new achievement unlocked: use a syscall valgrind hasn't implemented
7 comments
god I hate reading C code. dude passes `&foo` to a function - is it reading from it? is it writing to it? who knows. remember to remove binutils from your production systems so the exploits won't run, yeesh infosec is at that rare skill intersection where the red team writes python code, but in C whoa, `println!("{:016x}")` writes every 0 with a single write, no buffering involved - presumably to avoid allocations. maybe that only applies to stderr but... that can't be efficient 🤔 it's called a man page because it won't shut up about stuff you already know and doesn't actually have the answer to your question |
I think I need to call the linux kernel hotline, anyone know the number