Bizzare Bourne Shell
Kenneth Almquist
ka at hou3c.UUCP
Tue May 15 04:05:15 AEST 1984
I contend that given the code
p = sbrk(0); *p = 1; sbrk(2);
a memory fault should be generated when the second statement is executed
because it references memory above the break point. If the program
catches memory faults and increases the break value, then after the
second sbrk the value of *p should be one. In practice most hardware
will not allow you to set a break value to an arbitrary location so this
code may not generate a memory fault, but the value of *p should never
the less be one after the second sbrk.
None of this is intended to excuse the other faults of the Borne shell.
Kenneth Almquist
More information about the Comp.unix.wizards
mailing list