This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Re: [rfc v2, rfa-doc] Disable address space randomization with remote targets
- From: "Ulrich Weigand" <uweigand at de dot ibm dot com>
- To: eliz at gnu dot org
- Cc: pedro at codesourcery dot com, gdb-patches at sourceware dot org, jan dot kratochvil at redhat dot com, patches at linaro dot org
- Date: Fri, 7 Oct 2011 14:07:40 +0200 (CEST)
- Subject: Re: [rfc v2, rfa-doc] Disable address space randomization with remote targets
Eli Zaretskii wrote:
> > Date: Wed, 5 Oct 2011 20:32:56 +0200 (CEST)
> > From: "Ulrich Weigand" <uweigand@de.ibm.com>
> > Cc: gdb-patches@sourceware.org, jan.kratochvil@redhat.com (Jan Kratochvil), patches@linaro.org
> >
> > -The virtual address space randomization is implemented only on @sc{gnu}/Linux.
> > -It protects the programs against some kinds of security attacks. In these
> > +On targets where it is available, virtual address space randomization
> > +protects the programs against some kinds of security attacks. In these
> ^^^^^^^^^^
> "certain kinds"
>
> > +Some target operating systems will randomize the inferior process'
> > +virtual address space as a security feature, but provide a feature
>
> It is better to say "randomize the virtual address space of the
> inferior process", then you won't have the "issue" with "ss's".
>
> > +to disable such randomization, e.g. to allow for a more deterministic
> ^^^^
> "e.g.@:", to hint TeX not to typeset this as an end of a sentence.
>
> The documentation part is okay with these changes.
I've made those changes, thanks!
Bye,
Ulrich
--
Dr. Ulrich Weigand
GNU Toolchain for Linux on System z and Cell BE
Ulrich.Weigand@de.ibm.com