TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

I found a 271,800 character demangled symbol name in libmshr

7 点作者 AntiRush大约 3 年前

3 条评论

teh_klev大约 3 年前
Please don&#x27;t editorialise article submission titles. Even from the bullet point which you cherry picked to use as the title doesn&#x27;t tell us anything useful other than it&#x27;s a 271,800 character symbol.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsguidelines.html" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsguidelines.html</a>
评论 #30957004 未加载
rurban大约 3 年前
more interesting would be homoglyphs in C or C++ ABI&#x27;s, eg by assuming UTF-8 encodings. or at least utf-8 names in the wild.<p>the overlong symbol looks it&#x27;s coming from here: <a href="https:&#x2F;&#x2F;github.com&#x2F;martinal&#x2F;mshr&#x2F;blob&#x2F;master&#x2F;src&#x2F;Polyhedral_multicomponent_mesh_domain_with_features_3.h" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;martinal&#x2F;mshr&#x2F;blob&#x2F;master&#x2F;src&#x2F;Polyhedral_...</a><p>so not an overflow attack, just C++ nonsense.
bombcar大约 3 年前
Well what was it?
评论 #30951602 未加载