Skip to content

Commit 46694b0

Browse files
committed
deploy: 1dd1666
1 parent 74b7980 commit 46694b0

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

index.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818

1919
<h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
2020
<div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
21-
<div class='date'><span class='ecrm-1200'>September 5, 2025</span></div>
21+
<div class='date'><span class='ecrm-1200'>September 7, 2025</span></div>
2222

2323

2424

@@ -4860,9 +4860,9 @@ <h4 class='subsectionHead' id='flashing-keyboard-leds'><span class='titlemark'>1
48604860
</code> structure may be able to overwrite the
48614861
<code> <span class='ectt-1000'>function</span>
48624862
</code> and <code> <span class='ectt-1000'>data</span>
4863-
</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
4864-
to call arbitrary functions within the kernel. Also, the function prototype of the callback,
4865-
containing a <code> <span id='textcolor2403'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2404'><span class='ectt-1000'>long</span></span>
4863+
</code> fields, providing the attacker with a way to use return-oriented programming (ROP) to call
4864+
arbitrary functions within the kernel. Also, the function prototype of the callback, containing
4865+
an <code> <span id='textcolor2403'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2404'><span class='ectt-1000'>long</span></span>
48664866
</code> argument, will prevent work from any type checking. Furthermore, the function prototype
48674867
with <code> <span id='textcolor2405'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2406'><span class='ectt-1000'>long</span></span>
48684868
</code> argument may be an obstacle to the forward-edge protection of <span class='ecti-1000'>control-flow integrity</span>.

lkmpg-for-ht.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818

1919
<h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
2020
<div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
21-
<div class='date'><span class='ecrm-1200'>September 5, 2025</span></div>
21+
<div class='date'><span class='ecrm-1200'>September 7, 2025</span></div>
2222

2323

2424

@@ -4860,9 +4860,9 @@ <h4 class='subsectionHead' id='flashing-keyboard-leds'><span class='titlemark'>1
48604860
</code> structure may be able to overwrite the
48614861
<code> <span class='ectt-1000'>function</span>
48624862
</code> and <code> <span class='ectt-1000'>data</span>
4863-
</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
4864-
to call arbitrary functions within the kernel. Also, the function prototype of the callback,
4865-
containing a <code> <span id='textcolor2403'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2404'><span class='ectt-1000'>long</span></span>
4863+
</code> fields, providing the attacker with a way to use return-oriented programming (ROP) to call
4864+
arbitrary functions within the kernel. Also, the function prototype of the callback, containing
4865+
an <code> <span id='textcolor2403'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2404'><span class='ectt-1000'>long</span></span>
48664866
</code> argument, will prevent work from any type checking. Furthermore, the function prototype
48674867
with <code> <span id='textcolor2405'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2406'><span class='ectt-1000'>long</span></span>
48684868
</code> argument may be an obstacle to the forward-edge protection of <span class='ecti-1000'>control-flow integrity</span>.

0 commit comments

Comments
 (0)