Re: Question about sendpage exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2009/8/27 fisherman <ipconfigme@xxxxxxxxx>:

> BUT give_it_to_me_any_way_you_can() call memset(), memset() is a
> function in glic.
>
> In Kernel mode, can Call function in glib? How to resolve the symbol?

The process's address space is mapped and accessible from kernel mode
(with the same addresses!). Normally the kernel does not execute user
code in ring0; however the exploit gets code in the user address space
to run. So the user-space version of memset() is called, from ring0.

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux