:: Re: [DNG] Nasty Linux systemd secur…
Page principale
Supprimer ce message
Répondre à ce message
Auteur: Bruce Perens
Date:  
À: Steve Litt
CC: dng
Sujet: Re: [DNG] Nasty Linux systemd security bug revealed
If you want this, it's easy enough to allocate your own stack, and write
functions that allocate from it and release the allocation. If you were
writing in C++, you could make releasing the allocation automatic.

I think this illustrates why the kernel developers are taking Rust
seriously.

On Fri, Jul 30, 2021, 4:48 PM Steve Litt <slitt@???> wrote:

> Enrico Weigelt, metux IT consult said on Fri, 30 Jul 2021 15:24:07 +0200
>
>
> >In kernel space, we have the golden rule of not doing any larger stack
> >allocations, even not larger fixed sized arrays.
>
> Larger than how much? Surely
>
> bestdistro[12]; strncpy(bestdistro, "Devuan", strlen("Devuan"));
>
> would be OK, right?
>
> SteveT
>
> Steve Litt
> Spring 2021 featured book: Troubleshooting Techniques of the Successful
> Technologist http://www.troubleshooters.com/techniques
> _______________________________________________
> Dng mailing list
> Dng@???
> https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
>