<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6ed74e3-999b-4bb7-800f-801f042af580"><ac:parameter ac:name=""> asynchronous-safe</ac:parameter></ac:structured-macro>
asynchronous-safe [[GNU Pth]]
A function is asynchronous-safe, or asynchronous-signal safe, if it can be called safely and without side effects from within a signal handler context. That is, it must be able to be interrupted at any point and run linearly out of sequence without causing an inconsistent state. Some asynchronous-safe operations are listed below:
- call the
signal()
function to reinstall a signal handler - unconditionally modify a
volatile sig_atomic_t
variable (as modification to this type is atomic) - call the
_Exit()
function to immediately terminate program execution - invoke an asynchronous-safe function, as specified by your implementation
Few functions are asynchronous-safe. If a function performs any other operations, it is probably not asynchronous-safe.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b799e4d4-b3e8-4979-9985-42a47f6a997e"><ac:parameter ac:name=""> exploit</ac:parameter></ac:structured-macro>
exploit [[Seacord 05]]
An exploit is a piece of software or technique that takes advantage of a security vulnerability to violate an explicit or implicit security policy.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f13c8c3e-ebb4-4d24-bd5d-fd966f635508"><ac:parameter ac:name=""> freestanding environment</ac:parameter></ac:structured-macro>
freestanding environment [[ISO/IEC 9899-1999]]
An environment in which C program execution may take place without any benefit of an operating system. Program startup might occur at some function other than main()
, complex types might not be implemented, and only certain minimal library facilities are guaranteed to be available.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2125f4c-ed9f-48b5-9c9f-15bae4fc6180"><ac:parameter ac:name=""> hosted environment</ac:parameter></ac:structured-macro>
hosted environment [[ISO/IEC 9899-1999]]
An environment that is not freestanding. Program startup occurs at main()
, complex types are implemented, and all C standard library facilities are available.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="055605e1-6d10-41b8-a17e-2e83938c045a"><ac:parameter ac:name=""> implementation</ac:parameter></ac:structured-macro>
implementation [[ISO/IEC 9899-1999]]
Particular set of software, running in a particular translation environment under particular control options, that performs translation of programs for, and supports execution of functions in, a particular execution environment.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4c4774f-a25b-40a4-8479-8b56ff1b1dfd"><ac:parameter ac:name=""> implementation-defined behavior</ac:parameter></ac:structured-macro>
implementation-defined behavior [[ISO/IEC 9899-1999]]
Unspecified behavior where each implementation documents how the choice is made.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d725e98-5318-40a2-8b14-0f733edc5dfb"><ac:parameter ac:name=""> locale-specific behavior</ac:parameter></ac:structured-macro>
locale-specific behavior [[ISO/IEC 9899-1999]]
Behavior that depends on local conventions of nationality, culture, and language that each implementation documents.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="844c7246-2bad-4ddb-8364-879c552e9319"><ac:parameter ac:name=""> lvalue</ac:parameter></ac:structured-macro>
lvalue [[ISO/IEC 9899-1999]]
An lvalue is an expression with an object type or an incomplete type other than void
. The name "lvalue" comes originally from the assignment expression E1 = E2
, in which the left operand E1
is required to be a (modifiable) lvalue. It is perhaps better considered as representing an object "locator value".
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a8d2e66-6d5f-4660-8242-d01443448097"><ac:parameter ac:name=""> mitigation</ac:parameter></ac:structured-macro>
mitigation [[Seacord 05]]
Mitigations are methods, techniques, processes, tools, or runtime libraries that can prevent or limit exploits against vulnerabilities.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da5245e3-aa14-4b80-9a71-aa7ca3068a6f"><ac:parameter ac:name=""> reentrant</ac:parameter></ac:structured-macro>
reentrant [[Dowd 06]]
A function is reentrant if multiple instances of the same function can run in the same address space concurrently without creating the potential for inconsistent states.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a9bf879-7e2f-439e-8d42-46e0528d4b01"><ac:parameter ac:name=""> rvalue</ac:parameter></ac:structured-macro>
rvalue [[ISO/IEC 9899-1999]]
Value of an expression.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad3f94b0-74ee-4696-b025-e85d46f323a5"><ac:parameter ac:name=""> security flaw</ac:parameter></ac:structured-macro>
security flaw [[Seacord 05]]
A security flaw is a software defect that poses a potential security risk.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25799dff-cf6d-4f50-bbb3-3fc34b6a4e5c"><ac:parameter ac:name=""> security policy</ac:parameter></ac:structured-macro>
security policy [[Internet Society 00]]
A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78e19669-a1d4-4692-b11a-f367d975ff08"><ac:parameter ac:name=""> undefined behavior</ac:parameter></ac:structured-macro>
undefined behavior [[ISO/IEC 9899-1999]]
Behavior, upon use of a nonportable or erroneous program construct or of erroneous data, for which the standard imposes no requirements. An example of undefined behavior is the behavior on integer overflow.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="247c191f-484f-48ce-8250-b875c072c5d4"><ac:parameter ac:name=""> unspecified behavior</ac:parameter></ac:structured-macro>
unspecified behavior [[ISO/IEC 9899-1999]]
Behavior where the standard provides two or more possibilities and imposes no further requirements on which is chosen in any instance.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03879db7-a30b-45bc-aea5-11cff4980de7"><ac:parameter ac:name=""> validation</ac:parameter></ac:structured-macro>
validation [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the particular requirements for a specific intended use are fulfilled.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb07f048-4f17-4f9c-9c30-6351040e25ef"><ac:parameter ac:name=""> verification</ac:parameter></ac:structured-macro>
verification [[IEC 61508-4]]
Confirmation by examination and provision of objective evidence that the requirements have been fulfilled.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48ada197-ec96-4fd4-99fa-430cddd9000b"><ac:parameter ac:name=""> verification</ac:parameter></ac:structured-macro>
vulnerability [[Seacord 05]]
A vulnerability is a set of conditions that allows an attacker to violate an explicit or implicit security policy.