Skip to content

Instantly share code, notes, and snippets.

View l1997i's full-sized avatar

Li (Luis) Li l1997i

View GitHub Profile
@l1997i
l1997i / NotesOnLaTeX.md
Last active December 1, 2025 12:10
My notes for LaTeX

LaTeX 学习笔记

Author:李 理

部分代码来源于网络,所有原创文章采用知识共享署名-非商业性使用 4.0 国际许可协议进行许可。可以自由的转载和修改,但请务必注明文章来源并且不可用于商业目的。

常规操作

插入图片、图注和引用

@l1997i
l1997i / latex.json
Last active April 28, 2020 05:05
My snippet for LaTeX in VS Code
{
"使用Elegant文档模版": {
"prefix": "elegant",
"body": [
"\\documentclass[${1:cn},${2:hazy},${3:blue},14pt,${4:normal}]{${5:elegantnote}}",
"\t% 模版类:elegantnote和elegantpaper通用可替换",
"\t% 护眼模式(geye)和朦胧模式(hazy)",
"\t% pad, kindle, pc, normal, screen",
"\t% 颜色主题:blue(默认),green,cyan,sakura和black",
@l1997i
l1997i / Bug_report_on_CS_APP_labs.md
Last active July 29, 2022 01:45
Bug report on CS:APP labs

Bug Details

In rtarget Phase 3 of Attack Lab [Updated 1/11/16], which involving a code injection attack, if some of students want to use a return address containing 0x0a in their target injection codes, then getbuf() may parse 0x0a as newline which leads to termination of the injection codes behind. Since each students in CMU has their only attack targets which are built automatically, if some of the targets are built with address in gadgets farm they need containing 0x0a, it will unfortunately stop students from implementing injection attacks.

Steps to reproduce bug

  1. My injection attacks solution in asm code

movq %rsp, %rax