Getting the way a SIGSEGV append when catching a SIGSEGV from within

2017-03-27 Thread none
Hello, There’s three way to perform an invalid memory access : The attempt to execute/jump at an invalid address. The attempt to read at an invalid address. The attempt to write at an invalid address. Determining the execute case with rt_sigaction is easy : the last value of eip match the valu

Re: Getting the way a SIGSEGV append when catching a SIGSEGV from within

2017-03-27 Thread none
Le 2017-03-27 17:30, Richard Weinberger a écrit : On Mon, Mar 27, 2017 at 4:45 PM, none wrote: Hello, There’s three way to perform an invalid memory access : The attempt to execute/jump at an invalid address. The attempt to read at an invalid address. The attempt to write at an invalid

when to size_t for representing length instead of int ?

2016-10-13 Thread none
Hello, I wanted to known the rules in coding guidelines concerning the use of size_t. It seems the signed int type is used most of the time for representing string sizes, including in some parts written by Linus in /lib. They’re can buffer overflows attack if ssize_t if larger than sizeof(int)

Re: when to size_t for representing length instead of int ?

2016-10-15 Thread none
Le 2016-10-14 01:37, Al Viro a écrit : On Fri, Oct 14, 2016 at 12:12:43AM +0200, none wrote: Hello, I wanted to known the rules in coding guidelines concerning the use of size_t. It seems the signed int type is used most of the time for representing string sizes, including in some parts

Re: [RFC] Linux Kernel Subversion Howto

2005-02-11 Thread none given
On Fri, February 11, 2005 11:18 am, Larry McVoy said: The mails have started flowing in saying "I don't agree with Alexandre and please don't pull the plug" so a point of clarification. We have no intention of shutting down the BK free product. We are aware that there are 10's of thousands of dev