On Thursday 05 April 2001 14:48, Wojciech Kromer wrote:
> > } sh-2.03# uname -a
> > } Linux 192.168.6.204 2.4.2 #3 Thu Apr 5 08:43:16 CEST 2001 ppc unknown
> > } sh-2.03# cd /rt
> > } sh-2.03# insmod rtl
> > } Oops: kernel access of bad area, sig: 11

Hmm...


> .....
> arch_takeover
> ...

What are you trying to do here? (Looks like a virus... ;-)


>         {
>                 unsigned long block[7] = {
>                         0x7fe802a6, /* mflr 31 */
>                         0x3fc0dead, /* lis 0xdeadbeef@h */
>                         0x63debeef, /* ori r30,r30,0xdeadbeef@l */
>                         0x7fc803a6, /* mtlr r30 */
>                         0x4e800021, /* blrl */
>                         0x7fe803a6, /* mtlr r31 */
>                         0x4e800020  /* blr */
>                 };
>                 block[1] = (block[1]&0xffff0000) |
> (((ulong)rtl_soft_sti>>16)&0xf block[2] = (block[2]&0xffff0000) |
> ((ulong)rtl_soft_sti&0xffff); memcpy( (ulong *)KERNELBASE, &block,
> sizeof(ulong)*7 );
>
>                 ^^^ it craches here (memcpy is not allowed to kernel code)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Since when? It's worked fine for me so far... :-)

You're just not going to get away with writing to write protected memory 
areas, not even from within kernel space.


//David

.- M A I A -------------------------------------------------.
|      Multimedia Application Integration Architecture      |
| A Free/Open Source Plugin API for Professional Multimedia |
`----------------------> http://www.linuxaudiodev.com/maia -'
.- David Olofson -------------------------------------------.
| Audio Hacker - Open Source Advocate - Singer - Songwriter |
`--------------------------------------> [EMAIL PROTECTED] -'
-- [rtl] ---
To unsubscribe:
echo "unsubscribe rtl" | mail [EMAIL PROTECTED] OR
echo "unsubscribe rtl <Your_email>" | mail [EMAIL PROTECTED]
--
For more information on Real-Time Linux see:
http://www.rtlinux.org/rtlinux/

Reply via email to