On Fri, Aug 20, 2010 at 10:48 AM, Michael Blizek <
mic...@michaelblizek.twilightparadox.com> wrote:
> Hi!
>
> On 15:37 Thu 19 Aug , Anuz Pratap Singh Tomar wrote:
> > Hi all,
> > I came across this page about possible security exploit in kernel
> modules.
> > This page is very old(circa 1999),
On Fri, Aug 20, 2010 at 8:16 AM, Parmenides wrote:
> Hi,
>
> In the following code, the nop instruction prefixed by rep will
> execute several times. How many times the instruction executes is
> controlled by ecx register. But, there is no explicit setting of ecx
Looks like decb instruction is r
Hi!
On 15:37 Thu 19 Aug , Anuz Pratap Singh Tomar wrote:
> Hi all,
> I came across this page about possible security exploit in kernel modules.
> This page is very old(circa 1999), but it seems very interesting, I am
> wondering if this is any more relevant or all the holes are well patched
>
Hi!
On 01:07 Thu 19 Aug , Parmenides wrote:
> Hi,
>
> For a critical section protected by a spin lock, kernel preemption is
> disabled explicitly, probably to make the critical section atomic.
> But, suppose that an interrupt occures in this critical section,
> allowing interrupts can wreck t
Hi!
On 20:53 Wed 18 Aug , Daniel Baluta wrote:
> Hello,
> On Wed, Aug 18, 2010 at 8:07 PM, Parmenides
> wrote:
> > Hi,
> >
> > For a critical section protected by a spin lock, kernel preemption is
> > disabled explicitly, probably to make the critical section atomic.
> > But, suppose that an
#define spin_lock_string
\
"\n1:\t" \
"lock ; decb %0\n\t" \
"jns 3f\n" \
"2:\t" \
"rep;nop\n\t" \
"cmpb $0,%0\n\t" \
"jle 2b\n\t" \
"jmp 1b\n" \
"3:\n\t"
2010/8/20 Parmenides :
> Hi,
>
> In the following code, the nop instruction prefixed by rep will
> execute several times. How many times
Hi,
In the following code, the nop instruction prefixed by rep will
execute several times. How many times the instruction executes is
controlled by ecx register. But, there is no explicit setting of ecx
register. What's the meaning of this instruction?
--
To unsubscribe from this list: send an e
Hi Tapas,
On Wed, Aug 18, 2010 at 9:12 AM, Tapas Mishra wrote:
> I wrote following program in my home directory.
>
> #include
> #include
> #include
> extern void *sys_table[];
> asmlinkage int(*main_sys_exit)(int);
You seem to be missing the line of code that goes here
> {
> print
Ok
I looked at man page of gcc and searched for
DMODULE D__KERNEL and DLINUX got following
Pattern not found (press RETURN)
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.linux.org
Please read the FAQ at http://kernelnewbies.org/FAQ
Hi Rob...
This time, seems like we're connected through Inception-alike dream
machine. Could you please spin your totem first? :)
On Thu, Aug 19, 2010 at 19:43, Robert P. J. Day wrote:
> but:
>
> * "make install" blows up, complaining about multiple missing
> modules, not sure what that's al
Hi...
On Wed, Aug 18, 2010 at 23:12, Tapas Mishra wrote:
> When I compiled it as
>
>
> gcc -Wall -DMODULE -D__KERNEL__ -DLINUX -c sample2.c[/code]
>
> I got following error
>
>
> sample2.c:3:26: error: linux/module.h: No such file or directory
IMO it's because you forgot to tell gcc on where to
I was able to write my first module and saw that in syslog.
I am trying this code from here
https://docs.google.com/fileview?id=0B2A4urYOAf6POTI1OGE1MjctM2UyMC00OGUzLThlNDUtZDBhOWFjY2Y1MDUz&hl=en
page 48 left hand section.
Headers are installed.
sudo apt-get install linux-headers-generic
[sudo]
i haven't had time to dig into this and probably won't until this
weekend, but has anyone "git pull"ed the kernel source tree onto an
install of RHEL 6.0 Beta2, and simply built a generic kernel that
rebooted properly? i've tried it and had different, fatal errors
depending on whether i started
Hi...
On Thu, Aug 19, 2010 at 17:07, Anuz Pratap Singh Tomar
wrote:
> Hi all,
> I came across this page about possible security exploit in kernel modules.
> This page is very old(circa 1999), but it seems very interesting, I am
> wondering if this is any more relevant or all the holes are well pa
http://tinyurl.com/32pn4ol
:D
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.linux.org
Please read the FAQ at http://kernelnewbies.org/FAQ
Hi all,
I came across this page about possible security exploit in kernel modules.
This page is very old(circa 1999), but it seems very interesting, I am
wondering if this is any more relevant or all the holes are well patched
now.
http://www.packetstormsecurity.nl/docs/hack/LKM_HACKING.html#I.1.
thanks,
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.linux.org
Please read the FAQ at http://kernelnewbies.org/FAQ
17 matches
Mail list logo