<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Aug 9, 2016 at 4:19 PM, Edward Z. Yang <span dir="ltr"><<a href="mailto:ezyang@mit.edu" target="_blank">ezyang@mit.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div id=":1o1" class="a3s aXjCH m15670f64d9fa13b0">If you can execute subprocesses, you could always spawn gdb to<br>
attach via ptrace() to the parent process and then poke around<br>
memory.</div></blockquote></div><br>Don't even need that if you're just talking segfaults, you can always spawn a subprocess "kill -SEGV $PPID" :)</div><div class="gmail_extra"><br></div><div class="gmail_extra">Unless you have full control over all the code that could be run in subprocesses, it's not going to be safe much less Safe.<br><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div>brandon s allbery kf8nh sine nomine associates</div><div><a href="mailto:allbery.b@gmail.com" target="_blank">allbery.b@gmail.com</a> <a href="mailto:ballbery@sinenomine.net" target="_blank">ballbery@sinenomine.net</a></div><div>unix, openafs, kerberos, infrastructure, xmonad <a href="http://sinenomine.net" target="_blank">http://sinenomine.net</a></div></div></div>
</div></div>