This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Re: [rfc v2, rfa-doc] Disable address space randomization with remote targets
- From: Eli Zaretskii <eliz at gnu dot org>
- To: Ulrich Weigand <uweigand at de dot ibm dot com>
- Cc: pedro at codesourcery dot com, gdb-patches at sourceware dot org, jan dot kratochvil at redhat dot com, patches at linaro dot org
- Date: Wed, 05 Oct 2011 20:43:52 +0200
- Subject: Re: [rfc v2, rfa-doc] Disable address space randomization with remote targets
- References: <201110051832.p95IWuVb029968@d06av02.portsmouth.uk.ibm.com>
- Reply-to: Eli Zaretskii <eliz at gnu dot org>
> Date: Wed, 5 Oct 2011 20:32:56 +0200 (CEST)
> From: "Ulrich Weigand" <uweigand@de.ibm.com>
> Cc: gdb-patches@sourceware.org, jan.kratochvil@redhat.com (Jan Kratochvil), patches@linaro.org
>
> -The virtual address space randomization is implemented only on @sc{gnu}/Linux.
> -It protects the programs against some kinds of security attacks. In these
> +On targets where it is available, virtual address space randomization
> +protects the programs against some kinds of security attacks. In these
^^^^^^^^^^
"certain kinds"
> +Some target operating systems will randomize the inferior process'
> +virtual address space as a security feature, but provide a feature
It is better to say "randomize the virtual address space of the
inferior process", then you won't have the "issue" with "ss's".
> +to disable such randomization, e.g. to allow for a more deterministic
^^^^
"e.g.@:", to hint TeX not to typeset this as an end of a sentence.
The documentation part is okay with these changes.