Hi! On Sun, Jul 27, 2008 at 7:47 PM, Scott Lovenberg <scott.lovenberg@xxxxxxxxx> wrote: > You mean like the stack piercing attack for Windows callbacks in the > messaging subsystem? Oh no! that's too scary for me :) I just thought I could change the faulting address which is saved in stack frame....thus after returning from signal handler...code flow jumps into certain EIP :) ehhehe, sorry to disappoint you :D regards, Mulyadi. -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ