in links are replaced with '5C' not '%5C'.
Ho hum. Diliberate or not?
Karma whoring (Score:1)
Performance Critical (Score:1)
Re:Performance Critical (Score:2, Insightful)
aimed more at getting more features then having a fast, stable program
As I understand it, "stable" is kind of in opposition to both "fast" and "features". The reviewer's point is that super-optimized code tends to have strange tricks in it that are difficult to read and understand. That makes the code hard to maintain and increases the likelihood of bugs, so performance tweaking isn't a great idea unless speed is really important to an application.
Re:Performance Critical (Score:3, Informative)
Hey, that's one of my Christmas gifts! (Score:3, Informative)
I got this book for Christmas because I specifically asked for it. My mom was a bit put off by the title, though. The title refers to the original definition of "hacker," so don't get excited if you're all about computer security. There's nothing in there for you.
One of my favorite concepts in this book is the author's use of non-breaking code. As many of you know, the mechanism for sending instructions to the CPU requires a bit of quasi-premonition. Riddle your code with many if-, while-, and (the hideous) goto-statements, and you will end up with slow code due to the seemingly random jumps inside memory. Use some of the methods in this book, however, and you will end up with more efficient code in the longrun. Need I remind you of the speedup generated when you use non-breaking code within a lengthy while loop?
Hacker culture (Score:2, Informative)
But unfortunately, the other people on my team do none of that, and it would only be more painful if they were trying the sort of stunts this book focuses on.
Shouldn't my compiler be reading this book? (Score:1)
And then let my compiler read through my code and determine the most efficient way to turn it into assembly? I mean, I would rather be multiplying by 2 rather than bitshifting; and then let my compiler turn it into whatever it needs to in order to run the fastest.
In fact, I really wouldn't be surprised if many of the better compilers already do most of these tricks for us, and we don't even know it.
But then again, I can't say for sure, since I have not read the book
Re:Shouldn't my compiler be reading this book? (Score:1)
I once tracked a bug to the compiler optimizing away a whole branch. Neat, but it wasn't an if ( 1==0) branch, it should have been reachable. Very confusing even in a debugger, just seemed to jump over lines of C code... only when I compared the assembler output files, between optimized and nonoptimized did I notice what happened. Of course, having some assembler knowledge did help.
It was a major unix vendor and their compiler.
Re:I've read this book (Score:2)
http://www.amazon.com/exec/obidos/tg/detail/-/020
Re:I've read this book (Score:1, Offtopic)
Whoever you are, you sure get around. [google.com]
Re:I've read this book (Score:1)
OK, it's good Slashdot Karma, but think what this is doing to your *real* karma -- much more of this and you're heading for reincarnation as a nematode worm
Doofus! (Score:1)
Re:Commodore 8-bit (Score:2)
Whoever modded this as a troll should be slapped. It is a legitimate question.