Re: [HACKERS] patch for memory overrun on Linux(i386) - Mailing list pgsql-hackers

From The Hermit Hacker
Subject Re: [HACKERS] patch for memory overrun on Linux(i386)
Date
Msg-id Pine.BSF.3.96.980321195410.324A-100000@thelab.hub.org
Whole thread Raw
In response to patch for memory overrun on Linux(i386)  (Maurice Gittens <mgittens@david.gits.nl>)
Responses Re: [HACKERS] patch for memory overrun on Linux(i386)  (Bruce Momjian <maillist@candle.pha.pa.us>)
List pgsql-hackers
Some things just require confirmation...can someone else (Thomas?) running
Linux comment on this before I apply it?  I just find it kinda unexpected
to see something that doesn't work for SCO doesn't work for Linux too :)

On Sat, 21 Mar 1998, Maurice Gittens wrote:

> Hi,
>
> It turns of that one of the bugs I detected with Electric Fence
> is caused by an assumption that memory return by palloc and malloc
> is aligned on 8 bytes boundaries (double alignment).
> Adjusting this to correspond with the reality of the malloc
> implementation on my pentium based linux box fixes the problem.
>
> The following simple patch to include/utils/memutils.h
> will fix the problem.
>
> 85c85
> < #if ! defined(sco)
> ---
> > #if ! defined(sco) && !defined(linux)
>
> There is still another buffer overrun which I will try to find.
> The remaining one is triggered by creating a sequence.
>
> I hope this patch will be applied if it makes sense to
> you guys.
>
> With regards from Maurice.
>
>

Marc G. Fournier
Systems Administrator @ hub.org
primary: scrappy@hub.org           secondary: scrappy@{freebsd|postgresql}.org


pgsql-hackers by date:

Previous
From: Hannu Krosing
Date:
Subject: Re: expr ? trueval : falseval
Next
From: ocie@paracel.com
Date:
Subject: Re: [HACKERS] patch for memory overrun on Linux(i386)