On Thu, Aug 27, 2009 at 12:34 AM, Mulyadi Santosa mulyadi.sant...@gmail.com
wrote:
On Wed, Aug 26, 2009 at 11:06 PM, Pharaoh .pharaoh...@gmail.com wrote:
Hi list,
1. A cpu can access its own per cpu data atomically but if it has to
access
other cpus per cpu data
it might not be
Hi Vilen,
On Tuesday 25 August 2009 14:56:42 Vilen Looga wrote:
Hi!
I'm developing a simple kernel module (it will be a part of
middleware) that uses netfilter to delay outgoing packets. So far it
seems that I have to QUEUE the packets and send them to userland to
add the delay that I need.
It is two different concept.
Pages, is recognized as 1024 bytes or 4096 bytes, depends on the Intel
PAGESIZE u set in the CPU. It is a CPU feature, such that the memory
MMU always treats all memory access at the multiple of PAGESIZE level,
when it does its translation from pagetable to virtual
On Tue, Aug 25, 2009 at 11:42 AM, Shankar
Ganeshshankargane...@gmail.com wrote:
Also, i have q querry regarding poll in drivers.
1. driver poll driver - poll_wait() adds to the wait queue.
How this queue is woke-up when there is activity pending .i.e for example
ready to read ?
Using
An exploit about sendpage:
http://www.securityfocus.com/data/vulnerabilities/exploits/wunderbar_emporium.tgz
I read the exploit code, having some question?
---
There is some code:
static void
On Mit, 2009-08-26 at 17:18 -0500, Stoyan Gaydarov wrote:
I wanted to know what memcpy returned as a result, and if it
needs/should be checked. There are several places in the kernel where i
It is IMHO agreed concensus that kernel-implementations of well-known
(and especially C-library)
**Some of these may include *additional shared libraries required to run
the elf executable, pics/images your elf executable could access, various
configuration files required for proper execution of the application,
documentation (may or may not be needed during execution of your
application).
2009/8/27 fisherman ipconfi...@gmail.com:
own_the_kernel() will run in kernel mode, when trigger the bug in user mode.
BUT give_it_to_me_any_way_you_can() call memset(), memset() is a
function in glic.
not really, check
http://lxr.linux.no/#linux+v2.6.30.5/arch/x86/lib/memcpy_32.c#L17
BUT exploit.c is compiled in userspace.
The memset() is the symbol in glibc NOT in kernel.
Disassemble Code:
0x08048a33 give_it_to_me_any_way_you_can+223:movl $0x1,0x804a7d4
0x08048a3d give_it_to_me_any_way_you_can+233:movl $0x20,0x8(%esp)
0x08048a45