-
```
Currently ASan unpoisons the shadow for stack variables at function exit.
If a process creates subprocess with shared memory, and the subprocess
finishes with _exit(), we never unpoison shadow sta…
-
```
Mainly we need to:
* Find KiServiceTable (not exported, no longer referenced by KTHREAD)
* Fix the hard-coded i*4 stuff in ssdt.py
* Compute the function address (no longer absolute pointers like…
-
```
Mainly we need to:
* Find KiServiceTable (not exported, no longer referenced by KTHREAD)
* Fix the hard-coded i*4 stuff in ssdt.py
* Compute the function address (no longer absolute pointers like…
-
Hello!
Still on the same vanilla 4.1 kernel, I get this when loading the patch with `kpatch load`:
```
loading core module: /root/src/kpatch/kpatch/../kmod/core/kpatch.ko
loading patch module: kpatc…
-
```
Mainly we need to:
* Find KiServiceTable (not exported, no longer referenced by KTHREAD)
* Fix the hard-coded i*4 stuff in ssdt.py
* Compute the function address (no longer absolute pointers like…
-
```
Currently ASan unpoisons the shadow for stack variables at function exit.
If a process creates subprocess with shared memory, and the subprocess
finishes with _exit(), we never unpoison shadow sta…
-
```
Mainly we need to:
* Find KiServiceTable (not exported, no longer referenced by KTHREAD)
* Fix the hard-coded i*4 stuff in ssdt.py
* Compute the function address (no longer absolute pointers like…
-
```
Currently ASan unpoisons the shadow for stack variables at function exit.
If a process creates subprocess with shared memory, and the subprocess
finishes with _exit(), we never unpoison shadow sta…
-
Running on `black-mac.platanus.local` (OS X 10.11.3) under `/opt/boxen/homebrew/bin/zsh`, version d30b1deac6e98cef765860d038051ff73cc2787e ([compare to master](https://github.com/platanus/our-boxen/co…
-
```
Mainly we need to:
* Find KiServiceTable (not exported, no longer referenced by KTHREAD)
* Fix the hard-coded i*4 stuff in ssdt.py
* Compute the function address (no longer absolute pointers like…