Skip to content

Commit cae871d

Browse files
committed
deploy: 84cc7fe
1 parent e7afc75 commit cae871d

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

index.html

+2-2
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818

1919
<h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
2020
<div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
21-
<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
21+
<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
2222

2323

2424

@@ -4765,7 +4765,7 @@ <h4 class='subsectionHead' id='flashing-keyboard-leds'><span class='titlemark'>1
47654765
</code> structure may be able to overwrite the
47664766
<code> <span class='ectt-1000'>function</span>
47674767
</code> and <code> <span class='ectt-1000'>data</span>
4768-
</code> fields, providing the attacker with a way to use return-object programming (ROP)
4768+
</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
47694769
to call arbitrary functions within the kernel. Also, the function prototype of the callback,
47704770
containing a <code> <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
47714771
</code> argument, will prevent work from any type checking. Furthermore, the function prototype

lkmpg-for-ht.html

+2-2
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818

1919
<h2 class='titleHead'>The Linux Kernel Module Programming Guide</h2>
2020
<div class='author'><span class='ecrm-1200'>Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang</span></div><br />
21-
<div class='date'><span class='ecrm-1200'>July 4, 2024</span></div>
21+
<div class='date'><span class='ecrm-1200'>July 21, 2024</span></div>
2222

2323

2424

@@ -4765,7 +4765,7 @@ <h4 class='subsectionHead' id='flashing-keyboard-leds'><span class='titlemark'>1
47654765
</code> structure may be able to overwrite the
47664766
<code> <span class='ectt-1000'>function</span>
47674767
</code> and <code> <span class='ectt-1000'>data</span>
4768-
</code> fields, providing the attacker with a way to use return-object programming (ROP)
4768+
</code> fields, providing the attacker with a way to use return-oriented programming (ROP)
47694769
to call arbitrary functions within the kernel. Also, the function prototype of the callback,
47704770
containing a <code> <span id='textcolor2409'><span class='ectt-1000'>unsigned</span></span><span class='ectt-1000'> </span><span id='textcolor2410'><span class='ectt-1000'>long</span></span>
47714771
</code> argument, will prevent work from any type checking. Furthermore, the function prototype

0 commit comments

Comments
 (0)