Hi! On Sun, Jul 27, 2008 at 7:47 PM, Scott Lovenberg <[EMAIL PROTECTED]> wrote: > You mean like the stack piercing attack for Windows callbacks in the > messaging subsystem?
Oh no! that's too scary for me :) I just thought I could change the faulting address which is saved in stack frame....thus after returning from signal handler...code flow jumps into certain EIP :) ehhehe, sorry to disappoint you :D regards, Mulyadi. -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to [EMAIL PROTECTED] Please read the FAQ at http://kernelnewbies.org/FAQ
